This page has only limited features, please log in for full access.

Unclaimed
Shabir A. Parah
Post Graduate Department of Electronics and Instrumentation Technology, University of Kashmir, Srinagar, India

Basic Info

Basic Info is private.

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

The user biography is not available.
Following
Followers
Co Authors
The list of users this user is following is empty.
Following: 0 users

Feed

Article
Published: 15 July 2021 in Multimedia Tools and Applications
Reads 0
Downloads 0

With the prodigious headway of the Internet of Things (IoT), cloud computing, Artificial Intelligence (AI), and big data, smart healthcare is expected to provide potential and competent healthcare services. Smart healthcare is changing the traditional healthcare system by making it more convenient, more expedient, more effective, and more personalized. The rampant health sector data breaches worldwide, however, testify to the need of ensuring the integrity and authenticity of data shared over insecure networks. In this paper, a secure self-embedding fragile watermarking scheme capable of authenticating the medical images and precisely localizing the tampered regions is presented. Two watermarks generated from the cover image called authentication watermark and localization watermark, are used for authentication and localization of the tampered region at the receiver. For watermark generation, the cover image is divided into 4 × 4 non-overlapping blocks. Each block is permuted using chaotic encryption before the watermark generation. The authentication watermark is a function of the 4-Most Significant Bits (MSBs) of each pixel of a block. Deoxyribonucleic Acid (DNA) encoding is used to ensure the security of the authentication watermark before its embedding. The localization watermark utilizes the arithmetic mean of a selected block and the Maximum Pixel Intensity (MPI) in that block. The DNA arithmetic is applied to generate the final authentication of watermark data. The tamper detection and localization results obtained for the proposed work are found to perform better compared to the state-of-art techniques. The proposed algorithm maintains better visual quality despite higher embedding capacity as indicated by an average Peak Signal to Noise (PSNR) value of 51.94 dB for an embedding capacity of 262,144 bits. The average value for the Structural Similarity Index Metric (SSIM) for the proposed scheme is found to be 0.9962 which is higher when compared to the techniques under comparison. The average False Positive Rate (FPR) for the proposed algorithm is found to be 3.9916 for tampering rates varied from 5 to 50%. The scheme outperforms the various state-of-the-art techniques making it an efficient candidate for tamper detection and localization in smart health applications.

ACS Style

Solihah Gull; Romany F. Mansour; Nojood O. Aljehane; Shabir A. Parah. A self-embedding technique for tamper detection and localization of medical images for smart-health. Multimedia Tools and Applications 2021, 80, 29939 -29964.

AMA Style

Solihah Gull, Romany F. Mansour, Nojood O. Aljehane, Shabir A. Parah. A self-embedding technique for tamper detection and localization of medical images for smart-health. Multimedia Tools and Applications. 2021; 80 (19):29939-29964.

Chicago/Turabian Style

Solihah Gull; Romany F. Mansour; Nojood O. Aljehane; Shabir A. Parah. 2021. "A self-embedding technique for tamper detection and localization of medical images for smart-health." Multimedia Tools and Applications 80, no. 19: 29939-29964.

Journal article
Published: 18 May 2021 in IEEE Transactions on Nanotechnology
Reads 0
Downloads 0

Silicene has attracted the research interest due to its excellent electronic and spin properties. Furthermore, the CrO2 half metal, due to its high Curie temperature and high spin polarization is well suited for electrodes. In this work, we present a high-performance magnetic tunnel junction device consisting of CrO2 electrodes and Silicene as a scattering region. The device has been developed in a sub-10 nm regime, hence supports high integration density. We have used first principles-calculations in combination with non-equilibrium Greens function to calculate the bias dependent spin transport properties (I-V characteristics and transmission spectrum) of the modeled device. The device shows large tunnel magnetoresistance of 640%, depicting the potential application of the proposed device. The spin-dependent transmission spectrum, band structure, semi-conductor theory has been discussed to explain the origin of such excellent spin-dependent transport characteristics. We have developed and demonstrated an efficient method for MRAM-read/write operation using the proposed device. Furthermore, a universal logic- NAND gate, and a half adder have been realized from the proposed device to demonstrate its potential

ACS Style

Muzaffar Gani; Khurshed Ahmad Shah; Shabir A. Parah. Realization of a Sub 10-nm Silicene Magnetic Tunnel Junction and Its Application for Magnetic Random Access Memory and Digital Logic. IEEE Transactions on Nanotechnology 2021, 20, 466 -473.

AMA Style

Muzaffar Gani, Khurshed Ahmad Shah, Shabir A. Parah. Realization of a Sub 10-nm Silicene Magnetic Tunnel Junction and Its Application for Magnetic Random Access Memory and Digital Logic. IEEE Transactions on Nanotechnology. 2021; 20 (99):466-473.

