Information Security and Biometrics

List of Publications

  • Muhammad Tahir Naseem, Muhammad Nadeem, Ijaz Mansoor Qureshi, and Ayyaz Hussain, “Optimal Secure Information using Digital Watermarking and Fuzzy Rule base”, in Multimedia Tools and Applications, Volume 78, Issue 6, pp 7691–7712, March 2019.
  • M.Z. Muzaffar, I.M. Qureshi, K. Sultan, “Compressed Sensing for Security and Payload Enhancement in Digital Audio Steganography”, Journal of Information Hiding and Multimedia Signal Processing, Volume 9, Number 6, 2018.
  • M Zaheer, IM Qureshi, Z Muzaffar, L Aslam,” Compressed Sensing Based Image Steganography System for Secure Transmission of Audio Message with Enhanced Security”. International Journal Of Computer Science and Network Security 17 (7), 133-
  • M Zaheer, IM Qureshi, J Alhiyafi, Z Muzaffar, “Improved and Secure Differential LSB Embedding Steganography”, Journal of Information Assurance & Security, Vol. 12, Issue 5, pp. 170-178, 2017.
  • Khan, M.A.; Ullah, I.; Nisar, S.; Noor, F; Khanzada, Qureshi, I.M, F. Multi-access Edge Computing (MEC) Enabled Flying Ad-hoc Networks with Secure Deployment using Identity Based Generalized Signcryption. Mobile Information System.
  • Khan, M.A.; Ullah, I.; Qureshi, I.M.; Noor, F; Khanzada, F. An Efficient and Provably Secure Certificateless Key-Encapsulated Signcryption Scheme for Flying Ad-Hoc Network. IEEE Access 2020, 8, 36807-36828. (IF=4.098)
  • Khan, M.A.; Qureshi, I.M.; Ullah, I.; Khan, S.; Khanzada, F.; Noor, F. An Efficient and Provably Secure Certificateless Blind Signature Scheme for Flying Ad-Hoc Network Based on Multi-Access Edge Computing. Electronics 2020, 9, 30. (IF=1.764)
  • Khan, M.A.; Qureshi, I.M. Low-cost, Rapid and Energy-efficient Hybrid Wireless Technology for Future Deployment of Flying-Ad-hoc Networks. Drones 2019,3(1),16.
  • Zaheer, Muhammad, Ijaz Mansoor Qureshi, Kiran Sultan, Muhammad Zeeshan Muzaffar, and ReemAlnanih. "High Capacity Image Steganography Based on Prime Series Representation and Payload Redundancy Removal." Journal of Information Assurance & Security 14, no. 2 (2019).
  • Muhammad Asghar Khan, InsafUllah, ShibliNisar,Fazal Noor,IjazMansoorQureshi,FahimullahKhanzada,HizbullahKhattak,and Muhammad Adnan Aziz, “Multiaccess Edge Computing Empowered Flying Ad Hoc Networks with Secure Deployment Using Identity-Based Generalized Signcryption”, in Mobile Information Systems, Jul 2020.
  • Laeeq Aslam, Ahmad Saeed, Ijaz Mansoor Qureshi, Muhammad Amir, and Waseem Khan, “Novel Image Steganography Based on Preprocessing of Secrete Messages to Attain Enhanced Data Security and Improved Payload Capacity”, in International Information and Engineering Technology Association (IIETA), February 2020.
  • Muhammad Zeeshan Muzaffar, Atta-ur-Rahman, Qureshi I.M. “WPM-LWT based Novel Robust Audio Steganography Technique”. International Journal of Computer Science and Information Security (IJCSIS) Vol. 14, No. 8, August 2016.
  • Muhammad Zeeshan Muzaffar, Ijaz Mansoor Qureshi, Atta-ur-Rahman, Muhammad Tahir Naseem. “Changing Slope Method: A Novel Technique for Digital Audio Steganography”. Journal of Basic and Applied Scientific Research (JBASR) Vol. 3, No. 12, pp.71-81, 2013. [Published]
  • Muhammad Zeeshan Muzaffar, Ijaz Mansoor Qureshi, Atta-ur-Rahman, Tanveer Ahmed Cheema, “Compressed Sensing for Security and Payload Enhancement in Audio Steganography” [Submitted]
  • M. Sher and I. M. Qureshi, “Intelligent Distributed Systems on Linear Block Protocols using Backpropagation Neural Networks”, First International Workshop on Distributed Computing, Communication, and Application (IWDCCA), IEEE Computer Society and IEICE Japan, May 2000.
  • Atta-ur-Rahman, Qureshi I.M., Muzaffar M.Z., “Adaptive Coding and Modulation for OFDM Systems using Product Codes and Fuzzy Rule Base System”. International Journal of Computer Applications (IJCA), Vol. 35(4), pp.41-48, December 2011.
  • Atta-ur-rahman, Qureshi I. M. and Naseem M.T., “A Novel Technique for Reliable Image Transmission using Product Codes”. International Journal of Computer Applications (IJCA) Vol. 65(4), pp. 12-17, March 2013.
