Skip to main content

Research Repository

Advanced Search

All Outputs (152)

An authentication protocol based on chaos and zero knowledge proof (2020)
Journal Article
Major, W., Buchanan, W. J., & Ahmad, J. (2020). An authentication protocol based on chaos and zero knowledge proof. Nonlinear Dynamics, 99, 3065-3087. https://doi.org/10.1007/s11071-020-05463-3

Port Knocking is a method for authenticating clients through a closed stance firewall, and authorising their requested actions, enabling severs to offer services to authenticated clients, without opening ports on the firewall. Advances in port knocki... Read More about An authentication protocol based on chaos and zero knowledge proof.

WiFreeze: Multiresolution Scalograms for Freezing of Gait Detection in Parkinson’s Leveraging 5G Spectrum with Deep Learning (2019)
Journal Article
Tahir, A., Ahmad, J., Shah, S. A., Morison, G., Skelton, D. A., Larijani, H., Abbasi, Q. H., Imran, M. A., & Gibson, R. M. (2019). WiFreeze: Multiresolution Scalograms for Freezing of Gait Detection in Parkinson’s Leveraging 5G Spectrum with Deep Learning. Electronics, 8(12), https://doi.org/10.3390/electronics8121433

Freezing of Gait (FOG) is an episodic absence of forward movement in Parkinson's Disease (PD) patients and represents an onset of disabilities. FOG hinders daily activities and increases fall risk. There is high demand for automating the process of F... Read More about WiFreeze: Multiresolution Scalograms for Freezing of Gait Detection in Parkinson’s Leveraging 5G Spectrum with Deep Learning.

A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids (2019)
Journal Article
Bashir, I., Ahmed, F., Ahmad, J., Boulila, W., & Alharbi, N. (2019). A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids. Entropy, 21(11), Article 1132. https://doi.org/10.3390/e21111132

Image hash is an alternative to cryptographic hash functions for checking integrity of digital images. Compared to cryptographic hash functions, an image hash or a Perceptual Hash Function (PHF) is resilient to content preserving distortions and sens... Read More about A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids.

A Novel Real-Time, Lightweight Chaotic-Encryption Scheme for Next-Generation Audio-Visual Hearing Aids (2019)
Journal Article
Adeel, A., Ahmad, J., Larijani, H., & Hussain, A. (2020). A Novel Real-Time, Lightweight Chaotic-Encryption Scheme for Next-Generation Audio-Visual Hearing Aids. Cognitive Computation, 12, 589-601. https://doi.org/10.1007/s12559-019-09653-z

Next-generation audio-visual (AV) hearing aids stand as a major enabler to realize more intelligible audio. However, high data rate, low latency, low computational complexity, and privacy are some of the major bottlenecks to the successful deployment... Read More about A Novel Real-Time, Lightweight Chaotic-Encryption Scheme for Next-Generation Audio-Visual Hearing Aids.

DNA key based visual chaotic image encryption (2019)
Journal Article
Khan, J. S., Ahmad, J., Ahmed, S. S., Siddiqa, H. A., Abbasi, S. F., & Kayhan, S. K. (2019). DNA key based visual chaotic image encryption. Journal of Intelligent and Fuzzy Systems, 37(2), 2549-2561. https://doi.org/10.3233/jifs-182778

With the exponential growth of Internet technologies, digital information exchanged over the Internet is also significantly increased. In order to ensure the security of multimedia contents over the open natured Internet, data should be encrypted. In... Read More about DNA key based visual chaotic image encryption.

HRNN4F: Hybrid deep random neural network for multi-channel fall activity detection (2019)
Journal Article
Tahir, A., Ahmad, J., Morison, G., Larijani, H., Gibson, R. M., & Skelton, D. A. (2019). HRNN4F: Hybrid deep random neural network for multi-channel fall activity detection. Probability in the Engineering and Informational Sciences, 1-14. https://doi.org/10.1017/s0269964819000317

Falls are a major health concern in older adults. Falls lead to mortality, immobility and high costs to social and health care services. Early detection and classification of falls is imperative for timely and appropriate medical aid response. Tradit... Read More about HRNN4F: Hybrid deep random neural network for multi-channel fall activity detection.