Chicago/Turabian Style

Muzaffar Gani; Khurshed Ahmad Shah; Shabir A. Parah. 2021. "Realization of a Sub 10-nm Silicene Magnetic Tunnel Junction and Its Application for Magnetic Random Access Memory and Digital Logic." IEEE Transactions on Nanotechnology 20, no. 99: 466-473.

Journal article
Published: 16 March 2021 in Future Generation Computer Systems
Reads 0
Downloads 0

Cyber–physical Systems (CPS) have revolutionized the industry by utilizing the Internet of Things (IoT) for interconnecting various system components. IoT plays a significant role in the development of the smart system paradigm by building a link between physical components with the virtual world for improving smart services and quality of life. It significantly improves people’s activities, be it their personalized health care, living, or the way they monitor control, and organize the businesses. However, data streaming/communication over an open IoT environment creates several security issues that need to be taken care of, for transferring data securely. This paper presents an efficient information embedding solution for ensuring data security in a cyber–physicalnetwork. In this work, a new efficient edge detector called CLoG, (based on Canny and Laplacian of Gaussian detectors) has been developed and is used for the detection of edge areas in digital images. The secret information has been embedded in detected edges. The proposed detector finds finer edge details compared to state-of-art, making it possible to hide more information in a cover image. This, in turn, reduces the number of cover images required to transmit secret data and as such fulfills the requirements of resource-constrained platforms like IoT. Experimental results show that the proposed scheme is capable of providing high-quality stego-images with an average peak signal-to-noise ratio (PSNR) of 48.12 dB for a payload of 2 bits per pixel (bpp) payload. Further, the scheme has been analyzed for its efficacy in terms of histogram analysis, normalized cross-correlation (NCC), and other objective parameters. Besides, we show that the proposed scheme supports blind extraction, has less computational complexity, and is suitable for IoT based systems.

ACS Style

Aiman Jan; Shabir A. Parah; Bilal A. Malik; Mamoon Rashid. Secure data transmission in IoTs based on CLoG edge detection. Future Generation Computer Systems 2021, 121, 59 -73.

AMA Style

Aiman Jan, Shabir A. Parah, Bilal A. Malik, Mamoon Rashid. Secure data transmission in IoTs based on CLoG edge detection. Future Generation Computer Systems. 2021; 121 ():59-73.

Chicago/Turabian Style

Aiman Jan; Shabir A. Parah; Bilal A. Malik; Mamoon Rashid. 2021. "Secure data transmission in IoTs based on CLoG edge detection." Future Generation Computer Systems 121, no. : 59-73.

Conference paper
Published: 13 January 2021 in Lecture Notes in Electrical Engineering
Reads 0
Downloads 0

In this paper, we have proposed a watermarking system that is based on the spatial domain and is blind and robust in nature. This scheme is developed to withstand most of the image processing attacks. The watermark has been embedded in the cover image by modification of the DC coefficients calculated in the spatial domain. This method directly calculates DC coefficients in the spatial domain. The values of pixels can be changed/modified in the spatial domain in accordance with available watermark information. Since we have avoided the time-consuming transform operation, i.e., Discrete Cosine Transform, the computational efficiency is very high. For embedding a watermark bit, a particular image is disintegrated into 8 × 8 blocks, followed by further division of each block into two 4 × 4 blocks. After calculation of the DC coefficient of each 4 × 4 block, the watermark bit is embedded by modifying the DC values such that the DC coefficient of one block becomes greater than the other. The output results prove our proposed technique is highly robust to commonly occurring signal processing attacks. Experimental results obtained against numerous signal processing attacks are represented in terms of quality measuring parameters like PSNR, SSIM, and BER to check the efficiency and execution of our scheme.

ACS Style

Ishrat Qureshi; Shabir A. Parah; Nazir A. Lone; Nasir Hurrah; G. J. Qureshi. Realization of a Robust Watermarking System in Spatial Domain. Lecture Notes in Electrical Engineering 2021, 369 -379.

AMA Style

Ishrat Qureshi, Shabir A. Parah, Nazir A. Lone, Nasir Hurrah, G. J. Qureshi. Realization of a Robust Watermarking System in Spatial Domain. Lecture Notes in Electrical Engineering. 2021; ():369-379.

Chicago/Turabian Style

Ishrat Qureshi; Shabir A. Parah; Nazir A. Lone; Nasir Hurrah; G. J. Qureshi. 2021. "Realization of a Robust Watermarking System in Spatial Domain." Lecture Notes in Electrical Engineering , no. : 369-379.

Conference paper
Published: 13 January 2021 in Lecture Notes in Electrical Engineering
Reads 0
Downloads 0

The half metal (CrO2) ferromagnet has attracted immense research interest because of its large Curie temperature of 390 K and 100% spin polarization. Silicene a two-dimensional monolayer material shows outstanding magnetic and electronic properties. We have calculated the spin dependent transport of electron in our modeled device consisting of two CrO2 electrodes and out of plane silicene as scattering region. We have simulated the device in ATK software which uses non-equilibrium greens function and density function theory for calculation of the transport characteristics. The device is simulated to obtain IV curve and transmission spectrum. Furthermore, spin injection efficiency and tunneling magnetoresistance are calculated from the obtained transport characteristics. The transmission spectrum is found to be in agreement with the IV curve. The spin degree of freedom is expected to increase the speed, decrease power dissipation and add nonvolatility to devices. Also some basic logic functions have been realized from the modeled device.