  • Naseem M.T., Qureshi I.M., Cheema T.A., Zubair M., "Invertible and Fragile Watermarking for Medical images Using Residue Number System and Chaos," Journal of Basic and Applied Scientific Research, vol. 10, no. 2,pp. 10643-10651, 2012.
  • Naseem M.T., Qureshi I.M., Cheema T.A., Rahman Atta-urRahman., "Hash based Medical Image Authentication and Recovery Using Chaos and Residue Number System," Journal of Basic and Applied Scientific Research, vol. 3, no. 6, pp. 488-495, 2013.
  • Naseem M.T., Qureshi I.M., Atta-ur-Rahman, Muzaffar M.Z., “Reversible and Robust Watermarking using Residue Number System and Product Codes”, Journal of Information Assurance and Security (JIAS), Vol. 7, pp. 156-163, 2012.
  • Naseem M.T., Qureshi I.M., Cheema T.A., Atta-urRahman., "Spread Spectrum based Invertible Watermarking for Medical Images using RNS & Chaos," International Arab Journal of Information Technology, 2014 (Accepted and under publication) [IF = 0.39].
  • Naseem M.T., Qureshi I.M., Atta-urRahman., MuzaffarM.Z.,"Novel Technique for Capacity Maximizing in Digital Watermarking using Fuzzy Rule Base”,Journal of Intelligent and Fuzzy Systems, 2014 (Accepted) [IF = 0.96].
  • Naseem M.T., Qureshi I.M., Atta-urRahman., Muzaffar M.Z.,“Image Selection Criteria for Embedding Desired Capacity using FRBS,"Neural Network World Journal, 2014 Accepted [IF = 0.36].
  • Naseem M.T., Qureshi I.M., Cheema T.A., Atta-urRahman., "Robust & fragile watermarking for medical images using RRNS & chaos," International Journal of Signal Processing, Image Processing & pattern," 2014
  • Naseem M.T., Qureshi I.M., Cheema T.A., Atta-urRahman.,"Robust & Fragile Watermarking for Residued Medical Images using Product Codes & Chaos," Iranian Journal of Science & Technology, 2013.
  • Naseem M.T., Qureshi I.M., Muzaffar M.Z., Rahman Atta-urRahman., "Chaos Based Invertible Authentication of Medical Images,"International Conference on Emerging Technology, pp. 1-5, 2013.
  • Naseem M.T., Qureshi I.M., Atta-urRahman., CheemaT.A.,“Optimal Secure Information using Digital watermarking and Fuzzy Rule base, "Information Sciences, Elsevier, 2014
  • Naseem M.T., Qureshi I.M., Atta-urRahman.,Muzaffar M.Z., "Chaos based Secure and Reversible Watermarking,"International Conference on Modeling & Simulation, pp. 115-119, November 2013.
  • Naseem, M.T., Atta-ur-Rahman; Qureshi, I.M., Muzaffar, M.Z.; "Reversible watermarking using Residue Number System". 7th International Conference on Information Assurance and Security (IAS), pp. 162 - 166, 5-8 Dec. 2011, Melacca, Malaysia.
  • Naseem M.T., Qureshi I.M., Rahman Atta-urRahman., Muzaffar M.Z., "Robust watermarking for medical images resistant to geometric attacks," 15th International Multitopic Conference (INMIC), pp. 224-228, 2012.
  • Muhammad Tahir Naseem, I.M. Qureshi, Rafi ullah, Muhammad Zubair Reversible and Fragile Watermarking using Residue Number System and ChaosChina Physics Letter.


Members

Dr. I.M.Qureshi

Professor

Dept. of EE, Air University
Sector E9,44000,Islamabad, Pakistan
Email: imqureshi@mail.au.edu.pk

Dr.Muhammad Tahir Naseem

Assistant. Professor

Barani Institute Of Information Technology
Rawalpindi,Pakistan
Email: tahir.naseem@gmail.com

Dr. Muhamamad Zeeshan Muzaffer

Assistant Professor

Barani Institute Of Information Technology
Rawalpindi,Pakistan
Email: zeeshan@biit.edu.pk

Dr. Muhammad Atta-ur-Rahman

Asst. Prof

Department of Computer Science,
University of Dammam, Dammam, Saudi Arabia
Email: aaurrahman@uod.edu.sa

Engr. Muhammad Zaheer

Lecturer

Dept. of EE, Air University
Islamabad, 44000, Pakistan
Email: mzaheer@mail.au.edu.pk

ISSS?

Institute of Signals, Systems and Soft Computing (ISSS) aims to build up the research infrastructure for the post graduate students and researchers from all over the world. ISSS aims to offer the full portfolio of expertise in diversified fields of Engineering, and Applied Sciences.

Contact Us