RNN-ABC: A New Swarm Optimization Based Technique for Anomaly Detection (2019)
Journal Article
Qureshi, A., Larijani, H., Mtetwa, N., Javed, A., & Ahmad, J. (2019). RNN-ABC: A New Swarm Optimization Based Technique for Anomaly Detection. Computers, 8(3), Article 59. https://doi.org/10.3390/computers8030059

The exponential growth of internet communications and increasing dependency of users upon software-based systems for most essential, everyday applications has raised the importance of network security. As attacks are on the rise, cybersecurity should... Read More about RNN-ABC: A New Swarm Optimization Based Technique for Anomaly Detection.

A Heuristic Intrusion Detection System for Internet-of-Things (IoT) (2019)
Presentation / Conference Contribution
Qureshi, A., Larijani, H., Ahmad, J., & Mtetwa, N. (2019, July). A Heuristic Intrusion Detection System for Internet-of-Things (IoT). Presented at 2019 Computing Conference, London, UK

Today, digitally connected devices are involved in every aspect of life due to the advancements in Internet-of-Things (IoT) paradigm. Recently, it has been a driving force for a major technological revolution towards the development of advanced moder... Read More about A Heuristic Intrusion Detection System for Internet-of-Things (IoT).

Occupancy detection in non-residential buildings – A survey and novel privacy preserved occupancy monitoring solution (2018)
Journal Article
Ahmad, J., Larijani, H., Emmanuel, R., Mannion, M., & Javed, A. (2018). Occupancy detection in non-residential buildings – A survey and novel privacy preserved occupancy monitoring solution. Applied Computing and Informatics, https://doi.org/10.1016/j.aci.2018.12.001

Buildings use approximately 40% of global energy and are responsible for almost a third of the worldwide greenhouse gas emissions. They also utilise about 60% of the world’s electricity. In the last decade, stringent building regulations have led to... Read More about Occupancy detection in non-residential buildings – A survey and novel privacy preserved occupancy monitoring solution.

An Intelligent Real-Time Occupancy Monitoring System Using Single Overhead Camera (2018)
Presentation / Conference Contribution
Ahmad, J., Larijani, H., Emmanuel, R., Mannion, M., & Javed, A. (2018, September). An Intelligent Real-Time Occupancy Monitoring System Using Single Overhead Camera. Presented at SAI Intelligent Systems Conference, London

Real-time occupancy monitoring information is an important component in building energy management and security. Advances in technology enables us to develop vision-based systems. These systems have gained popularity among different scientific resear... Read More about An Intelligent Real-Time Occupancy Monitoring System Using Single Overhead Camera.

Visual Meaningful Encryption Scheme Using Intertwinning Logistic Map (2018)
Presentation / Conference Contribution
Abbasi, S. F., Ahmad, J., Khan, J. S., Khan, M. A., & Sheikh, S. A. (2019). Visual Meaningful Encryption Scheme Using Intertwinning Logistic Map. . https://doi.org/10.1007/978-3-030-01177-2_56

Transmission of images over the Internet is exponentially increased in the last decade. However, Internet is considered as an insecure channel and hence may cause serious privacy issues. To overcome such privacy concerns, researchers are trying to se... Read More about Visual Meaningful Encryption Scheme Using Intertwinning Logistic Map.

A Novel Random Neural Network Based Approach for Intrusion Detection Systems (2018)
Presentation / Conference Contribution
Qureshi, A., Larijani, H., Ahmad, J., & Mtetwa, N. (2018). A Novel Random Neural Network Based Approach for Intrusion Detection Systems. . https://doi.org/10.1109/ceec.2018.8674228

Computer security and privacy of user specific data is a prime concern in day to day communication. The mass use of internet connected systems has given rise to many vulnerabilities which includes attacks on smart devices. Regular occurrence of such... Read More about A Novel Random Neural Network Based Approach for Intrusion Detection Systems.

DNA Sequence Based Medical Image Encryption Scheme (2018)
Presentation / Conference Contribution
Khan, J. S., Ahmad, J., Abbasi, S. F., Ali, A., & Kayhan, S. K. (2018). DNA Sequence Based Medical Image Encryption Scheme. In 2018 10th Computer Science and Electronic Engineering (CEEC). https://doi.org/10.1109/ceec.2018.8674221

Medical consultants and doctors store and update patients confidential information on Internet cloud computing platforms. These days, securing medical images from eavesdroppers is one of the most challenging and significant research areas. Due to var... Read More about DNA Sequence Based Medical Image Encryption Scheme.

