Skip to main content

Showing 1–44 of 44 results for author: Ahmad, J

  1. arXiv:2404.00946  [pdf

    cs.CV

    Exploring the Efficacy of Group-Normalization in Deep Learning Models for Alzheimer's Disease Classification

    Authors: Gousia Habib, Ishfaq Ahmed Malik, Jameel Ahmad, Imtiaz Ahmed, Shaima Qureshi

    Abstract: Batch Normalization is an important approach to advancing deep learning since it allows multiple networks to train simultaneously. A problem arises when normalizing along the batch dimension because B.N.'s error increases significantly as batch size shrinks because batch statistics estimates are inaccurate. As a result, computer vision tasks like detection, segmentation, and video, which require t… ▽ More

    Submitted 1 April, 2024; originally announced April 2024.

    Comments: 19 pages, 3 figures

  2. arXiv:2403.05210  [pdf, other

    cs.CR

    TIPS: Threat Sharing Information Platform for Enhanced Security

    Authors: Lakshmi Rama Kiran Pasumarthy, Hisham Ali, William J Buchanan, Jawad Ahmad, Audun Josang, Vasileios Mavroeidis, Mouad Lemoudden

    Abstract: There is an increasing need to share threat information for the prevention of widespread cyber-attacks. While threat-related information sharing can be conducted through traditional information exchange methods, such as email communications etc., these methods are often weak in terms of their trustworthiness and privacy. Additionally, the absence of a trust infrastructure between different informa… ▽ More

    Submitted 8 March, 2024; originally announced March 2024.

  3. arXiv:2401.04707  [pdf, other

    cs.CR

    RNA-TransCrypt: Image Encryption Using Chaotic RNA Encoding, Novel Transformative Substitution, and Tailored Cryptographic Operations

    Authors: Muhammad Shahbaz Khan, Jawad Ahmad, Ahmed Al-Dubai, Baraq Ghaleb, Nikolaos Pitropakis, William J. Buchanan

    Abstract: Given the security concerns of Internet of Things (IoT) networks and limited computational resources of IoT devices, this paper presents RNA-TransCrypt, a novel image encryption scheme that is not only highly secure but also efficient and lightweight. RNA-TransCrypt integrates the biocryptographic properties of RNA encoding with the non-linearity and unpredictability of chaos theory. This scheme i… ▽ More

    Submitted 9 January, 2024; originally announced January 2024.

  4. arXiv:2311.04932  [pdf, other

    cs.CV

    GC-VTON: Predicting Globally Consistent and Occlusion Aware Local Flows with Neighborhood Integrity Preservation for Virtual Try-on

    Authors: Hamza Rawal, Muhammad Junaid Ahmad, Farooq Zaman

    Abstract: Flow based garment warping is an integral part of image-based virtual try-on networks. However, optimizing a single flow predicting network for simultaneous global boundary alignment and local texture preservation results in sub-optimal flow fields. Moreover, dense flows are inherently not suited to handle intricate conditions like garment occlusion by body parts or by other garments. Forcing flow… ▽ More

    Submitted 7 November, 2023; originally announced November 2023.

    Comments: accepted at WACV 2024

  5. arXiv:2311.04058  [pdf, other

    cs.CV

    mmFUSION: Multimodal Fusion for 3D Objects Detection

    Authors: Javed Ahmad, Alessio Del Bue

    Abstract: Multi-sensor fusion is essential for accurate 3D object detection in self-driving systems. Camera and LiDAR are the most commonly used sensors, and usually, their fusion happens at the early or late stages of 3D detectors with the help of regions of interest (RoIs). On the other hand, fusion at the intermediate level is more adaptive because it does not need RoIs from modalities but is complex as… ▽ More

    Submitted 7 November, 2023; originally announced November 2023.

    Comments: 10 pages,

  6. arXiv:2311.02795  [pdf, other

    cs.CR

    PermutEx: Feature-Extraction-Based Permutation -- A New Diffusion Scheme for Image Encryption Algorithms

    Authors: Muhammad Shahbaz Khan, Jawad Ahmad, Ahmed Al-Dubai, Zakwan Jaroucheh, Nikolaos Pitropakis, William J. Buchanan

    Abstract: Traditional permutation schemes mostly focus on random scrambling of pixels, often neglecting the intrinsic image information that could enhance diffusion in image encryption algorithms. This paper introduces PermutEx, a feature-extraction-based permutation method that utilizes inherent image features to scramble pixels effectively. Unlike random permutation schemes, PermutEx extracts the spatial… ▽ More

    Submitted 5 November, 2023; originally announced November 2023.

  7. arXiv:2310.05032  [pdf, other

    cs.CR

    PASSION: Permissioned Access Control for Segmented Devices and Identity for IoT Networks

    Authors: Hisham Ali, Mwrwan Abubakar, Jawad Ahmad, William J. Buchanan, Zakwan Jaroucheh

    Abstract: In recent years, there has been a significant proliferation of industrial Internet of Things (IoT) applications, with a wide variety of use cases being developed and put into operation. As the industrial IoT landscape expands, the establishment of secure and reliable infrastructure becomes crucial to instil trust among users and stakeholders, particularly in addressing fundamental concerns such as… ▽ More

    Submitted 8 October, 2023; originally announced October 2023.

  8. arXiv:2309.11476  [pdf

    cs.CR

    CellSecure: Securing Image Data in Industrial Internet-of-Things via Cellular Automata and Chaos-Based Encryption

    Authors: Hassan Ali, Muhammad Shahbaz Khan, Maha Driss, Jawad Ahmad, William J. Buchanan, Nikolaos Pitropakis

    Abstract: In the era of Industrial IoT (IIoT) and Industry 4.0, ensuring secure data transmission has become a critical concern. Among other data types, images are widely transmitted and utilized across various IIoT applications, ranging from sensor-generated visual data and real-time remote monitoring to quality control in production lines. The encryption of these images is essential for maintaining operat… ▽ More

    Submitted 20 September, 2023; originally announced September 2023.

  9. arXiv:2309.11471  [pdf

    cs.CR

    Noise-Crypt: Image Encryption with Non-linear Noise, Hybrid Chaotic Maps, and Hashing

    Authors: Laiba Asghar, Fawad Ahmed, Muhammad Shahbaz Khan, Arshad Arshad, Jawad Ahmad

    Abstract: To secure the digital images over insecure transmission channels, a new image encryption algorithm Noise-Crypt is proposed in this paper. Noise-Crypt integrates non-linear random noise, hybrid chaotic maps, and SHA-256 hashing algorithm. The utilized hybrid chaotic maps are the logistic-tent and the logistic-sine-cosine map. The hybrid chaotic maps enhance the pseudorandom sequence generation and… ▽ More

    Submitted 20 September, 2023; originally announced September 2023.

  10. arXiv:2308.10834  [pdf, other

    cs.CR cs.IT

    SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data

    Authors: Muhammad Shahbaz Khan, Jawad Ahmad, Hisham Ali, Nikolaos Pitropakis, Ahmed Al-Dubai, Baraq Ghaleb, William J. Buchanan

    Abstract: With the advent of digital communication, securing digital images during transmission and storage has become a critical concern. The traditional s-box substitution methods often fail to effectively conceal the information within highly auto-correlated regions of an image. This paper addresses the security issues presented by three prevalent S-box substitution methods, i.e., single S-box, multiple… ▽ More

    Submitted 21 August, 2023; originally announced August 2023.

    Comments: 6 Pages

  11. arXiv:2305.10025  [pdf

    cs.NI cs.CR

    Resolving the Decreased Rank Attack in RPL's IoT Networks

    Authors: B. Ghaleb, A. Al-Dubai, A. Hussain, J. Ahmad, I. Romdhani, Z. Jaroucheh

    Abstract: The Routing Protocol for Low power and Lossy networks (RPL) has been developed by the Internet Engineering Task Force (IETF) standardization body to serve as a part of the 6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks) standard, a core communication technology for the Internet of Things (IoT) networks. RPL organizes its network in the form of a tree-like structure where a node is co… ▽ More

    Submitted 17 May, 2023; originally announced May 2023.

  12. arXiv:2305.07453  [pdf, other

    cs.DC

    Distributed Twins in Edge Computing: Blockchain and IOTA

    Authors: Anwar Sadad, Muazzam A. Khan, Baraq Ghaleb, Fadia Ali Khan, Maha Driss, Wadii Boulila, Jawad Ahmad

    Abstract: Blockchain (BC) and Information for Operational and Tactical Analysis (IOTA) are distributed ledgers that record a huge number of transactions in multiple places at the same time using decentralized databases. Both BC and IOTA facilitate Internet-of-Things (IoT) by overcoming the issues related to traditional centralized systems, such as privacy, security, resources cost, performance, and transpar… ▽ More

    Submitted 29 April, 2023; originally announced May 2023.

  13. arXiv:2304.09756  [pdf, other

    cs.LG cs.AI cs.HC eess.SP

    Contactless Human Activity Recognition using Deep Learning with Flexible and Scalable Software Define Radio

    Authors: Muhammad Zakir Khan, Jawad Ahmad, Wadii Boulila, Matthew Broadbent, Syed Aziz Shah, Anis Koubaa, Qammer H. Abbasi

    Abstract: Ambient computing is gaining popularity as a major technological advancement for the future. The modern era has witnessed a surge in the advancement in healthcare systems, with viable radio frequency solutions proposed for remote and unobtrusive human activity recognition (HAR). Specifically, this study investigates the use of Wi-Fi channel state information (CSI) as a novel method of ambient sens… ▽ More

    Submitted 18 April, 2023; originally announced April 2023.

  14. A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder

    Authors: Fawad Ahmed, Muneeb Ur Rehman, Jawad Ahmad, Muhammad Shahbaz Khan, Wadii Boulila, Gautam Srivastava, Jerry Chun-Wei Lin, William J. Buchanan

    Abstract: With the advancement in technology, digital images can easily be transmitted and stored over the Internet. Encryption is used to avoid illegal interception of digital images. Encrypting large-sized colour images in their original dimension generally results in low encryption/decryption speed along with exerting a burden on the limited bandwidth of the transmission channel. To address the aforement… ▽ More

    Submitted 7 November, 2022; originally announced November 2022.

    Journal ref: (2022) ACM Trans. Multimedia Comput. Commun. Appl

  15. arXiv:2207.05710  [pdf

    cs.SE cs.LG

    The Untold Impact of Learning Approaches on Software Fault-Proneness Predictions

    Authors: Mohammad Jamil Ahmad, Katerina Goseva-Popstojanova, Robyn R. Lutz

    Abstract: Software fault-proneness prediction is an active research area, with many factors affecting prediction performance extensively studied. However, the impact of the learning approach (i.e., the specifics of the data used for training and the target variable being predicted) on the prediction performance has not been studied, except for one initial work. This paper explores the effects of two learnin… ▽ More

    Submitted 12 July, 2022; originally announced July 2022.

  16. arXiv:2202.05662  [pdf, other

    cs.CR cs.SD eess.AS

    A Novel Chaos-based Light-weight Image Encryption Scheme for Multi-modal Hearing Aids

    Authors: Awais Aziz Shah, Ahsan Adeel, Jawad Ahmad, Ahmed Al-Dubai, Mandar Gogate, Abhijeet Bishnu, Muhammad Diyan, Tassadaq Hussain, Kia Dashtipour, Tharm Ratnarajah, Amir Hussain

    Abstract: Multimodal hearing aids (HAs) aim to deliver more intelligible audio in noisy environments by contextually sensing and processing data in the form of not only audio but also visual information (e.g. lip reading). Machine learning techniques can play a pivotal role for the contextually processing of multimodal data. However, since the computational power of HA devices is low, therefore this data mu… ▽ More

    Submitted 11 February, 2022; originally announced February 2022.

  17. Ransomware: Analysing the Impact on Windows Active Directory Domain Services

    Authors: Grant McDonald, Pavlos Papadopoulos, Nikolaos Pitropakis, Jawad Ahmad, William J. Buchanan

    Abstract: Ransomware has become an increasingly popular type of malware across the past decade and continues to rise in popularity due to its high profitability. Organisations and enterprises have become prime targets for ransomware as they are more likely to succumb to ransom demands as part of operating expenses to counter the cost incurred from downtime. Despite the prevalence of ransomware as a threat t… ▽ More

    Submitted 7 February, 2022; originally announced February 2022.

