Papers by Zeba Shamsi

Securing encrypted image information in audio data
Multimedia Tools and Applications
Advances in communication technologies have fueled growth in digital data transfer. Images are on... more Advances in communication technologies have fueled growth in digital data transfer. Images are one of the most often conveyed types of digital information. Cryptographic techniques help create cipher but also lure attackers as it indicates secret communication. To over-come, a method for encrypting a secret image and hiding it in audio data is proposed. The Ikeda map is used to create the encrypted image, which is then hidden in the audio’s lifting wavelet transform. Various statistical experiments show that the proposed approach conceals the encrypted image while causing minimal changes to the audio. The proposed algorithm shows robustness towards noise addition or random audio crop attack by retrieving a visually perceivable image after the attack. The suggested approach outperforms the current algorithms in terms of imperceptibility and embedding capacity
Worsening floods around northern Manila Bay, Philippines: Research-based analysis from physical and social science perspectives
Philippine Sociological Review
Journal of Information Security and Applications, 2019
With the rise in medical imaging tools and telemedicine technology, the distance barriers in prov... more With the rise in medical imaging tools and telemedicine technology, the distance barriers in providing health care have been reduced by communicating patients data over the internet. To provide patients with privacy, the data are encrypted while transmitting over the insecure network. The paper proposes an encryption scheme for multiple medical images using a new finding in elliptic curve analogue ElGamal cryptosystem and Mersenne Twister pseudo-random number generator. The new finding quickens the encryption time as well as solve the problem of data expansion associated with ElGamal cryptosystem. Results from simulation, security and statistical analyses show that the proposed encryption algorithm can be used for multiple medical images encryption.

A Method for the Selection of Agile Methods Using AHP
Advances in Intelligent Systems and Computing, 2017
There are different types of lightweight methods for the development of software like eXtreme Pro... more There are different types of lightweight methods for the development of software like eXtreme Programming (XP), scrum, agile modeling, etc. These methods are also referred to as agile methods. Different criteria’s are involved during the selection of agile methods so we visualize the agile methods selection problem as a multi-criteria decision making problem. Selection of an appropriate agile method according to the need of the project is an important research issue. Therefore, in order to address this issue, we present a method for the selection of agile methods using Analytic Hierarchy Process (AHP). Following criteria’s have been used for the selection of agile methods, i.e., positive response in dynamic requirements (PRDR), incorporation of requirements changes (IRC), communication with the customer (CWC), and the size of development team (SDT). Finally, a case study is given to explain the proposed method.
Conference Presentations by Zeba Shamsi
A survey of the dark web
Vasyl Stefanyk Precarpathian National University, 2022
The dark web is a hidden network of websites that can only be viewed by using a particular web br... more The dark web is a hidden network of websites that can only be viewed by using a particular web browser. It protects users and anonymity through technologies such as traffic encryption, obfuscation, and forwarding. This study looks at how the dark web is being used, focusing on criminality and how law enforcement acts as an opponent. The review explains these secret areas, including their history, the activities they host such as cybercrime the nature of the attention they attract, and the tactics used by law enforcement to try to defeat their goal .
Jounral by Zeba Shamsi

Securing encrypted image information in audio data
Springer Nature , 2023
Advances in communication technologies have fueled growth in digital data transfer. Images are on... more Advances in communication technologies have fueled growth in digital data transfer. Images are one of the most often conveyed types of digital information. Cryptographic techniques help create cipher but also lure attackers as it indicates secret communication. To over-come, a method for encrypting a secret image and hiding it in audio data is proposed. The Ikeda map is used to create the encrypted image, which is then hidden in the audio’s lifting wavelet transform. Various statistical experiments show that the proposed approach conceals the encrypted image while causing minimal changes to the audio. The proposed algorithm shows robustness towards noise addition or random audio crop attack by retrieving a visually perceivable image after the attack. The suggested approach outperforms the current algorithms in terms of imperceptibility and embedding capacity
Uploads
Papers by Zeba Shamsi
Conference Presentations by Zeba Shamsi
Jounral by Zeba Shamsi