ACS Style

Muzafar Gani; Khurshed A. Shah; Shabir A. Parah; Altaf A. Balki. CrO2 Half Metal-Based Magnetic Tunnel Junction and Its Application for Digital Computing. Lecture Notes in Electrical Engineering 2021, 563 -572.

AMA Style

Muzafar Gani, Khurshed A. Shah, Shabir A. Parah, Altaf A. Balki. CrO2 Half Metal-Based Magnetic Tunnel Junction and Its Application for Digital Computing. Lecture Notes in Electrical Engineering. 2021; ():563-572.

Chicago/Turabian Style

Muzafar Gani; Khurshed A. Shah; Shabir A. Parah; Altaf A. Balki. 2021. "CrO2 Half Metal-Based Magnetic Tunnel Junction and Its Application for Digital Computing." Lecture Notes in Electrical Engineering , no. : 563-572.

Chapter
Published: 12 January 2021 in Algorithms for Intelligent Systems
Reads 0
Downloads 0

Reversible data hiding (RDH) has become a significant branch of information embedding, as it allows error free recovery of the original media. Reversibility is the paramount requirement in fields like healthcare, forensics, defense and legal. Most of the work contributed in RDH using image as host has been carried out using gray images as host. The multiphase nature of color images makes them more convenient to high payload applications. This chapter presents RDH scheme for color images. The data has been embedded using various multi-bit substitution patterns used to obtain application specific parameters like PSNR and payload. A particular substitution pattern decides the number of bits embedded and the perceptual performance obtained. Multi-bit substitution pattern with bit placement pattern-9 (bpp-9) shows a highest imperceptibility of 52.4 dB and lowest capacity of 589,822 bits while as contrast is observed in bpp-27 with PSNR 19.17 dB and capacity of 1,769,470 bits. The scheme besides being reversible is capable of detecting any tamper caused due to various signal processing and geometric attacks. This has been ensured by embedding a fragile watermark interleaved with the embedding data and scattered throughout various phases of color image. Given the results obtained, it can be used for secure communication of critical data like patient records in smart-health.

ACS Style

Javaid A. Kaw; Shabir A. Parah; G. M. Bhat. Information Hiding in Color Images Utilizing Multi-bit Substitution Patterns. Algorithms for Intelligent Systems 2021, 131 -155.

AMA Style

Javaid A. Kaw, Shabir A. Parah, G. M. Bhat. Information Hiding in Color Images Utilizing Multi-bit Substitution Patterns. Algorithms for Intelligent Systems. 2021; ():131-155.

Chicago/Turabian Style

Javaid A. Kaw; Shabir A. Parah; G. M. Bhat. 2021. "Information Hiding in Color Images Utilizing Multi-bit Substitution Patterns." Algorithms for Intelligent Systems , no. : 131-155.

Chapter
Published: 12 January 2021 in Algorithms for Intelligent Systems
Reads 0
Downloads 0

In the present era, the progression of the Internet has given a huge impetus to the sharing of multimedia over various communication channels. But the data once distributed over the communication network is prone to several security risks. To handle these security risks, various encryption algorithms have been proposed to date. In this chapter, a new color image encryption algorithm is presented using DNA sequence substitution and chaos. The work suggested in this chapter is aimed at strengthening the encryption to improve the security of the system. A DNA sequence obtained from an RGB image is encrypted using a random DNA sequence. This encryption is performed using DNA substitution. Further, this encrypted sequence is doubly secured by performing the XOR operation of this sequence with a sequence generated using chaos. The result of this conversion is an encrypted RGB image. Thus, the encrypted image is doubly secured using the proposed algorithm. The evaluation of the algorithm presented in this chapter shows strong key sensitivity along with large key space and can be seen from the experimental results. The results obtained for the proposed method stand testimony that the proposed technique shows high resistance to statistical attacks and thus can prove to be a good candidate for image encryption.

ACS Style

Nimara Habib; Solihah Gull; Shabir A. Parah. Image Encryption Based on DNA Substitution and Chaotic Theory. Algorithms for Intelligent Systems 2021, 25 -44.

AMA Style

Nimara Habib, Solihah Gull, Shabir A. Parah. Image Encryption Based on DNA Substitution and Chaotic Theory. Algorithms for Intelligent Systems. 2021; ():25-44.

Chicago/Turabian Style

Nimara Habib; Solihah Gull; Shabir A. Parah. 2021. "Image Encryption Based on DNA Substitution and Chaotic Theory." Algorithms for Intelligent Systems , no. : 25-44.

