default search action
Nadeem Iqbal 0001
Person information
- affiliation: University of Lahore, Department of Computer Science and Information Technology, Pakistan
- affiliation: National College of Business Administration & Economics, NCBA&E, Lahore, Pakistan
- affiliation (former): Imperial College of Business Studies, ICBS, School of Computing and Information Sciences, Lahore, Pakistan
- affiliation (former): NUST, Islamabad, Pakistan
Other persons with the same name
- Nadeem Iqbal — disambiguation page
- Nadeem Iqbal 0002 — Abdul Wali Khan University Mardan, Department of Computer Science, Pakistan (and 3 more)
- Nadeem Iqbal 0003 (aka: Nadeem Iqbal Kajla 0003) — Muhammad Nawaz Shareef University of Agriculture, Multan, Pakistan (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j22]Jarallah Alqahtani, Muhammad Akram, Ghassan Ahmed Ali, Nadeem Iqbal, Ali Alqahtani, Roobaea Alroobaea:
Elevating Network Security: A Novel S-Box Algorithm for Robust Data Encryption. IEEE Access 12: 2123-2134 (2024) - [j21]Bayan Ibrahimm Alabdullah, Abdulbasid Banga, Nadeem Iqbal, Atif Ikram, Hossam Diab:
Advancing Cryptographic Security With a New Delannoy-Derived Chaotic S-Box. IEEE Access 12: 82926-82937 (2024) - [j20]Muhammad Hussain, Nadeem Iqbal, Zia Bashir:
Image pixels swapping encryption based on the TetraVex game and a publicly hash-sharing algorithm. Clust. Comput. 27(4): 5355-5376 (2024) - [j19]Nadeem Iqbal, Muhammad Adnan Khan, Sang-Woong Lee:
Multi-image cipher based on the random walk of Knight in a virtual 3D chessboard. Multim. Tools Appl. 83(3): 8629-8661 (2024) - [j18]Nadeem Iqbal:
Image encryption using Queen. Multim. Tools Appl. 83(4): 10551-10585 (2024) - 2023
- [j17]Mahmood Ul Hassan, Asaad Alzayed, Amin A. Al-Awady, Nadeem Iqbal, Muhammad Akram, Atif Ikram:
A Novel RGB Image Obfuscation Technique Using Dynamically Generated All Order-4 Magic Squares. IEEE Access 11: 46382-46398 (2023) - [j16]Mohammad Mazyad Hazzazi, Nadeem Iqbal, Atif Ikram:
Digital Images Security Technique Using Hénon and Piecewise Linear Chaotic Maps. IEEE Access 11: 106299-106314 (2023) - [j15]Nadeem Iqbal, Ibrar Hussain, Muhammad Adnan Khan, Sagheer Abbas, Shahid Yousaf:
An efficient image cipher based on the 1D scrambled image and 2D logistic chaotic map. Multim. Tools Appl. 82(26): 40345-40373 (2023) - 2022
- [j14]Muhammad Hussain, Nadeem Iqbal, Zia Bashir:
A chaotic image encryption scheme based on multi-directional confusion and diffusion operations. J. Inf. Secur. Appl. 70: 103347 (2022) - [j13]Zia Bashir, M. G. Abbas Malik, Muhammad Hussain, Nadeem Iqbal:
Multiple RGB images encryption algorithm based on elliptic curve, improved Diffie Hellman protocol. Multim. Tools Appl. 81(3): 3867-3897 (2022) - [j12]Nadeem Iqbal, Muhammad Hanif, Zia Ul Rehman, Muhammad Zohaib:
On the novel image encryption based on chaotic system and DNA computing. Multim. Tools Appl. 81(6): 8107-8137 (2022) - [j11]Muhammad Hanif, Nadeem Iqbal, Fida Ur Rahman, Muhammad Adnan Khan, Taher M. Ghazal, Sagheer Abbas, Munir Ahmad, Hussam M. N. Al Hamadi, Chan Yeob Yeun:
A Novel Grayscale Image Encryption Scheme Based on the Block-Level Swapping of Pixels and the Chaotic System. Sensors 22(16): 6243 (2022) - 2021
- [j10]Nadeem Iqbal, Rizwan Ali Naqvi, Muhammad Atif, Muhammad Adnan Khan, Muhammad Hanif, Sagheer Abbas, Dildar Hussain:
On the Image Encryption Algorithm Based on the Chaotic System, DNA Encoding, and Castle. IEEE Access 9: 118253-118270 (2021) - [j9]Nadeem Iqbal, Muhammad Hanif, Sagheer Abbas, Muhammad Adnan Khan, Zia Ul Rehman:
Dynamic 3D scrambled image based RGB image encryption scheme using hyperchaotic system and DNA encoding. J. Inf. Secur. Appl. 58: 102809 (2021) - [j8]Zia Bashir, Nadeem Iqbal, Muhammad Hanif:
A novel gray scale image encryption scheme based on pixels' swapping operations. Multim. Tools Appl. 80(1): 1029-1054 (2021) - [j7]Nadeem Iqbal, Muhammad Hanif:
An efficient grayscale image encryption scheme based on variable length row-column swapping operations. Multim. Tools Appl. 80(30): 36305-36339 (2021) - 2020
- [j6]M. G. Abbas Malik, Zia Bashir, Nadeem Iqbal, Md Athar Imtiaz:
Color Image Encryption Algorithm Based on Hyper-Chaos and DNA Computing. IEEE Access 8: 88093-88107 (2020) - [j5]Muhammad Hanif, Rizwan Ali Naqvi, Sagheer Abbas, Muhammad Adnan Khan, Nadeem Iqbal:
A Novel and Efficient 3D Multiple Images Encryption Scheme Based on Chaotic Systems and Swapping Operations. IEEE Access 8: 123536-123555 (2020) - [j4]Muhammad Hanif, Sagheer Abbas, Muhammad Adnan Khan, Nadeem Iqbal, Zia Ul Rehman, Muhammad Anwaar Saeed, Ehab Mahmoud Mohamed:
A Novel and Efficient Multiple RGB Images Cipher Based on Chaotic System and Circular Shift Operations. IEEE Access 8: 146408-146427 (2020) - [j3]Nadeem Iqbal, Muhammad Hanif, Sagheer Abbas, Muhammad Adnan Khan, Sultan H. Almotiri, Mohammad A. Alghamdi:
DNA Strands Level Scrambling Based Color Image Encryption Scheme. IEEE Access 8: 178167-178182 (2020) - [j2]Nadeem Iqbal, Sagheer Abbas, Muhammad Adnan Khan, Areej Fatima, Aiesha Ahmed, Nida Anwer:
Efficient image cipher based on the movement of king on the chessboard and chaotic system. J. Electronic Imaging 29(2): 023025 (2020) - 2019
- [j1]Nadeem Iqbal, Sagheer Abbas, Muhammad Adnan Khan, Tahir Alyas, Areej Fatima, Aiesha Ahmad:
An RGB Image Cipher Using Chaotic Systems, 15-Puzzle Problem and DNA Computing. IEEE Access 7: 174051-174071 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint