Papers by shahana qureshi
Nature-inspired adaptive decision support system for secured clustering in cyber networks
Multimedia Tools and Applications
Visual cryptography scheme is a cryptographic technique which allows visual information (e.g. pri... more Visual cryptography scheme is a cryptographic technique which allows visual information (e.g. printed text, handwritten notes, and picture) to be encrypted in such a way that the decryption can be performed by the human visual system, without the aid of computers. There are various measures on which performance of visual cryptography scheme depends, such as pixel expansion, contrast, security, accuracy, computational complexity, share generated is meaningful or meaningless, type of secret images(either binary or color) and number of secret images(either single or multiple) encrypted by the scheme. Intent of this paper is on study and performance analysis of the visual cryptography schemes on the basis of pixel expansion, number of secret images, image format and type of shares generated.

The crucial issue on World Wide Web is the security of communication and authentic transmission o... more The crucial issue on World Wide Web is the security of communication and authentic transmission of confidential multimedia elements. Web has progressed towards becoming most ordinarily utilized media for communication and consequently message, voice, video, images and numerous more are transmitted through Internet. Cryptography is an important way of sending confidential information in a secret way. There are many cryptographic techniques available. One such variation is visual cryptography in which the image is divided into two or more shares in such a way that the original image cannot be recovered until all the shares are obtained and stacked together. In the present years, various algorithms of visual cryptography in image were considered and developed for the security of the image. In this paper, we have proposed visual cryptography in videos using pixel shuffling method as well as encrypting the videos shares using logistic chaos method. Experimental results and analysis show ...
Non-Dominated Sorting Genetic Algorithm (NSGA-II) is an algorithm given to solve the Multi-Object... more Non-Dominated Sorting Genetic Algorithm (NSGA-II) is an algorithm given to solve the Multi-Objective Optimization (MOO) problems. NSGA-II is one of the most widely used algorithms for solving MOO problems. The present work proposed as advancement to the existing NSGA-II. It this method, combination of crossover and mutation operators is used other than that in the original NSGA-II, and the results are compared to see if which works better.
over the period of time a number of algorithms have been proposed for test data generation for au... more over the period of time a number of algorithms have been proposed for test data generation for automation of software testing. One such algorithm was given by Kalyanmoy Deb in 2002, under the name Nondominated sorting genetic algorithm-II (NSGA-II). It has been applied for solving number of Optimization problems. In this survey paper we give a succinct overview of the application of NSGA-II.
A Novel Algorithm of Video Watermarking in DWT Domain
Journal of emerging technologies and innovative research, 2016
This paper presents a robust and secure watermarking algorithm for video sequence. Proposed schem... more This paper presents a robust and secure watermarking algorithm for video sequence. Proposed scheme divide the video in to frames and then blue channel is used for watermarking insertion. Discrete wavelet transform is used for watermark embedding. Watermark is inserted in to mid frequency component for better resistance to video manipulation operation. PSNR and MSE are computed for testing the proposed method.

In many fields one needs to build predictive models for a set of related machine learning tasks, ... more In many fields one needs to build predictive models for a set of related machine learning tasks, such as information retrieval, computer vision and biomedical informatics. Traditionally these tasks are treated independently and the inference is done separately for each task, which ignores important connections among the tasks. Multi-task learning aims at simultaneously building models for all tasks in order to improve the generalization performance, leveraging inherent relatedness of these tasks. As in our project we are dealing with the Face recognition and the Gait recognition combine. Face recognition: Face recognition is a task so common to humans, that the individual does not even notice the extensive number of times it is performed every day. y. Many face analysis and face modeling techniques have progressed significantly in the last decade. However, the reliability of face recognition schemes still poses a great challenge to the scientific community. Gait recognition: Gait re...
A DWT Based Video Watermarking Using Random Frame Selection
This paper present a robust and secure watermarking algorithm for video sequence. Proposed scheme... more This paper present a robust and secure watermarking algorithm for video sequence. Proposed scheme divide the video in to frames and then blue channel is used for watermarking insertion. Discrete wavelet transform is used for watermark embedding. Watermark is inserted in to mid frequency component for better resistance to video manipulation operation. PSNR and MSE are computed for testing the proposed method
Non-Dominated Sorting Genetic Algorithm (NSGA-II) is an algorithm known to resolve the Multi-Obje... more Non-Dominated Sorting Genetic Algorithm (NSGA-II) is an algorithm known to resolve the Multi-Objective Optimization (MOO) problems. NSGA-II is one of the most extensively used algorithms for solving MOO problems. The present work is projected as expansion to the existing NSGA-II. It this method, different combination of crossover and mutation operator is used and the results are hence shown.