Chapter
Published: 12 January 2021 in Algorithms for Intelligent Systems
Reads 0
Downloads 0

Usage of the Internet has boomed since its inception. This has given rise to potent tools that can breach the privacy and security of the data over the insecure transmission lines. In such a situation, data embedding has evolved as an efficient technology to cater to the problems of security and privacy. A data embedding algorithm is said to be efficient and secure if it provides high payload while maintaining imperceptivity. In this chapter, a high capacity data embedding technique based on modular arithmetic has been proposed and analyzed using color images. The cover image is divided into its constituent planes, and data is embedded into each plane using modular operation. The experimentation of the proposed technique has been done on several color images, and the results have been evaluated in terms of various quality indices including peak signal-to-noise ratio (PSNR), mean square error (MSE), structural content (SC), and normalized absolute error (NAE). The results reveal that the proposed work provides high imperceptivity for a fairly high payload. Histogram analysis of the scheme shows the effectiveness of the proposed scheme to statistical attack. The invariance between the histogram of the original image and stego image is the testimony of its resilience to statistical attacks. It is pertinent to mention here that the proposed data hiding system yields stego images with an average PSNR of around 46 dB for the payload of two bits per pixel (2bpp).

ACS Style

Bilal Ahmad; Asra Kamili; Solihah Gull; Shabir A. Parah. Data Embedding in Color Images: A Secure Data Communication Framework Based on Modular Arithmetic. Algorithms for Intelligent Systems 2021, 157 -176.

AMA Style

Bilal Ahmad, Asra Kamili, Solihah Gull, Shabir A. Parah. Data Embedding in Color Images: A Secure Data Communication Framework Based on Modular Arithmetic. Algorithms for Intelligent Systems. 2021; ():157-176.

Chicago/Turabian Style

Bilal Ahmad; Asra Kamili; Solihah Gull; Shabir A. Parah. 2021. "Data Embedding in Color Images: A Secure Data Communication Framework Based on Modular Arithmetic." Algorithms for Intelligent Systems , no. : 157-176.

Chapter
Published: 12 January 2021 in Algorithms for Intelligent Systems
Reads 0
Downloads 0

Ascension of the Internet has made data security as one of the main issues of research. For secure communication, data hiding techniques applied to deoxyribonucleic acid (DNA) sequences can be employed. DNA sequence consists of nucleotide bases called Adenine (A), Guanine (G), Thymine (T), and Cytosine (C). In the data hiding approach, these DNA bases are used as information carriers for enhanced security. In this chapter, two approaches for reversible data hiding and encryption are explained. In the first method, the DNA substitution algorithm is used to hide a message into a reference DNA sequence retrieved from a DNA database. The message M is embedded into cover DNA with the help of a substitution table to get a Stego-DNA sequence. In the second approach, called data insertion, a private key is used to select a particular DNA sequence from the database to embed the secret message. It is shown that DNA cryptography provides many advantages for the secure transmission of data like increased storage capacity, large-scale computation, simple encoding, and randomness. Furthermore, data hiding methods employing DNA sequence substitution and insertion are easy to implement and very difficult to detect. These methods can be employed for secure data storage, transmission with the help of DNA sequences.

ACS Style

Shah Haris Nabi; Parsa Sarosh; Shabir A. Parah; G. Mohiuddin Bhat. Information Embedding Using DNA Sequences for Covert Communication. Algorithms for Intelligent Systems 2021, 111 -129.

AMA Style

Shah Haris Nabi, Parsa Sarosh, Shabir A. Parah, G. Mohiuddin Bhat. Information Embedding Using DNA Sequences for Covert Communication. Algorithms for Intelligent Systems. 2021; ():111-129.

Chicago/Turabian Style

Shah Haris Nabi; Parsa Sarosh; Shabir A. Parah; G. Mohiuddin Bhat. 2021. "Information Embedding Using DNA Sequences for Covert Communication." Algorithms for Intelligent Systems , no. : 111-129.

Journal article
Published: 04 January 2021 in Sensors
Reads 0
Downloads 0

Health 4.0 is an extension of the Industry standard 4.0 which is aimed at the virtualization of health-care services. It employs core technologies and services for integrated management of electronic health records (EHRs), captured through various sensors. The EHR is processed and transmitted to distant experts for better diagnosis and improved healthcare delivery. However, for the successful implementation of Heath 4.0 many challenges do exist. One of the critical issues that needs attention is the security of EHRs in smart health systems. In this work, we have developed a new interpolation scheme capable of providing better quality cover media and supporting reversible EHR embedding. The scheme provides a double layer of security to the EHR by firstly using hyperchaos to encrypt the EHR. The encrypted EHR is reversibly embedded in the cover images produced by the proposed interpolation scheme. The proposed interpolation module has been found to provide better quality interpolated images. The proposed system provides an average peak signal to noise ratio (PSNR) of 52.38 dB for a high payload of 0.75 bits per pixel. In addition to embedding EHR, a fragile watermark (WM) is also encrypted using the hyperchaos embedded into the cover image for tamper detection and authentication of the received EHR. Experimental investigations reveal that our scheme provides improved performance for high contrast medical images (MI) when compared to various techniques for evaluation parameters like imperceptibility, reversibility, payload, and computational complexity. Given the attributes of the scheme, it can be used for enhancing the security of EHR in health 4.0.