    Journal ref: Sensors 22, no. 3: 953 (2022)

  18. arXiv:2112.10092  [pdf, other

    cs.CR

    Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers

    Authors: Hisham Ali, Pavlos Papadopoulos, Jawad Ahmad, Nikolaos Pitropakis, Zakwan Jaroucheh, William J. Buchanan

    Abstract: Threat information sharing is considered as one of the proactive defensive approaches for enhancing the overall security of trusted partners. Trusted partner organizations can provide access to past and current cybersecurity threats for reducing the risk of a potential cyberattack - the requirements for threat information sharing range from simplistic sharing of documents to threat intelligence sh… ▽ More

    Submitted 19 December, 2021; originally announced December 2021.

    Journal ref: IEEE SINCONF 2021: 14th International Conference on Security of Information and Networks

  19. arXiv:2107.04128  [pdf

    cs.NI

    Evolution of Target Localization in Wireless Sensor Network (WSN): A Review

    Authors: Muneeb A. Khan, Muazzam A. Khan, Maha Driss, Wadii Boulila, Jawad Ahmad

    Abstract: Wireless Sensor Network holds a pivotal position and gained a lot of attention from researchers in recent years. Sensor nodes have been used in vast applications such as environment monitoring, security purpose applications, and target tracking. This latter comprises of detection and monitoring of the target movement. In this paper, we explore in detail well-known target tracking techniques. The e… ▽ More

    Submitted 8 July, 2021; originally announced July 2021.

  20. arXiv:2105.13435  [pdf, other

    cs.CR

    Intrusion Detection using Machine Learning Techniques: An Experimental Comparison

    Authors: Kathryn-Ann Tait, Jan Sher Khan, Fehaid Alqahtani, Awais Aziz Shah, Fadia Ali Khan, Mujeeb Ur Rehman, Wadii Boulila, Jawad Ahmad

    Abstract: Due to an exponential increase in the number of cyber-attacks, the need for improved Intrusion Detection Systems (IDS) is apparent than ever. In this regard, Machine Learning (ML) techniques are playing a pivotal role in the early classification of the attacks in case of intrusion detection within the system. However, due to a large number of algorithms available, the selection of the right method… ▽ More

    Submitted 27 May, 2021; originally announced May 2021.

  21. arXiv:2105.13426  [pdf

    cs.CV

    GuideMe: A Mobile Application based on Global Positioning System and Object Recognition Towards a Smart Tourist Guide

    Authors: Wadii Boulila, Anmar Abuhamdah, Maha Driss, Slim Kammoun, Jawad Ahmad

    Abstract: Finding information about tourist places to visit is a challenging problem that people face while visiting different countries. This problem is accentuated when people are coming from different countries, speak different languages, and are from all segments of society. In this context, visitors and pilgrims face important problems to find the appropriate doaas when visiting holy places. In this pa… ▽ More

    Submitted 27 May, 2021; originally announced May 2021.

  22. arXiv:2105.07722  [pdf

    cs.CR cs.SE

    Microservices in IoT Security: Current Solutions, Research Challenges, and Future Directions

    Authors: Maha Driss, Daniah Hasan, Wadii Boulila, Jawad Ahmad

    Abstract: In recent years, the Internet of Things (IoT) technology has led to the emergence of multiple smart applications in different vital sectors including healthcare, education, agriculture, energy management, etc. IoT aims to interconnect several intelligent devices over the Internet such as sensors, monitoring systems, and smart appliances to control, store, exchange, and analyze collected data. The… ▽ More

    Submitted 17 May, 2021; originally announced May 2021.

  23. arXiv:2104.10015  [pdf, other

    cs.CR

    Voting Classifier-based Intrusion Detection for IoT Networks

    Authors: Muhammad Almas Khan, Muazzam A Khan, Shahid Latif, Awais Aziz Shah, Mujeeb Ur Rehman, Wadii Boulila, Maha Driss, Jawad Ahmad

    Abstract: Internet of Things (IoT) is transforming human lives by paving the way for the management of physical devices on the edge. These interconnected IoT objects share data for remote accessibility and can be vulnerable to open attacks and illegal access. Intrusion detection methods are commonly used for the detection of such kinds of attacks but with these methods, the performance/accuracy is not optim… ▽ More

    Submitted 25 April, 2021; v1 submitted 20 April, 2021; originally announced April 2021.

  24. arXiv:2103.01695  [pdf

    cs.CV cs.LG

    A Novel CNN-LSTM-based Approach to Predict Urban Expansion

    Authors: Wadii Boulila, Hamza Ghandorh, Mehshan Ahmed Khan, Fawad Ahmed, Jawad Ahmad

    Abstract: Time-series remote sensing data offer a rich source of information that can be used in a wide range of applications, from monitoring changes in land cover to surveilling crops, coastal changes, flood risk assessment, and urban sprawl. This paper addresses the challenge of using time-series satellite images to predict urban expansion. Building upon previous work, we propose a novel two-step approac… ▽ More

    Submitted 2 March, 2021; originally announced March 2021.

  25. An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks

    Authors: Andrew Churcher, Rehmat Ullah, Jawad Ahmad, Sadaqat ur Rehman, Fawad Masood, Mandar Gogate, Fehaid Alqahtani, Boubakr Nour, William J. Buchanan

    Abstract: In recent years, there has been a massive increase in the amount of Internet of Things (IoT) devices as well as the data generated by such devices. The participating devices in IoT networks can be problematic due to their resource-constrained nature, and integrating security on these devices is often overlooked. This has resulted in attackers having an increased incentive to target IoT devices. As… ▽ More

    Submitted 10 January, 2021; originally announced January 2021.

    Journal ref: Sensors. 2021; 21(2):446

  26. arXiv:2101.03126  [pdf

    q-bio.BM cs.LG

    piSAAC: Extended notion of SAAC feature selection novel method for discrimination of Enzymes model using different machine learning algorithm

    Authors: Zaheer Ullah Khan, Dechang Pi, Izhar Ahmed Khan, Asif Nawaz, Jamil Ahmad, Mushtaq Hussain

    Abstract: Enzymes and proteins are live driven biochemicals, which has a dramatic impact over the environment, in which it is active. So, therefore, it is highly looked-for to build such a robust and highly accurate automatic and computational model to accurately predict enzymes nature. In this study, a novel split amino acid composition model named piSAAC is proposed. In this model, protein sequence is dis… ▽ More

    Submitted 15 December, 2020; originally announced January 2021.

    Comments: 3 Figures, 5 Tables, 6 Pages

  27. arXiv:2008.01191  [pdf, other

    cs.IR cs.CV cs.LG

    Deep Learning Techniques for Future Intelligent Cross-Media Retrieval

    Authors: Sadaqat ur Rehman, Muhammad Waqas, Shanshan Tu, Anis Koubaa, Obaid ur Rehman, Jawad Ahmad, Muhammad Hanif, Zhu Han

    Abstract: With the advancement in technology and the expansion of broadcasting, cross-media retrieval has gained much attention. It plays a significant role in big data applications and consists in searching and finding data from different types of media. In this paper, we provide a novel taxonomy according to the challenges faced by multi-modal deep learning approaches in solving cross-media retrieval, nam… ▽ More

    Submitted 21 July, 2020; originally announced August 2020.

    Comments: arXiv admin note: text overlap with arXiv:1804.09539 by other authors

  28. arXiv:2002.05342  [pdf

    cs.CY

    Understanding the Impact of Customer Reviews on Hotel Rating: An Empirical Research

    Authors: J. Ahmad, H. Sami Ullah, S. Aslam

    Abstract: The ascent of the Internet has caused numerous adjustments in our lives. The Internet has radically changed the manner in which we carry on with our lives, the manner in which we spend our occasions, how we speak with one another day by day, and how we buy items. The development of the Internet among users has created content on the Internet by sources, for example, web-based life, reviews site, o… ▽ More

    Submitted 22 February, 2020; v1 submitted 12 February, 2020; originally announced February 2020.

