Skip to main content

Showing 1–7 of 7 results for author: Jan, Z

Searching in archive cs. Search in all archives.
.
  1. arXiv:1601.01386  [pdf

    cs.MM

    A New Image Steganographic Technique using Pattern based Bits Shuffling and Magic LSB for Grayscale Images

    Authors: Khan Muhammad, Jamil Ahmad, Haleem Farman, Zahoor Jan

    Abstract: Image Steganography is a growing research area of information security where secret information is embedded in innocent-looking public communication. This paper proposes a novel crystographic technique for grayscale images in spatial domain. The secret data is encrypted and shuffled using pattern based bits shuffling algorithm (PBSA) and a secret key. The encrypted data is then embedded in the cov… ▽ More

    Submitted 6 January, 2016; originally announced January 2016.

    Comments: A short paper of 6 pages

    Journal ref: Sindh University Research Journal-SURJ (Science Series) 47.4 (2015)

  2. arXiv:1510.00226  [pdf

    cs.CR

    An Adaptive Secret Key-directed Cryptographic Scheme for Secure Transmission in Wireless Sensor Networks

    Authors: Khan Muhammad, Zahoor Jan, Jamil Ahmad, Zahid Khan

    Abstract: Wireless Sensor Networks (WSNs) are memory and bandwidth limited networks whose main goals are to maximize the network lifetime and minimize the energy consumption and transmission cost. To achieve these goals, dif ferent techniques of compression and clustering have been used. However, security is an open and major issue in WSNs for which different approaches are used, both in centralized and dis… ▽ More

    Submitted 1 October, 2015; originally announced October 2015.

    Comments: A short paper of 6 pages, proposing an adaptive cryptographic technique for secure transmission in WSN. The original paper can be found on this link at page 48. http://web.uettaxila.edu.pk/techJournal/2015/No3/TECHNICAL_JOURNAL_VOL_20_NO_3.pdf

    Journal ref: Technical Journal, University of Engineering and Technology Taxila, Pakistan, vol.20, pp.48-53, 2015

  3. arXiv:1502.07808  [pdf

    cs.MM cs.CR

    A Secure Cyclic Steganographic Technique for Color Images using Randomization

    Authors: Khan Muhammad, Jamil Ahmad, Naeem Ur Rehman, Zahoor Jan, Rashid Jalal Qureshi

    Abstract: Information Security is a major concern in today's modern era. Almost all the communicating bodies want the security, confidentiality and integrity of their personal data. But this security goal cannot be achieved easily when we are using an open network like Internet. Steganography provides one of the best solutions to this problem. This paper represents a new Cyclic Steganographic T echnique (CS… ▽ More

    Submitted 26 February, 2015; originally announced February 2015.

    Comments: 8

    Journal ref: Technical Journal, University of Engineering and Technology Taxila, Pakistan, vol. 19, pp. 57-64, 2014

  4. A Fusion of Labeled-Grid Shape Descriptors with Weighted Ranking Algorithm for Shapes Recognition

    Authors: Jamil Ahmad, Zahoor Jan, Zia-ud-Din, Shoaib Muhammad Khan

    Abstract: Retrieving similar images from a large dataset based on the image content has been a very active research area and is a very challenging task. Studies have shown that retrieving similar images based on their shape is a very effective method. For this purpose a large number of methods exist in literature. The combination of more than one feature has also been investigated for this purpose and has s… ▽ More

    Submitted 16 June, 2014; originally announced June 2014.

    Journal ref: World Applied Sciences Journal, vol. 31(6), pp. 1207-1213, 2014

  5. arXiv:1311.3508  [pdf, other

    cs.SI

    Demographic and Structural Characteristics to Rationalize Link Formation in Online Social Networks

    Authors: Muhammad Qasim Pasta, Zohaib Jan, Faraz Zaidi, Celine Rozenblat

    Abstract: Recent years have seen tremendous growth of many online social networks such as Facebook, LinkedIn and MySpace. People connect to each other through these networks forming large social communities providing researchers rich datasets to understand, model and predict social interactions and behaviors. New contacts in these networks can be formed either due to an individual's demographic profile such… ▽ More

    Submitted 14 November, 2013; originally announced November 2013.

    Comments: Second International Workshop on Complex Networks and their Applications (10 pages, 8 figures)

  6. arXiv:1310.8396  [pdf, other

    cs.SI physics.soc-ph

    Tunable and Growing Network Generation Model with Community Structures

    Authors: Mohammad Qasim Pasta, Zohaib Jan, Arnaud Sallaberry, Faraz Zaidi

    Abstract: Recent years have seen a growing interest in the modeling and simulation of social networks to understand several social phenomena. Two important classes of networks, small world and scale free networks have gained a lot of research interest. Another important characteristic of social networks is the presence of community structures. Many social processes such as information diffusion and disease… ▽ More

    Submitted 31 October, 2014; v1 submitted 31 October, 2013; originally announced October 2013.

    Comments: Social Computing and Its Applications, SCA 13, Karlsruhe : Germany (2013)

  7. arXiv:0904.3319  [pdf

    cs.DB cs.AI cs.DS

    Fast Algorithms for Mining Interesting Frequent Itemsets without Minimum Support

    Authors: Shariq Bashir, Zahoor Jan, Abdul Rauf Baig

    Abstract: Real world datasets are sparse, dirty and contain hundreds of items. In such situations, discovering interesting rules (results) using traditional frequent itemset mining approach by specifying a user defined input support threshold is not appropriate. Since without any domain knowledge, setting support threshold small or large can output nothing or a large number of redundant uninteresting resu… ▽ More

    Submitted 21 April, 2009; originally announced April 2009.

    Comments: 25 Pages