ACS Style

Hanan Aljuaid; Shabir A. Parah. Secure Patient Data Transfer Using Information Embedding and Hyperchaos. Sensors 2021, 21, 282 .

AMA Style

Hanan Aljuaid, Shabir A. Parah. Secure Patient Data Transfer Using Information Embedding and Hyperchaos. Sensors. 2021; 21 (1):282.

Chicago/Turabian Style

Hanan Aljuaid; Shabir A. Parah. 2021. "Secure Patient Data Transfer Using Information Embedding and Hyperchaos." Sensors 21, no. 1: 282.

Journal article
Published: 06 October 2020 in IEEE Transactions on Industrial Informatics
Reads 0
Downloads 0
ACS Style

Asra Kamili; Nasir N. Hurrah; Shabir A. Parah; G. M. Bhat; Khan Muhammad. DWFCAT: Dual Watermarking Framework for Industrial Image Authentication and Tamper Localization. IEEE Transactions on Industrial Informatics 2020, 17, 5108 -5117.

AMA Style

Asra Kamili, Nasir N. Hurrah, Shabir A. Parah, G. M. Bhat, Khan Muhammad. DWFCAT: Dual Watermarking Framework for Industrial Image Authentication and Tamper Localization. IEEE Transactions on Industrial Informatics. 2020; 17 (7):5108-5117.

Chicago/Turabian Style

Asra Kamili; Nasir N. Hurrah; Shabir A. Parah; G. M. Bhat; Khan Muhammad. 2020. "DWFCAT: Dual Watermarking Framework for Industrial Image Authentication and Tamper Localization." IEEE Transactions on Industrial Informatics 17, no. 7: 5108-5117.

Article
Published: 10 September 2020 in Multimedia Tools and Applications
Reads 0
Downloads 0

This paper presents an efficient data hiding technique capable of providing improved visual quality of watermarked images, besides having the ability to detect the tamper, if any. It is a spatial domain approach in which major emphasis is on improving the visual quality rather than increasing the PSNR or the embedding capacity. The medical images have been divided into Region of Interest (ROI) and Non-Region of Interest (NROI). Bringing out details that lie within the low dynamic range is very important in medical images for effective diagnosis. ROI being diagnostically critical region is enhanced using contrast stretching and subsequently, data is reversibly embedded into the peak bins of ROI. Only those peak bins are employed for reversible data embedding that have an adjacent empty bin to overcome the problem of overflow and underflow. In NROI, the uniform intensity and redundant information region, Least Significant Bit (LSB) embedding is employed for increasing the payload. For tamper detection, a fragile watermark has been embedded in the ROI. To evaluate the scheme various parameters like peak signal to noise ratio (PSNR), No-Reference Quality Metric for contrast-distorted images (NR-CDIQA) and Structural Similarity Index Matrix (SSIM) have been calculated. The experimental results show a remarkable increase in visual quality compared to state-of-art.

ACS Style

Shifa Showkat; Shabir A. Parah; Solihah Gull. Embedding in medical images with contrast enhancement and tamper detection capability. Multimedia Tools and Applications 2020, 80, 2009 -2030.

AMA Style

Shifa Showkat, Shabir A. Parah, Solihah Gull. Embedding in medical images with contrast enhancement and tamper detection capability. Multimedia Tools and Applications. 2020; 80 (2):2009-2030.

Chicago/Turabian Style

Shifa Showkat; Shabir A. Parah; Solihah Gull. 2020. "Embedding in medical images with contrast enhancement and tamper detection capability." Multimedia Tools and Applications 80, no. 2: 2009-2030.

Journal article
Published: 09 September 2020 in IEEE Transactions on Industrial Informatics
Reads 0
Downloads 0

Internet and other online media networks have emerged as the most important platforms for the sharing of digital information. However, the readily available editing tools provide an easy way for adversaries to manipulate the data and affect decision-making in various industrial applications. This malicious modification of the content, which has reduced the credibility of information delivery, is a commonly prevalent issue and hence needs serious attention. It also initiates an extreme need for industrial cyber-physical systems (ICPS), which can compare the transferred and received images for correct orientation to ensure that it conveys meaningful information and assists in correct decision-making in industrial automation. In this paper, we propose "INDFORG", which employs a novel and highly accurate automatic rotation angle detection and correction algorithm (ARADC) for intelligent detection of forgery in industrial images. ARADC uses basic geometrical concepts such as Pythagorean Theorem and intensity correlation computation and works without any digital signature or watermark. It performs accurately even under several simultaneous signal-processing manipulations. The proposed framework detects the rotation angles blindly with a 99% accuracy rate for rotation up to +-89 degrees. Experimental results prove that the proposed algorithm is highly efficient compared to various state-of-the-art approaches and is a preferred ICPS for trustworthy media delivery in industrial automation.