    Comments: 13 pages, 13 Figures and 16 References

  29. An authentication protocol based on chaos and zero knowledge proof

    Authors: Will Major, William J Buchanan, Jawad Ahmad

    Abstract: Port Knocking is a method for authenticating clients through a closed stance firewall, and authorising their requested actions, enabling severs to offer services to authenticated clients, without opening ports on the firewall. Advances in port knocking have resulted in an increase in complexity in design, preventing port knocking solutions from realising their potential. This paper proposes a nove… ▽ More

    Submitted 22 January, 2020; originally announced January 2020.

    Comments: J. Nonlinear Dyn (2020)

  30. arXiv:1908.02510  [pdf, other

    math.OC cs.IT eess.SP

    Quantum Calculus-based Volterra LMS for Nonlinear Channel Estimation

    Authors: Muhammad Usman, Muhammad Sohail Ibrahim, Jawwad Ahmad, Syed Saiq Hussain, Muhammad Moinuddin

    Abstract: A novel adaptive filtering method called $q$-Volterra least mean square ($q$-VLMS) is presented in this paper. The $q$-VLMS is a nonlinear extension of conventional LMS and it is based on Jackson's derivative also known as $q$-calculus. In Volterra LMS, due to large variance of input signal the convergence speed is very low. With proper manipulation we successfully improved the convergence perform… ▽ More

    Submitted 7 August, 2019; originally announced August 2019.

  31. Spatio-Temporal RBF Neural Networks

    Authors: Shujaat Khan, Jawwad Ahmad, Alishba Sadiq, Imran Naseem, Muhammad Moinuddin

    Abstract: Herein, we propose a spatio-temporal extension of RBFNN for nonlinear system identification problem. The proposed algorithm employs the concept of time-space orthogonality and separately models the dynamics and nonlinear complexities of the system. The proposed RBF architecture is explored for the estimation of a highly nonlinear system and results are compared with the standard architecture for b… ▽ More

    Submitted 4 August, 2019; originally announced August 2019.

    Comments: Published in 2018 3rd International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)

    Journal ref: 2018 3rd International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)

  32. arXiv:1809.04966  [pdf, other

    cs.CR

    Real-Time Lightweight Chaotic Encryption for 5G IoT Enabled Lip-Reading Driven Secure Hearing-Aid

    Authors: Ahsan Adeel, Jawad Ahmad, Amir Hussain

    Abstract: Existing audio-only hearing-aids are known to perform poorly in noisy situations where overwhelming noise is present. Next-generation audio-visual (lip-reading driven) hearing-aids stand as a major enabler to realise more intelligible audio. However, high data rate, low latency, low computational complexity, and privacy are some of the major bottlenecks to the successful deployment of such advance… ▽ More

    Submitted 13 September, 2018; originally announced September 2018.

    ACM Class: D.4.6; C.2; I.2; I.2.7; I.2.6

  33. arXiv:1610.01382  [pdf

    cs.SD cs.CL

    Divide-and-Conquer based Ensemble to Spot Emotions in Speech using MFCC and Random Forest

    Authors: Abdul Malik Badshah, Jamil Ahmad, Mi Young Lee, Sung Wook Baik

    Abstract: Besides spoken words, speech signals also carry information about speaker gender, age, and emotional state which can be used in a variety of speech analysis applications. In this paper, a divide and conquer strategy for ensemble classification has been proposed to recognize emotions in speech. Intrinsic hierarchy in emotions has been utilized to construct an emotions tree, which assisted in breaki… ▽ More

    Submitted 5 October, 2016; originally announced October 2016.

    Comments: 8 pages, conference paper, The 2nd International Integrated Conference & Concert on Convergence (2016)

  34. arXiv:1602.01927  [pdf

    cs.CV

    On Feature based Delaunay Triangulation for Palmprint Recognition

    Authors: Zanobya N. Khan, Rashid Jalal Qureshi, Jamil Ahmad

    Abstract: Authentication of individuals via palmprint based biometric system is becoming very popular due to its reliability as it contains unique and stable features. In this paper, we present a novel approach for palmprint recognition and its representation. To extract the palm lines, local thresholding technique Niblack binarization algorithm is adopted. The endpoints of these lines are determined and a… ▽ More

    Submitted 5 February, 2016; originally announced February 2016.

