2nd International Conference on Emerging Technologies in Electronics, Computing and Communication (ICETECC 2025)








Dr Jawad Ahmad - Keynote Speaker at ICETECC 2022
Dr Jawad Ahmad

Dr Jawad Ahmad is an experienced teacher with more than 10 years of cutting-edge teaching and research experience in prestigious institutes including Edinburgh Napier University (UK), Glasgow Caledonian University (UK), Hongik University (South Korea) and HITEC University Taxila (Pakistan). During his professional career in the UK, South Korea, and Pakistan, he has taught numerous industry-relevant courses such as Programming for Cyber Security, Cryptography, Operating Systems, Computer Systems and Mathematics for Computing. He has supervised several PhD, MSc and undergraduate students in their dissertations. He was a postgraduate student coordinator and curriculum development committee member at HITEC University Taxila Pakistan. He has co-authored more than 100+ research papers (2000+ Google Citations), including in leading international journals and peer-reviewed international conference proceedings. In 2020, he was recognised as a Global Talent in the area of Cyber Security by the UK Research and Innovation Body and Royal Academy of Engineering. His name was included in World’s Top 2% highly cited scientists. He earned a gold medal and bronze medal for best performance in MS (Electrical Engineering) and BS (Electronics Engineering), respectively.

Keynote Speech on:
Chaotic Map Based Image Encryption

Traditional algorithms, such as Rivest Shamir Algorithm (RSA), Data Encryption Standard (DES), International Data Encryption Algorithm (IDEA), and Advanced Encryption Standard (AES), are used for text encryption but cannot be utilised for multimedia encryption due to a number of reasons:

  1. In general, multimedia data such as video, image, and audio are very vast in size, necessitating extensive computation times and expensive computer power when encrypting with typical algorithms. As a result, classical algorithms are unsuitable for real-time applications such as video conferencing and image surveillance, among others.
  2. Due to their slow encryption and decryption speeds, traditional techniques may create significant latency in real-time applications.
  3. Due to several intrinsic aspects of images, such as strong correlations among pixels and significant redundancy, video and image data encryption approaches differ from traditional algorithms.

Due to aforementioned issues, chaos-based lightweight encryption algorithms can be implemented to tackle the problems of multimedia encryption.




-->