ACS Style

Nasir N. Hurrah; Nazir A. Loan; Shabir Ahamd Parah; Javaid A. Sheikh; Khan Muhammad; Antonio Roberto L. de Macedo; Victor Hugo C. de Albuquerque. INDFORG: Industrial Forgery Detection Using Automatic Rotation Angle Detection and Correction. IEEE Transactions on Industrial Informatics 2020, 17, 3630 -3639.

AMA Style

Nasir N. Hurrah, Nazir A. Loan, Shabir Ahamd Parah, Javaid A. Sheikh, Khan Muhammad, Antonio Roberto L. de Macedo, Victor Hugo C. de Albuquerque. INDFORG: Industrial Forgery Detection Using Automatic Rotation Angle Detection and Correction. IEEE Transactions on Industrial Informatics. 2020; 17 (5):3630-3639.

Chicago/Turabian Style

Nasir N. Hurrah; Nazir A. Loan; Shabir Ahamd Parah; Javaid A. Sheikh; Khan Muhammad; Antonio Roberto L. de Macedo; Victor Hugo C. de Albuquerque. 2020. "INDFORG: Industrial Forgery Detection Using Automatic Rotation Angle Detection and Correction." IEEE Transactions on Industrial Informatics 17, no. 5: 3630-3639.

Article
Published: 03 September 2020 in Multimedia Tools and Applications
Reads 0
Downloads 0

Cryptography is the process by which a readable message is converted into cipher-text unintelligible to an eavesdropper. With the advent of the internet, improved network infrastructures, and modern applications, electronic-based systems came into existence. Subsequently, the need for security of the personalized information was discerned. The purpose of the use of cryptography is to provide security, confidentiality, authenticity, and integrity of the data exchanged. Many cryptographic techniques which include the symmetric key and asymmetric key-based encryption techniques are generally employed for the above-mentioned purposes. However, it is seen that in cryptographic solutions key management is an important issue. In this review, we discuss the secret-sharing based cryptographic techniques that are inherently different from the conventional cryptographic systems. Since images constitute a large proportion of the multimedia transmitted, the concept of secret sharing is being applied to images as well. In this review, Image Secret Sharing techniques have been discussed in detail. Secret sharing or secret splitting is a method by which a secret is divided among a set of participants. Each participant receives a part or share of the secret. During the secret recovery phase, a subset of a predefined number of participants can collaborate and reveal the secret information. This work attempts to categorize and classify various available secret sharing schemes, to gather all the state-of-the-art knowledge on a single platform for research.

ACS Style

Parsa Sarosh; Shabir A. Parah; G. M. Bhat. Utilization of secret sharing technology for secure communication: a state-of-the-art review. Multimedia Tools and Applications 2020, 80, 517 -541.

AMA Style

Parsa Sarosh, Shabir A. Parah, G. M. Bhat. Utilization of secret sharing technology for secure communication: a state-of-the-art review. Multimedia Tools and Applications. 2020; 80 (1):517-541.

Chicago/Turabian Style

Parsa Sarosh; Shabir A. Parah; G. M. Bhat. 2020. "Utilization of secret sharing technology for secure communication: a state-of-the-art review." Multimedia Tools and Applications 80, no. 1: 517-541.

Special issue paper
Published: 07 August 2020 in Journal of Real-Time Image Processing
Reads 0
Downloads 0

In this era of the information age with digitalization, the transmission of sensitive real-time image information over insecure channels is highly-likely to be accessed or even attacked by an adversary. To prevent such unauthorized access, cryptography is being used to convert sensitive information in real-time images into unintelligible data. Most of the time, schemes are proposed with a high level of security. However, the challenge always remains the slower speeds due to their high complexity which makes them unusable in the applications of real-time images. In this paper, an efficient image encryption algorithm has been developed and tested for real-time images. The proposed scheme makes use of encryption with an efficient permutation technique based on a modular logistic map to bring down the size of the chaotic value vector, required to permute real-time image. We show that an efficient permutation is obtained using only \(\sqrt{N}\) chaotic numbers for a square image with 3N pixels (N Pixels in each color bit plane). The algorithm makes use of a 192-bit key; divided into smaller blocks and each block selected chaotically to diffuse the pixel using multiple XOR operations. The experimental analysis reveals that the proposed algorithm is immune to various statistical and differential attacks such as entropy, histogram analysis, spectral characteristic analysis, etc. A comparison of the proposed scheme with some state-of-the-art techniques show that it performs better, and as such, can be utilized for efficient real-time image encryption.

