Search For:

Displaying 1-14 out of 14 total
Bio-inspired Hybrid Face Recognition System for Small Sample Size and Large Dataset
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Muhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar
Issue Date:October 2010
pp. 384-388
Face recognition has a great demands in human authentication and it becomes one of the most intensive field of biometrics research areas. In this paper, we present a bio-inspired face recognition system based on linear discriminant analysis and external cl...
 
Face Recognition using Layered Linear Discriminant Analysis and Small Subspace
Found in: Computer and Information Technology, International Conference on
By Muhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar, Rubiyah Yousaf
Issue Date:July 2010
pp. 1407-1412
Face recognition has great demands in human recognition and recently it becomes one of the most important research areas of biometrics. In this paper, we present a novel layered face recognition method based on Fisher’s linear discriminant analysis. The ba...
 
Bio-chaotic Stream Cipher-Based Iris Image Encryption
Found in: Computational Science and Engineering, IEEE International Conference on
By Abdullah Sharaf Alghamdi, Hanif Ullah, Maqsood Mahmud, Muhammad Khurram Khan
Issue Date:August 2009
pp. 739-744
Conventional cryptography uses encryption key, which are long bit strings and are very hard to memorize such a long random numbers. Also it can be easily attacked by using the brute force search or technique. Instead of traditional cryptography, biometric ...
 
Pointing a Finger toward Standardized and Automated Biometrics
Found in: IEEE Multimedia
By Muhammad Khurram Khan, Jiashu Zhang
Issue Date:October 2006
pp. 73-75
The authors provide a review of a book on the standardization and automation of biometric identification techniques.
 
Securing IP-Multimedia Subsystem (IMS) against Anomalous Message Exploits by Using Machine Learning Algorithms
Found in: Information Technology: New Generations, Third International Conference on
By M. Zubair Rafique, Zeeshan Shafi Khan, Muhammad Khurram Khan, Khaled Alghatbar
Issue Date:April 2011
pp. 559-563
Modern communication infrastructure (IP Multimedia Subsystem (IMS) and Voice over IP (VoIP)) are vulnerable to zero day attacks and unknown threats. Anomalous SIP requests can be used to remotely launch malicious activity. Furthermore, anomalous messages a...
 
Security Analysis of Firewall Rule Sets in Computer Networks
Found in: Emerging Security Information, Systems, and Technologies, The International Conference on
By Bilal Khan, Muhammad Khurram Khan, Maqsood Mahmud, Khaled S. Alghathbar
Issue Date:July 2010
pp. 51-56
Firewalls are the screening gates for the internet/intranet traffic in computer networks. However, deploying a firewall is simply not enough since it needs to be configured by the system administrator according to the needs of the organization. There are m...
 
Cryptanalysis of "An Improved Remote Password Authentication Scheme with Smartcard"
Found in: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Muhammad Khurram Khan, Debiao He
Issue Date:July 2013
pp. 1708-1710
Recently, an improved remote user authentication scheme using smartcard was proposed. The authentication scheme by J. Chao claimed that it could provide user anonymity and withstand various attacks. In this paper, we analyze the security of Chao's scheme a...
 
Copyright Protection for E-Government Document Images
Found in: IEEE MultiMedia
By Didi Rosiyadi,Shi-Jinn Horng,Pingzhi Fan,Xian Wang,Muhammad Khurram Khan,Yi Pan
Issue Date:July 2012
pp. 62-73
The proposed copyright protection scheme combines the discrete cosine transform (DCT) and singular value decomposition (SVD) using a control parameter to avoid the false-positive problem.
 
Hardcopy Document Authentication Based on Public Key Encryption and 2D Barcodes
Found in: Biometrics and Security Technologies, International Symposium on
By Mohamed Hamdy Eldefrawy,Khaled Alghathbar,Muhammad Khurram Khan
Issue Date:March 2012
pp. 77-81
In document authentication, the context refers to the ability to trace the origins of a document to a given person, the device that produced it, or the time and/or place it was produced. Forgeries pose significant dangers in terms of authentication and tru...
 
Polymorphic Malware Detection Using Hierarchical Hidden Markov Model
Found in: Dependable, Autonomic and Secure Computing, IEEE International Symposium on
By Fahad Bin Muhaya,Muhammad Khurram Khan,Yang Xiang
Issue Date:December 2011
pp. 151-155
Binary signatures have been widely used to detect malicious software on the current Internet. However, this approach is unable to achieve the accurate identification of polymorphic malware variants, which can be easily generated by the malware authors usin...
 
OTP-Based Two-Factor Authentication Using Mobile Phones
Found in: Information Technology: New Generations, Third International Conference on
By Mohamed Hamdy Eldefrawy, Khaled Alghathbar, Muhammad Khurram Khan
Issue Date:April 2011
pp. 327-331
Two-factor authentication (2FA) provides improved protection, since users are prompted to provide something they know and something they have. This method delivers a higher-level of authentication assurance, which is essential for online banking security. ...
 
Qualified Analysis b/w ESB(s) Using Analytical Hierarchy Process (AHP) Method
Found in: Intelligent Systems, Modelling and Simulation, International Conference on
By Zeeshan Siddiqui, Abdul Hanan Abdullah, Muhammad Khurram Khan
Issue Date:January 2011
pp. 100-104
This research study stress upon the qualified or comparative analysis between commercial and non-commercial Enterprise Service Buses (ESB) for large-scale organizations. We have used Multi Criteria Decision Analysis (MCDA) method known as Analytical Hierar...
 
Enhancing the Security of a 'More Efficient & Secure Dynamic ID-Based Remote User Authentication Scheme'
Found in: Network and System Security, International Conference on
By Muhammad Khurram Khan
Issue Date:October 2009
pp. 420-424
Recently, Wang et al. proposed a dynamic ID-based remote user authentication scheme using smart cards. They claimed that their scheme preserves anonymity of a user, has the features of strong password chosen by the server, and protected from several attack...
 
Application of evolutionary algorithms in detecting SMS spam at access layer
Found in: Proceedings of the 13th annual conference on Genetic and evolutionary computation (GECCO '11)
By M. Zubair Rafique, Muhammad Khurram Khan, Nasser Alrayes
Issue Date:July 2011
pp. 1787-1794
In recent years, Short Message Service (SMS) has been widely exploited in arbitrary advertising campaigns and the propagation of scam. In this paper, we first analyze the role of SMS spam as an increasing threat to mobile and smart phone users. Afterward, ...
     
 1