Jackson J

Post-Doctoral Research Fellow in Quantum Computing

About Me

I am a passionate researcher specializing in Quantum Computing, Algebraic Cryptography, Tropical Algebra, and its applications. My current focus is on chaos-based image encryption techniques that push the boundaries of secure communication.

Research Interests

Quantum computing is a field that uses quantum mechanics to perform calculations that are too complex for classical computers. It harnesses quantum phenomena like superposition (a qubit can be both 0 and 1 at the same time) and entanglement to process information, potentially solving problems in fields like drug discovery, materials science, and cryptography exponentially faster than current machines.

Tropical cryptography is a cryptographic approach that uses the algebraic structure of the tropical semiring, a mathematical system in which the usual operations of addition and multiplication are replaced by minimum (or maximum) and addition, respectively. In this context, "addition" refers to the minimum (or maximum) operation, and "multiplication" refers to regular addition. This non-standard algebraic structure has been explored for its potential applications in secure communication and cryptography, offering an alternative to traditional number-theoretic approaches like those based on integer factorization or elliptic curve cryptography. Tropical cryptography uses the properties of tropical semirings to create cryptographic primitives such as encryption schemes, digital signatures, and key exchange protocols. The tropical operations introduce new challenges and opportunities for the design of cryptographic protocols that are resistant to certain types of attacks. While tropical cryptography is a relatively novel field, it provides intriguing possibilities, particularly in the context of algebraic geometry and quantum information theory. Its resilience to certain attacks and its ability to operate efficiently in specific computational settings may lead to new methods of securing communications and storing data, especially in environments where traditional cryptographic methods face limitations. However, tropical cryptography is still an area of ongoing research and development.

Chaotic image encryption is a method of securing digital images using chaotic systems, which are nonlinear dynamic systems that exhibit sensitive dependence on initial conditions. This property, known as chaos, makes the system's behavior unpredictable and difficult to reverse without the exact initial parameters, providing a strong basis for encryption. In chaotic image encryption, the pixel values of an image are transformed through a series of complex, deterministic operations inspired by chaotic maps such as the Logistic map, Henon map, or fractional chaotic maps. The encryption process typically involves two phases: confusion and diffusion. Confusion rearranges the pixel values to obscure the relationship between the plaintext image and its ciphertext. Diffusion spreads the pixel values across the entire image to ensure that a change in one pixel influences the entire image, making it harder to decipher. Chaotic systems are particularly suitable for image encryption because they can produce complex, non-repeating patterns with a small change in initial conditions, enhancing security. Additionally, the pseudorandomness of chaotic sequences makes it difficult for attackers to reverse-engineer the encryption process without knowledge of the secret key. This method is efficient, fast, and can be applied to various image formats, offering strong security for image transmission in fields like digital forensics, medical imaging, and multimedia.

Algebraic music theory is an approach to understanding and analyzing music using concepts from abstract algebra, such as groups, rings, and fields. It applies mathematical structures to describe the relationships between musical elements like notes, chords, and scales. This theory helps formalize and generalize musical concepts in ways that can reveal deeper patterns and connections within music. In algebraic music theory, musical structures are often modeled as mathematical objects. For example, musical intervals, which represent the difference in pitch between two notes, can be studied using group theory, where the group operations correspond to intervallic relationships. A common structure used is the *set theory*, where pitch classes (pitches without regard to octave) are treated as elements of a group. This allows for the analysis of scales and chords in terms of their mathematical properties, such as symmetry and transposition. Other applications of algebraic music theory include understanding harmonic progressions, voice leading, and rhythm through the lens of algebraic operations. By treating musical concepts algebraically, it becomes possible to explore symmetries, transformations, and invariants within music, offering new insights into composition and analysis. This approach not only aids in music theory but also contributes to algorithmic composition, music generation, and computer-assisted music analysis.

Publications

Title: A robust medical image encryption technique using inverse cosine chaotic map
Journal: Expert Systems with Applications, 2025
Authors: Jackson J, Perumal R
Read More
Title: A robust image encryption technique based on an improved fractional order chaotic map
Journal: Nonlinear Dynamics, 2025
Authors: Jackson J, Perumal R
Read More
Title: An Algebraic Attack on the Key Exchange Protocol based upon a Modified Tropical Structure
Journal: Information and Computation, 2024
Authors: Jackson J, Perumal R
Read More
Title: On the 2D Hybrid Hyperchaotic Modified Lemniscate (2D-HHML) Map
Journal: Computational Mathematics and Mathematical Physics, 2025
Authors: Jackson J, Perumal R
Read More
Title: A novel 2D Hyperchaotic Sine Logistic map based image encryption scheme
Journal: Journal of Optics, 2024
Authors: Jackson J, Perumal R
Read More
Title: A secure key exchange protocol for Industrial Internet of Things
Journal: International Journal of Information Technology, 2024
Authors: Jackson J, Perumal R
Read More
Title: A tropical algebraic collatz conjecture based key exchange protocol for IoT environment
Journal: International Journal of Information Technology, 2024
Authors: Jackson J, Perumal R
Read More
Title: Another cryptanalysis of a tropical key exchange protocol
Journal: International Journal of Computer Science, 2023
Authors: Jackson J, Perumal R
Read More
Title: A Public Key Exchange Protocol Using Tropical Determinant for IoT Environment
Journal: Proceedings of Third International Conference on Advanced Computing and Applications: ICACA 2024
Authors: Jackson J, Perumal R
Read More
Title: A Medical Image Encryption Technique Using Tropical Semiring
Journal: Proceedings of the 15th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2023)
Authors: Jackson J, Perumal R
Read More

Patents

Title: A novel prime factorization algorithm for secure encryption
Ref ID: 202541009218
Title: A Novel Tropical Key Exchange Algorithm for Secure Encryption
Ref ID: 202541037511
Title: A Novel Max-Min Neutrosophic Key Exchange Algorithm for Secure Encryption
Ref ID: 202541037558

Educational Background

Bachelor of Science in Mathematics

Loyola College, Chennai

2016 - 2019

Key Interests: Calculus, Graph theory & Music theory.

Master of Science in Mathematics

University of Madras, Chennai

2019 - 2021

Key Interests: Linear algebra, PDE & Algebraic music theory.

PhD in Mathematics

SRM Institute of Science and Technology, Katttankulathur

2022 - 2025

Specialization: Algebraic cryptography & Chaotic image encryption.

Visvesvaraya Post-Doctoral Fellow

Indian Institute of Space Science and Technology, Tiruvananthapuram

2025 - Present

Specialization: Quantum computing.

Book

Title: Quantum Computation and Quantum Information, Nielsen and Chuang (2010). Cambridge University Press.

Download Book (PDF)

Contact

Email: jacksonj.pdf@iist.ac.in

Phone: +91 8072874948

LinkedIn: Profile

GitHub: Projects

Google Scholar: Articles

Instagram: Profile