ACS Style

Asif A. Shah; Shabir A. Parah; Mamoon Rashid; Mohamed Elhoseny. Efficient image encryption scheme based on generalized logistic map for real time image processing. Journal of Real-Time Image Processing 2020, 17, 1 -13.

AMA Style

Asif A. Shah, Shabir A. Parah, Mamoon Rashid, Mohamed Elhoseny. Efficient image encryption scheme based on generalized logistic map for real time image processing. Journal of Real-Time Image Processing. 2020; 17 (6):1-13.

Chicago/Turabian Style

Asif A. Shah; Shabir A. Parah; Mamoon Rashid; Mohamed Elhoseny. 2020. "Efficient image encryption scheme based on generalized logistic map for real time image processing." Journal of Real-Time Image Processing 17, no. 6: 1-13.

Article
Published: 09 June 2020 in Multimedia Tools and Applications
Reads 0
Downloads 0

Electronic Health Record, which comprises of medical imagery, patient history, prescription and clinical observations is a highly sensitive data. This data is not generally sent over the network in its original form as it is prone to numerous security related issues. Generally, some encryption algorithms are applied on the data (medical image) before transmission over the network. However, resource constrained devices cannot perform complex encryption sand the process of encryption is entrusted to some third party like Cloud. But this third-party encryption requires the privacy of data to be preserved. After ensuring the privacy and performing third party encryption, the encrypted data can be securely transmitted over the network. This concept is used in the proposed work and a secure data transmission method is implemented. We have used two encryption techniques viz, chaotic encryption and bitplane encryption on the medical image which gives extra security to the image. While using the facilities of cloud for encryption (chaotic) the proposed method ensures that the cloud administrators get no hint about the information present in the data that is sent to them. In addition, the authenticity of the medical images is ensured and the encryption time obtained is small (must criterion for real time applications). The objectives of our work are verified by experimentations that are carried out on various medical images. The experimental results and theoretical analysis confirm the effectiveness of proposed work in terms of encryption time, security and authenticity.

ACS Style

Ifrah Afzal; Shabir A. Parah; Nasir N Hurrah; O.Y. Song. Secure patient data transmission on resource constrained platform. Multimedia Tools and Applications 2020, 1 -26.

AMA Style

Ifrah Afzal, Shabir A. Parah, Nasir N Hurrah, O.Y. Song. Secure patient data transmission on resource constrained platform. Multimedia Tools and Applications. 2020; ():1-26.

Chicago/Turabian Style

Ifrah Afzal; Shabir A. Parah; Nasir N Hurrah; O.Y. Song. 2020. "Secure patient data transmission on resource constrained platform." Multimedia Tools and Applications , no. : 1-26.

Article
Published: 06 May 2020 in Multimedia Tools and Applications
Reads 0
Downloads 0

In e-healthcare applications integrity of the received information is of prime importance for ensuring the accurate diagnosis. The integrity of electronic medical record (EMR) is possible only when the medical images and other relevant data received are tamper free. Reversibility of medical images after certain degree of processing is always a desired property in medical images as it aids proper diagnosis. This paper proposes a novel reversible image authentication (RIA) scheme for tamper detection and authentication of medical images. In the proposed RIA scheme, the medical image is divided into 4 × 4 blocks followed by embedding fragile watermark bit (for authentication) in each of these blocks. Along with authentication, the localization of tamper is achieved accurately by using LSB embedding along with mean modification approach. The security of the watermark has been enhanced with Arnold cat map, Gray coding and AES-128 encryption. The experimental results show that the scheme offers better fragility against all intentional/unintentional signal processing attacks. The comparison results between proposed RIA scheme and similar state-of-the-art schemes show superiority of our scheme in terms of imperceptivity, fragility and tamper localization. For a payload of 16 kb, the average PSNR achieved for 50 Gray scale images of size 512 × 512 is more than 47 dB. In addition, the scheme offers very less complexity; the embedding and extraction times are around 0.6 s and 0.5 s respectively. Given the features of proposed scheme it could serve as a potential candidate for transfer of EMR in an e-healthcare system.

ACS Style

Nasir Hurrah; Shabir A. Parah; Javaid A. Sheikh. Embedding in medical images: an efficient scheme for authentication and tamper localization. Multimedia Tools and Applications 2020, 79, 21441 -21470.

AMA Style

Nasir Hurrah, Shabir A. Parah, Javaid A. Sheikh. Embedding in medical images: an efficient scheme for authentication and tamper localization. Multimedia Tools and Applications. 2020; 79 (29-30):21441-21470.

Chicago/Turabian Style

Nasir Hurrah; Shabir A. Parah; Javaid A. Sheikh. 2020. "Embedding in medical images: an efficient scheme for authentication and tamper localization." Multimedia Tools and Applications 79, no. 29-30: 21441-21470.

