Shabir A. Parah

ORCID: 0000-0001-5983-0912
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Steganography and Watermarking Techniques
  • Chaos-based Image/Signal Encryption
  • Digital Media Forensic Detection
  • Advanced Data Compression Techniques
  • Advanced Wireless Communication Techniques
  • Cellular Automata and Applications
  • Wireless Communication Networks Research
  • Advanced MIMO Systems Optimization
  • PAPR reduction in OFDM
  • Image and Signal Denoising Methods
  • Biometric Identification and Security
  • Cryptography and Data Security
  • Antenna Design and Analysis
  • Cryptographic Implementations and Security
  • Cooperative Communication and Network Coding
  • Image Enhancement Techniques
  • Microwave Engineering and Waveguides
  • Graphene research and applications
  • COVID-19 diagnosis using AI
  • Millimeter-Wave Propagation and Modeling
  • Full-Duplex Wireless Communications
  • Advanced Neural Network Applications
  • ECG Monitoring and Analysis
  • Advanced Image Fusion Techniques
  • Advanced Wireless Network Optimization

University of Kashmir
2015-2024

This paper presents a chaotic encryption-based blind digital image watermarking technique applicable to both grayscale and color images. Discrete cosine transform (DCT) is used before embedding the watermark in host image. The divided into 8 × nonoverlapping blocks prior DCT application, bit embedded by modifying difference between coefficients of adjacent blocks. Arnold addition encryption add double-layer security watermark. Three different variants proposed algorithm have been tested...

10.1109/access.2018.2808172 article EN cc-by-nc-nd IEEE Access 2018-01-01

Internet of Medical Things (IoMT)-driven smart health and emotional care is revolutionizing the healthcare industry by embracing several technologies related to multimodal physiological data collection, communication, intelligent automation, efficient manufacturing. The authentication secure exchange electronic records (EHRs), comprising patient collected using wearable sensors laboratory investigations, paramount importance. In this article, we present a novel high payload reversible EHR...

10.1109/jiot.2020.3038009 article EN IEEE Internet of Things Journal 2020-11-13

Abstract With the advent of state art nature-inspired pure attention based models i.e. transformers, and their success in natural language processing (NLP), extension to machine vision (MV) tasks was inevitable much felt. Subsequently, transformers (ViTs) were introduced which are giving quite a challenge established deep learning techniques. However, models/architectures like require huge data, large training times computational resources. Some recent works suggest that combinations these...

10.21203/rs.3.rs-510910/v1 preprint EN cc-by Research Square (Research Square) 2021-06-04

10.1007/s11042-023-15396-9 article EN Multimedia Tools and Applications 2023-05-05

The image data received through various sensors are of significant importance in Industry 4.0. Unfortunately, these highly vulnerable to malicious attacks during its transit the destination. Although use pervasive edge computing (PEC) with Internet Things (IoT) has solved issues, such as latency, proximity, and real-time processing, but security authentication between nodes is still a concern PEC-based industrial-IoT scenarios. In this article, we present "DWFCAT," dual watermarking...

10.1109/tii.2020.3028612 article EN IEEE Transactions on Industrial Informatics 2020-10-06
Coming Soon ...