Nasir N. Hurrah

ORCID: 0000-0003-3011-4255
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Steganography and Watermarking Techniques
  • Digital Media Forensic Detection
  • Chaos-based Image/Signal Encryption
  • Digital Filter Design and Implementation
  • Analog and Mixed-Signal Circuit Design
  • Industrial Vision Systems and Defect Detection
  • User Authentication and Security Systems
  • Internet Traffic Analysis and Secure E-voting
  • Advancements in PLL and VCO Technologies
  • Video Surveillance and Tracking Methods
  • Advanced Data and IoT Technologies
  • Digital Transformation in Industry
  • Image and Object Detection Techniques
  • Cybersecurity and Cyber Warfare Studies
  • Image Processing Techniques and Applications
  • Advanced MEMS and NEMS Technologies
  • IoT and Edge/Fog Computing
  • Blockchain Technology Applications and Security

Aligarh Muslim University
2022-2024

University of Kashmir
2017-2021

Shri Mata Vaishno Devi University
2015

This paper presents a chaotic encryption-based blind digital image watermarking technique applicable to both grayscale and color images. Discrete cosine transform (DCT) is used before embedding the watermark in host image. The divided into 8 × nonoverlapping blocks prior DCT application, bit embedded by modifying difference between coefficients of adjacent blocks. Arnold addition encryption add double-layer security watermark. Three different variants proposed algorithm have been tested...

10.1109/access.2018.2808172 article EN cc-by-nc-nd IEEE Access 2018-01-01

The image data received through various sensors are of significant importance in Industry 4.0. Unfortunately, these highly vulnerable to malicious attacks during its transit the destination. Although use pervasive edge computing (PEC) with Internet Things (IoT) has solved issues, such as latency, proximity, and real-time processing, but security authentication between nodes is still a concern PEC-based industrial-IoT scenarios. In this article, we present "DWFCAT," dual watermarking...

10.1109/tii.2020.3028612 article EN IEEE Transactions on Industrial Informatics 2020-10-06

Internet and other online media networks have emerged as the most important platforms for sharing of digital information. However, readily available editing tools provide an easy way adversaries to manipulate data affect decision-making in various industrial applications. This malicious modification content, which has reduced credibility information delivery, is a commonly prevalent issue hence needs serious attention. It also initiates extreme need cyber–physical systems (ICPS), can compare...

10.1109/tii.2020.3014158 article EN IEEE Transactions on Industrial Informatics 2020-09-09

This paper presents a high capacity steganographic technique based on the principle of image resizing and pixel permutation. Image is used either to extend or reduce dimensions an which can be done by predicting new intensities using interpolation simply replicating incremented/decremented seed values. Later has been adopted in our scheme generate cover for data hiding. A single original image, called as form 2×2 block image. lookup table generated corresponding possible combinations four...

10.1109/iciip.2017.8313751 article EN 2017-12-01

With the rapid developments in IC technology and signal processing oversampled Sigma Delta (ΣΔ) ADCs have become absolute choice among competent data converters due to their efficient architectures ease of implementation VLSI technology. Their efficiency lies schemes decrease area, reduce power consumption ways improve frequency response without putting any stress on design cost compatibility factor. They own issues which need be improved or optimized order run neck by for being compatible...

10.1109/raecs.2015.7453347 article EN 2015-12-01

This paper proposes an efficient watermarking scheme based on hybrid transform domain. The is blind, robust and secure. has been developed to withstand dual attacks which may be combination of signal processing geometric attacks. For achieving the said goals, a single watermark embedded in all three components (RGB) color image using new interblock differencing method discrete cosine (DCT) Discrete wavelet (DWT) used prior embedding order get LL sub-band from each components. principle...

10.1109/iciip.2017.8313677 article EN 2017-12-01

International Journal of Computer Sciences and Engineering (A UGC Approved indexed with DOI, ICI Approved, DPI Digital Library) is one the leading growing open access, peer-reviewed, monthly, scientific research journal for scientists, engineers, scholars, academicians, which gains a foothold in Asia opens to world, aims publish original, theoretical practical advances Science,Information Technology, (Software, Mechanical, Civil, Electronics & Electrical), all interdisciplinary streams...

10.26438/ijcse/v7i3.800806 article EN International Journal of Computer Sciences and Engineering 2019-03-31
Coming Soon ...