    Journal ref: Journal of Platform Technology, 3(4), 9-18 (2015)

  35. arXiv:1601.01577  [pdf

    cs.SD

    Gender Identification using MFCC for Telephone Applications - A Comparative Study

    Authors: Jamil Ahmad, Mustansar Fiaz, Soon-il Kwon, Maleerat Sodanil, Bay Vo, Sung Wook Baik

    Abstract: Gender recognition is an essential component of automatic speech recognition and interactive voice response systems. Determining gender of the speaker reduces the computational burden of such systems for any further processing. Typical methods for gender recognition from speech largely depend on features extraction and classification processes. The purpose of this study is to evaluate the performa… ▽ More

    Submitted 7 January, 2016; originally announced January 2016.

    Journal ref: International Journal of Computer Science and Electronics Engineering 3.5 (2015): 351-355

  36. arXiv:1601.01386  [pdf

    cs.MM

    A New Image Steganographic Technique using Pattern based Bits Shuffling and Magic LSB for Grayscale Images

    Authors: Khan Muhammad, Jamil Ahmad, Haleem Farman, Zahoor Jan

    Abstract: Image Steganography is a growing research area of information security where secret information is embedded in innocent-looking public communication. This paper proposes a novel crystographic technique for grayscale images in spatial domain. The secret data is encrypted and shuffled using pattern based bits shuffling algorithm (PBSA) and a secret key. The encrypted data is then embedded in the cov… ▽ More

    Submitted 6 January, 2016; originally announced January 2016.

    Comments: A short paper of 6 pages

    Journal ref: Sindh University Research Journal-SURJ (Science Series) 47.4 (2015)

  37. arXiv:1510.04413  [pdf

    cs.MM cs.CR

    Secure Image Steganography using Cryptography and Image Transposition

    Authors: Khan Muhammad, Jamil Ahmad, Muhammad Sajjad, Muhammad Zubair

    Abstract: Information security is one of the most challenging problems in today's technological world. In order to secure the transmission of secret data over the public network (Internet), various schemes have been presented over the last decade. Steganography combined with cryptography, can be one of the best choices for solving this problem. This paper proposes a new steganographic method based on gray-l… ▽ More

    Submitted 15 October, 2015; originally announced October 2015.

    Comments: A simple but effective image steganographic method, providing secure transmission of secret data over Internet. The final published version of the paper can be downloaded from the link: (http://www.neduet.edu.pk/NED-Journal/2015/15vol4paper3.html). Please contact me at khan.muhammad.icp@gmail.com if you need the final formatted published version of the paper

    Journal ref: NED University Journal of Research 12.4 (2015): 81-91

  38. arXiv:1510.00226  [pdf

    cs.CR

    An Adaptive Secret Key-directed Cryptographic Scheme for Secure Transmission in Wireless Sensor Networks

    Authors: Khan Muhammad, Zahoor Jan, Jamil Ahmad, Zahid Khan

    Abstract: Wireless Sensor Networks (WSNs) are memory and bandwidth limited networks whose main goals are to maximize the network lifetime and minimize the energy consumption and transmission cost. To achieve these goals, dif ferent techniques of compression and clustering have been used. However, security is an open and major issue in WSNs for which different approaches are used, both in centralized and dis… ▽ More

    Submitted 1 October, 2015; originally announced October 2015.

    Comments: A short paper of 6 pages, proposing an adaptive cryptographic technique for secure transmission in WSN. The original paper can be found on this link at page 48. http://web.uettaxila.edu.pk/techJournal/2015/No3/TECHNICAL_JOURNAL_VOL_20_NO_3.pdf

    Journal ref: Technical Journal, University of Engineering and Technology Taxila, Pakistan, vol.20, pp.48-53, 2015

  39. A Novel Image Steganographic Approach for Hiding Text in Color Images using HSI Color Model

    Authors: Khan Muhammad, Jamil Ahmad, Haleem Farman, Muhammad Zubair

    Abstract: Image Steganography is the process of embedding text in images such that its existence cannot be detected by Human Visual System (HVS) and is known only to sender and receiver. This paper presents a novel approach for image steganography using Hue-Saturation-Intensity (HSI) color space based on Least Significant Bit (LSB). The proposed method transforms the image from RGB color space to Hue-Satura… ▽ More

    Submitted 1 March, 2015; originally announced March 2015.

