scispace - formally typeset
Search or ask a question
Author

Manish Kumar

Bio: Manish Kumar is an academic researcher from Birla Institute of Technology and Science. The author has contributed to research in topics: Encryption & Fourier transform. The author has an hindex of 9, co-authored 30 publications receiving 387 citations. Previous affiliations of Manish Kumar include University of Delhi & Banaras Hindu University.

Papers
More filters
Journal ArticleDOI
TL;DR: A robust image encryption algorithm is proposed based on DNA and ECDHE that can resist exhaustive attacks and is apt for practical applications.

169 citations

Journal ArticleDOI
TL;DR: This paper has proposed a first approach for an RGB image encryption and decryption using two stage random matrix affine cipher associated with discrete wavelet transformation and formulated a formula for all the possible range to choose keys for encrypting and decrypting anRGB image.

56 citations

Journal ArticleDOI
TL;DR: This paper is an effort to provide a review of relevant theories and principles, and gives insights including an interdisciplinary framework that combines behavioral cybersecurity, human factors, and modeling and simulation.
Abstract: Stories of cyber attacks are becoming a routine in which cyber attackers show new levels of intention by sophisticated attacks on networks. Unfortunately, cybercriminals have figured out profitable business models and they take advantage of the online anonymity. A serious situation that needs to improve for networks’ defenders. Therefore, a paradigm shift is essential to the effectiveness of current techniques and practices. Since the majority of cyber incidents are human enabled, this shift requires expanding research to underexplored areas such as behavioral aspects of cybersecurity. It is more vital to focus on social and behavioral issues to improve the current situation. This paper is an effort to provide a review of relevant theories and principles, and gives insights including an interdisciplinary framework that combines behavioral cybersecurity, human factors, and modeling and simulation.

54 citations

Journal ArticleDOI
TL;DR: In this article, a brief introduction to the fractional Fourier transform and its basic properties is given, and generalized pseudo-differential operators involving two classes of symbols and fractional FFT transforms are investigated.
Abstract: A brief introduction to the fractional Fourier transform and its basic properties is given. Fractional Fourier transform of tempered distributions is studied. Generalized pseudo-differential operators involving two classes of symbols and fractional Fourier transforms are investigated. An application of the fractional Fourier transform in solving a generalized heat equation is given.

44 citations

Journal ArticleDOI
01 Apr 2015
TL;DR: This paper has formulated a new algorithm for RGB image encryption and decryption using diffusion method with a combination of chaotic maps to choose keys for encrypting and decrypting RGB image.
Abstract: Image encryption and decryption are essential for securing images from various types of security attacks. In this paper, we have proposed a new algorithm for RGB image encryption and decryption using diffusion method with a combination of chaotic maps. We have formulated a new algorithm for the entire possible range to choose keys for encrypting and decrypting RGB image. Computer simulation with two standard examples and results are given to analyse the capability of the proposed approach. Several important analysis like key space, key sensitivity, NPCR, UACI, MSE and PSNR analysis are performed. Results of various analysis and computer simulation confirm that the new algorithm offers high security and is suitable for practical image encryption.

42 citations


Cited by
More filters
Journal ArticleDOI
Xiuli Chai1, Fu Xianglong1, Zhihua Gan1, Yang Lu1, Yi Chen2 
TL;DR: A four-wing hyperchaotic system is used to provide pseudo-random chaotic sequences, SHA 384 hash function of the plain image and external parameters are combined to compute its initial values, and one-time-pad encryption policy makes the proposed encryption effectively resist plaintext attacks.

401 citations

Journal ArticleDOI
TL;DR: A solution for secure and efficient image encryption with the help of self-adaptive permutation–diffusion and DNA random encoding and the reusability of the random variables can dramatically promote the efficiency of the cryptosystem, which renders great potential for real-time secure image applications.

251 citations

Journal ArticleDOI
TL;DR: Simulation results and performance analyses verify the effectiveness of the proposed encryption algorithm, which can achieve the image data security and image appearance security simultaneously, and the size of the cipher image and original image is equal, it does not require additional transmission bandwidth and storage space.

218 citations

Journal ArticleDOI
TL;DR: A robust image encryption algorithm is proposed based on DNA and ECDHE that can resist exhaustive attacks and is apt for practical applications.

169 citations

Journal ArticleDOI
TL;DR: This paper covers the most significant developments in meta-heuristic based image encryption techniques and discusses significant advancements in the field of image encryption and highlighting future challenges.
Abstract: Image encryption techniques play a significant role in multimedia applications to secure and authenticate digital images. This paper presents a comprehensive study of various image encryption techniques. This paper covers the most significant developments in meta-heuristic based image encryption techniques. The various attacks and performance measures related to image encryption techniques have also been studied. The existing techniques are analyzed with respect to differential, statistical, and key analyses. The main goal of this paper is to give a broad perspective on characteristics of image encryption techniques. The paper concludes by discussing significant advancements in the field of image encryption and highlighting future challenges.

156 citations