Intertwining and NCA Maps Based New Image Encryption Scheme (2018)
Presentation / Conference Contribution
Khan, F. A., Ahmed, J., Ahmad, J., Khan, J. S., & Stankovic, V. (2018, August). Intertwining and NCA Maps Based New Image Encryption Scheme. Presented at 2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE), Southend, United Kingdom

In this digital era, the Internet is a main source of communication. Due to exponential advancement in Internet technologies, transmission of multimedia data is very common now. However, transmitting sensitive information over the Internet is always... Read More about Intertwining and NCA Maps Based New Image Encryption Scheme.

Chaos based efficient selective image encryption (2018)
Journal Article
Khan, J. S., & Ahmad, J. (2019). Chaos based efficient selective image encryption. Multidimensional Systems and Signal Processing, 30(2), 943-961. https://doi.org/10.1007/s11045-018-0589-x

Due to social networks, demand for sharing multimedia data is significantly increased in last decade. However, lower complexity and frequent security breaches on public network such as Internet make it easy for eavesdroppers to approach the actual co... Read More about Chaos based efficient selective image encryption.

Detection and prevention of Black Hole Attacks in IOT & WSN (2018)
Presentation / Conference Contribution
Ali, S., Khan, M. A., Ahmad, J., Malik, A. W., & ur Rehman, A. (2018, April). Detection and prevention of Black Hole Attacks in IOT & WSN. Presented at 2018 Third International Conference on Fog and Mobile Edge Computing (FMEC), Barcelona, Spain

Wireless Sensor Network is the combination of small devices called sensor nodes, gateways and software. These nodes use wireless medium for transmission and are capable to sense and transmit the data to other nodes. Generally, WSN composed of two typ... Read More about Detection and prevention of Black Hole Attacks in IOT & WSN.

A novel image encryption based on Lorenz equation, Gingerbreadman chaotic map and S8 permutation (2017)
Journal Article
Khan, F. A., Ahmed, J., Khan, J. S., Ahmad, J., & Khan, M. A. (2017). A novel image encryption based on Lorenz equation, Gingerbreadman chaotic map and S8 permutation. Journal of Intelligent and Fuzzy Systems, 33(6), 3753-3765. https://doi.org/10.3233/JIFS-17656

Internet is used as the main source of communication throughout the world. However due to public nature of internet data are always exposed to different types of attacks. To address this issue many researchers are working in this area and proposing d... Read More about A novel image encryption based on Lorenz equation, Gingerbreadman chaotic map and S8 permutation.

A new technique for designing 8 × 8 substitution box for image encryption applications (2017)
Presentation / Conference Contribution
Khan, F. A., Ahmed, J., Khan, J. S., Ahmad, J., Khan, M. A., & Hwang, S. O. (2017, September). A new technique for designing 8 × 8 substitution box for image encryption applications. Presented at 2017 9th Computer Science and Electronic Engineering (CEEC), Colchester

To create confusion in ciphertexts, encryption processes depends upon nonlinear mappings. This nonlinear mapping can be achieved by a process known as substitution. In a secure encryption algorithm, substitution plays a key role during confusion stag... Read More about A new technique for designing 8 × 8 substitution box for image encryption applications.

A novel substitution box for encryption based on Lorenz equations (2017)
Presentation / Conference Contribution
Khan, F. A., Ahmed, J., Khan, J. S., Ahmad, J., & Khan, M. A. (2017, July). A novel substitution box for encryption based on Lorenz equations. Presented at 2017 International Conference on Circuits, System and Simulation (ICCSS), London, United Kingdom

Complexity of an encryption algorithm is highly dependent on nonlinear components that drive actual security. Only nonlinear component in all traditional encryption algorithms is mainly Substitution Box (S-Box). In block ciphers, the relationship bet... Read More about A novel substitution box for encryption based on Lorenz equations.

Energy demand prediction through novel random neural network predictor for large non-domestic buildings (2017)
Presentation / Conference Contribution
Ahmad, J., Larijani, H., Emmanuel, R., Mannion, M., Javed, A., & Phillipson, M. (2017, April). Energy demand prediction through novel random neural network predictor for large non-domestic buildings. Presented at 2017 Annual IEEE International Systems Conference (SysCon), Montreal, QC, Canada

Buildings are among the largest consumers of energy in the world. In developed countries, buildings currently consumes 40% of the total energy and 51% of total electricity consumption. Energy prediction is a key factor in reducing energy wastage. Thi... Read More about Energy demand prediction through novel random neural network predictor for large non-domestic buildings.