    Comments: An easy to follow paper of 11 pages. arXiv admin note: text overlap with arXiv:1502.07808

    Journal ref: Middle-East Journal of Scientific Research 22.5 (2014): 647-654

  40. arXiv:1502.07808  [pdf

    cs.MM cs.CR

    A Secure Cyclic Steganographic Technique for Color Images using Randomization

    Authors: Khan Muhammad, Jamil Ahmad, Naeem Ur Rehman, Zahoor Jan, Rashid Jalal Qureshi

    Abstract: Information Security is a major concern in today's modern era. Almost all the communicating bodies want the security, confidentiality and integrity of their personal data. But this security goal cannot be achieved easily when we are using an open network like Internet. Steganography provides one of the best solutions to this problem. This paper represents a new Cyclic Steganographic T echnique (CS… ▽ More

    Submitted 26 February, 2015; originally announced February 2015.

    Comments: 8

    Journal ref: Technical Journal, University of Engineering and Technology Taxila, Pakistan, vol. 19, pp. 57-64, 2014

  41. arXiv:1502.07041  [pdf

    cs.IR cs.CV

    Describing Colors, Textures and Shapes for Content Based Image Retrieval - A Survey

    Authors: Jamil Ahmad, Muhammad Sajjad, Irfan Mehmood, Seungmin Rho, Sung Wook Baik

    Abstract: Visual media has always been the most enjoyed way of communication. From the advent of television to the modern day hand held computers, we have witnessed the exponential growth of images around us. Undoubtedly it's a fact that they carry a lot of information in them which needs be utilized in an effective manner. Hence intense need has been felt to efficiently index and store large image collecti… ▽ More

    Submitted 24 February, 2015; originally announced February 2015.

    Journal ref: (2014), Journal of Platform Technology 2(4): 34-48

  42. A Fusion of Labeled-Grid Shape Descriptors with Weighted Ranking Algorithm for Shapes Recognition

    Authors: Jamil Ahmad, Zahoor Jan, Zia-ud-Din, Shoaib Muhammad Khan

    Abstract: Retrieving similar images from a large dataset based on the image content has been a very active research area and is a very challenging task. Studies have shown that retrieving similar images based on their shape is a very effective method. For this purpose a large number of methods exist in literature. The combination of more than one feature has also been investigated for this purpose and has s… ▽ More

    Submitted 16 June, 2014; originally announced June 2014.

    Journal ref: World Applied Sciences Journal, vol. 31(6), pp. 1207-1213, 2014

  43. An Improved DC Recovery Method from AC Coefficients of DCT-Transformed Images

    Authors: Shujun Li, Junaid Jameel Ahmad, Dietmar Saupe, C. -C. Jay Kuo

    Abstract: Motivated by the work of Uehara et al. [1], an improved method to recover DC coefficients from AC coefficients of DCT-transformed images is investigated in this work, which finds applications in cryptanalysis of selective multimedia encryption. The proposed under/over-flow rate minimization (FRM) method employs an optimization process to get a statistically more accurate estimation of unknown DC c… ▽ More

    Submitted 21 June, 2010; v1 submitted 8 February, 2010; originally announced February 2010.

    Comments: 6 pages, 6 figures, ICIP 2010

    ACM Class: I.4.2; E.3

    Journal ref: Proceedings of 2010 17th IEEE International Conference on Image Processing (ICIP 2010), pages 2085-2088, IEEE, 2010

  44. arXiv:0907.0404  [pdf

    cs.SE

    Agent based Model for providing optimized, synchronized and failure free execution of workflow process

    Authors: Sohail Safdar, Jamil Ahmad, Shaftab Ahmed, M. Tayyab Asghar, Saqib Saeed

    Abstract: The main objective of this paper is to provide an optimized solution and algorithm for the execution of a workflow process by ensuring the data consistency, correctness, completeness among various tasks involved. The solution proposed provides a synchronized and failure free flow of execution among various tasks involved in a workflow process. A synchronizing agent is bound at a very low level,… ▽ More

    Submitted 2 July, 2009; originally announced July 2009.

    Comments: This paper was published in the proceedings of 4th International Conference on New Exploratory Technology (NEXT 2007) Seoul, Korea 25-27 October 2007