Umair Khadam

ORCID: 0000-0003-3991-0418
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Steganography and Watermarking Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Chaos-based Image/Signal Encryption
  • User Authentication and Security Systems
  • Digital Media Forensic Detection
  • Advanced Malware Detection Techniques
  • Blockchain Technology Applications and Security
  • IoT and Edge/Fog Computing
  • Face recognition and analysis
  • Digital Rights Management and Security
  • Energy Efficient Wireless Sensor Networks
  • Impact of AI and Big Data on Business and Society
  • Face and Expression Recognition
  • Retinal Imaging and Analysis
  • Smart Grid Security and Resilience
  • Network Security and Intrusion Detection
  • Imbalanced Data Classification Techniques
  • Security in Wireless Sensor Networks
  • Vehicle License Plate Recognition
  • Smart Systems and Machine Learning
  • Artificial Intelligence in Healthcare

Malmö University
2024

University of Azad Jammu and Kashmir
2021-2022

University of Engineering and Technology Taxila
2019-2021

In the current era, information security is on its top priority for all organizations. The individuals, government officials, and military with rapid development of Internet technologies like Things (IoT), big data, cloud computing facing data problems. As massive rate growth, it a challenging task researchers, that how to manage vast amount safely effectively while designing smart cities. It has been quite easy produce an illegal copy digital contents. verification content one major issues...

10.1109/access.2019.2916674 article EN cc-by-nc-nd IEEE Access 2019-01-01

In our daily life, Internet-of-Things (IoT) is everywhere and used in many more beneficial functionalities. It homes, hospitals, fire prevention, reporting controlling the environmental changes. Data security crucial requirement for IoT since number of recent technologies different domains increasing day by day. Various attempts have been made to cater user’s demands privacy. However, a huge risk privacy issues can arise among all those benefits. Digital document copyright protection are...

10.1155/2020/7105625 article EN Wireless Communications and Mobile Computing 2020-02-19

Information hiding has attracted the attention of researchers in recent years because digital contents are generated and share online through different communication channels. The verification original authorship is a crucial task. Digital watermarks used to provide copyright protection ownership solutions. However, text watermarking challenging job due limited research existing schemes like inter-word paragraph spacing, line word shift hide information, which not robust. If spaces removed...

10.1109/iwcmc.2019.8766644 article EN 2019-06-01

Internet of things (IoT) is an imminent technological platform to overcome social and economic challenges. IoT devices are connected through internet technology using lossy communication links. technologies such as Routing Protocol for low power networks (RPL), wireless personal area network (LoWPAN), the constrained application protocol (CoAP) CoAP/CoAPs comprises bandwidth limited resources. RPL security a big concern where number attacks may disrupt communication. The sinkhole one routing...

10.1109/iccit-144147971.2020.9213797 article EN 2020 International Conference on Computing and Information Technology (ICCIT-1441) 2020-09-09

Abstract Nowadays, Face recognition and emotion detection are the most pop- ular area of research. In past two decades, many applications related to facial emotions have been developed different methods used detect human emotions. The goal this research is i.e. happy, sad, disgust, anger, fear, neutral, or surprise. paper, we proposed Haar Cascade classi- fier for face detection. Haar-like features types, edge feature edges around object while line rectangle slanted object. technique...

10.21203/rs.3.rs-2048290/v1 preprint EN cc-by Research Square (Research Square) 2022-11-28

This paper presents a novel algorithm which is based on the Portable Document Format (PDF) document structure. The PDF page objects are utilized for watermarking. secret message compressing by using Huffman coding, then suitable of used hiding message. Since embedded watermark information stored in objects, so it will not affect content, as well format documents. experimental result shows that proposed robust with detection accuracy can be up to 97%. extracted high probability, illustrates...

10.1109/pacrim47961.2019.8985129 article EN 2019-08-01

Heart diseases are one of the major causes human deaths today. About 610000 beings expire annually in United States due to this fatal disease and condition is more severe underdeveloped countries lacking medical experts. Accurate detection heart a being can be helpful proper medication against lethal considerably reduce alarming death rate. Data mining machine learning techniques widely used for diagnosis these days. This research paper employs Ordinary Learning Method accurate using...

10.1109/icomet48670.2020.9074056 article EN 2020 3rd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET) 2020-01-01

In today's smart world, the privacy protection of data is an important issue. Data distributed, reproduced, and disclosed with extensive use communication technologies. Many non-traditional challenges arise rapid increase IoT devices for system design implementation. However, security are main issues in IoT. With advanced technologies, illegal copy content can easily be generated shared. Therefore, it crucial users to protect secure their data. said perspective, efficient third-generation...

10.1109/iotm.0001.2000010 article EN IEEE Internet of Things Magazine 2021-05-10
Coming Soon ...