Article
Published: 23 January 2020 in Wireless Personal Communications
Reads 0
Downloads 0

Ultra high definition radio, low latency, high bandwidth, machine to machine communication and several emergence application like e-health, IOT etc. will be dominated by 5G in future networks. Therefore there is dire need of more capacity which in turn will demand more efficient spectrum sensing. In this paper we propose a new technique of FBMC spectrum sensing cognitive radio technique in future networks. The proposed technique provides programmability that allows dynamic and real time configuration of the operating channel. The simulation results have been verified in terms of various parameters and found satisfactory results.

ACS Style

Javaid A. Sheikh; Zaffer Iqbal Mir; Mehboob Ul Amin Mufti; Shabir Parah; G. Mohiuddin Bhat. A New Filter Bank Multicarrier (FBMC) Based Cognitive Radio for 5G Networks Using Optimization Techniques. Wireless Personal Communications 2020, 112, 1265 -1280.

AMA Style

Javaid A. Sheikh, Zaffer Iqbal Mir, Mehboob Ul Amin Mufti, Shabir Parah, G. Mohiuddin Bhat. A New Filter Bank Multicarrier (FBMC) Based Cognitive Radio for 5G Networks Using Optimization Techniques. Wireless Personal Communications. 2020; 112 (2):1265-1280.

Chicago/Turabian Style

Javaid A. Sheikh; Zaffer Iqbal Mir; Mehboob Ul Amin Mufti; Shabir Parah; G. Mohiuddin Bhat. 2020. "A New Filter Bank Multicarrier (FBMC) Based Cognitive Radio for 5G Networks Using Optimization Techniques." Wireless Personal Communications 112, no. 2: 1265-1280.

Short communication
Published: 28 November 2019 in Physics Letters A
Reads 0
Downloads 0

In this study we carried out first principle calculations for spin dependent electronic transport in our proposed spintronic device consisting of graphene nanoribbon as scattering region with cobalt electrodes and magnesium oxide as tunneling barrier. The I–V Characteristics are calculated by using Non-Equilibrium Green's Function formalism in combination with Semi-Empirical (SE) Extended Huckel Theory (EHT) using Atomistic Tool Kit software at room temperature. The high value of GMR (Giant Magnetoresistance) is recommended for spintronic devices. The results reveal that the device shows a very high GMR ratio of 5.16×104%. The device also shows very low off state current, therefore negligible off state power consumption. The investigation of spin dependent non equilibrium transport is done by examining bias dependent transmission coefficients. Furthermore, some basic logic gates, like NOT, AND and NOR have been realized from the modeled device. The device may also find applications in data storage, magnetic field sensors etc.

ACS Style

Muzafar Gani; Khurshed A. Shah; Shabir A. Parah; Prabhakar Misra. Room temperature high Giant Magnetoresistance graphene based spin valve and its application for realization of logic gates. Physics Letters A 2019, 384, 126171 .

AMA Style

Muzafar Gani, Khurshed A. Shah, Shabir A. Parah, Prabhakar Misra. Room temperature high Giant Magnetoresistance graphene based spin valve and its application for realization of logic gates. Physics Letters A. 2019; 384 (7):126171.

Chicago/Turabian Style

Muzafar Gani; Khurshed A. Shah; Shabir A. Parah; Prabhakar Misra. 2019. "Room temperature high Giant Magnetoresistance graphene based spin valve and its application for realization of logic gates." Physics Letters A 384, no. 7: 126171.

Conference paper
Published: 01 November 2019 in 2019 Fifth International Conference on Image Information Processing (ICIIP)
Reads 0
Downloads 0

Reversible data hiding (RDH) technique allows embedding of data inside an image and later can be retrieved with the original host image after extraction. In this paper, a RDH technique using histogram bin shifting (HBS) for color images has been proposed. In the proposed technique the color image is separated into three planes and each plane is divided into four blocks and a secret data is embedded into all four blocks of all the planes of the color image by using reversible histogram bin shifting. The same algorithm has been implemented on both the color image components separately (YCbCr/RGB). The proposed scheme attains 69396 and 34478 average embedding capacity for YCbCr and RGB color image components with minimum image distortion.

ACS Style

Muzamil Hussan; Shabir Parah; Ghulam.J. Qurashi. Realization of a Reversible Data Hiding Framework using Histogram Bin Shifting for Color Images. 2019 Fifth International Conference on Image Information Processing (ICIIP) 2019, 221 -224.

AMA Style

Muzamil Hussan, Shabir Parah, Ghulam.J. Qurashi. Realization of a Reversible Data Hiding Framework using Histogram Bin Shifting for Color Images. 2019 Fifth International Conference on Image Information Processing (ICIIP). 2019; ():221-224.

Chicago/Turabian Style

Muzamil Hussan; Shabir Parah; Ghulam.J. Qurashi. 2019. "Realization of a Reversible Data Hiding Framework using Histogram Bin Shifting for Color Images." 2019 Fifth International Conference on Image Information Processing (ICIIP) , no. : 221-224.