A biometric system provides automatic identification of a character based on a unique feature or ... more A biometric system provides automatic identification of a character based on a unique feature or attribute possessed by the creature. Iris recognition is breakdown as the most unfailing and accurate biometric identification scheme offered. Most practical iris recognition systems use original algorithms developed by Daugman, and these algorithms are competent to create perfect recognition rates but not includes time requirement in account and extremely suffered when pupil is illuminated with light intensity. Conversely, published results have usually been produced under favorable circumstances. So to build up generalized real time and efficient iris recognition system this work presents a number of serious modifications. This paper proposes a innovative iris recognition system which deals with, not merely the correction to the time constraint as well as deals with higher recognition efficiency requirement with a number of serious modifications in the conventional technique.
Enhanced form of solving real coded numerical optimization problem using ABC algorithm with linear crossover operator
Artificial Bee Colony (ABC) algorithm is population-based swarm intelligence algorithm. There are... more Artificial Bee Colony (ABC) algorithm is population-based swarm intelligence algorithm. There are many algorithms Present for solving numeric optimization problem.ABC is based on the intellectual behaviour of honey bee crowd. In this work, ABC algorithm is used with Genetic crossover machinist and tested on standard benchmark functions, and also result compared with the X-ABC algorithm with the advantage of fewer organize Parameters. Obtained results show that the performance of the ABC with crossover gives better results than the X-ABC algorithm. KeywordsSwarm intelligence, Artificial bee colony, Genetic algorithm, Evolutionary algorithm, Numerical function optimization.
Advances in Cyber Security Paradigm: A Review
This review paper discusses the various defensive models and mechanisms used so far in cyber secu... more This review paper discusses the various defensive models and mechanisms used so far in cyber security. Cyber security is very sensitive issue, where technologies are integrated day by day. To deal with sophisticated attackers, there is a need to develop a strong proactive defensive mechanism for fastest growing malware codes and other attacks too. In particular, digitization and information infrastructure initiated a battle for dominance in cyber space. This paper aims to highlight various challenges in cyber security, recent integrated technologies along with the recent advances in cyber security paradigm.
Non-Dominated Sorting Genetic Algorithm (NSGAII) is an algorithm given to solve the Multi-Objecti... more Non-Dominated Sorting Genetic Algorithm (NSGAII) is an algorithm given to solve the Multi-Objective Optimization (MOO) problems. NSGA-II is one of the most widely used algorithms for solving MOO problems. The present work proposed as advancement to the existing NSGAII. It this method, combination of crossover and mutation operators is used other than that in the original NSGA-II, and the results are compared to see if which works better. Keywords— NSGA-II, Parent-centric Blend Crossover, Power Mutation.

Novel hybridized crow whale optimization and QoS based bipartite coverage routing for secure data transmission in wireless sensor networks
Journal of Intelligent & Fuzzy Systems
WSN (Wireless Sensor Network) is a network of devices which can transfer the data collected from ... more WSN (Wireless Sensor Network) is a network of devices which can transfer the data collected from an examined field via wireless links. Thus secure data transmission is required for accurate transfer of data from source to destination as data passes through various intermediate nodes. The study intends to perform shortest, secure path routing on the basis of trust through novel Hybridized Crow Whale Optimization (H-CWO) and QoS based bipartite Coverage Routing (QOS-CR) as well as to analyze the system’s performance. Nodes are randomly deployed in the network area. Initially, a trust metric formation is implemented via novel H-CWO and the authenticated nodes are selected. Then through the secure routing protocol, Cluster head (CH) is selected to perform clustering. Neighbourhood hop prediction is executed to determine the shortest path routing and secure data transfer is performed through novel QOS-CR. The proposed system is analyzed by comparing it with various existing methods in te...
Novel Fuzzy Based Crow Search Optimization Algorithm for Secure Node-to-Node Data Transmission in WSN
Wireless Personal Communications
IOSR Journal of Computer Engineering, 2012
Artificial Bee Colony (ABC) algorithm is inhabitants-based flock intelligence algorithm. There ar... more Artificial Bee Colony (ABC) algorithm is inhabitants-based flock intelligence algorithm. There are many algorithms Present for solving numeric optimization problem.ABC is based on the intellectual behaviour of honey bee flock. In this work, ABC algorithm is used with Genetic crossover machinist and tested on standard benchmark functions, and also result compared with the X-ABC algorithm with the plus of fewer organize parameters. Obtained results show that the concert of the ABC with crossover gives better results than the X-ABC algorithm.
Artificial Bee Colony (ABC) algorithm is inhabitants-based flock intelligence algorithm. There ar... more Artificial Bee Colony (ABC) algorithm is inhabitants-based flock intelligence algorithm. There are many algorithms Present for solving numeric optimization problem.ABC is based on the intellectual behaviour of honey bee flock. In this work, ABC algorithm is used with Genetic crossover machinist and tested on standard benchmark functions, and also result compared with the X-ABC algorithm with the plus of fewer organize parameters. Obtained results show that the concert of the ABC with crossover gives better results than the X-ABC algorithm.
Uploads
Papers by shahana qureshi