Browsing by Author "Shehzad, Danish"
Now showing items 1-10 of 10
-
A Novel Image Steganography Technique based on Similarity of Bits Pairs
Steganography is one of the most important information hiding mechanism which can be used along with cryptography for providing adequate data security. The common Steganographic mediums used are text image audio and video for hiding secret information. In the case of image medium mostly least significant bits of pixels of a cover image are used for hiding secret information. In this paper a new technique based on pairs matching is proposed data bits of the message to be secured are arranged in ...
-
Developing novel techniques for spatial domain LSB i̇mage steganography
Steganography is one of the most noteworthy information hiding mechanism, which is used as an alternative to cryptography in order to provide adequate data security. Image steganography is one of the key types of steganography where a message to be transmitted is hidden inside a cover image. The most commonly used techniques for image steganography rely on LSB Steganography. In this thesis, new techniques are developed for LSB image steganography to achieve maximum security, optimal data capacity ...
-
LSB Image Steganography Based on Blocks Matrix Determinant Method
Image steganography is one of the key types of steganography where a message to be sent is hidden inside the cover image. The most commonly used techniques for image steganography rely on LSB steganography. In this paper, a novel image steganography technique based on blocks matrix determinant method is proposed. Under this method, a cover image is divided into blocks of size 2 x 2 pixels and the determinant of each block is calculated. The comparison of the determinant values and corresponding ...
-
Novel Application Software for the Semi-Automated Analysis of Infrared Meibography Images
Authors:Shehzad, Danish; Gorçuyeva, Sona; Daǧ, Tamer; Bozkurt, Banu
Publisher and Date:(Lippincott Williams & Wilkins, 2019)Purpose: To develop semi-automated application software that quickly analyzes infrared meibography images taken with the CSO Sirius Topographer (CSO, Italy) and to compare them to the manual analysis system on the device (Phoenix software platform). Methods: A total of 52 meibography images verified as high quality were used and analyzed through manual and semi-automated meibomian gland (MG) detector software in this study. For the manual method, an experienced researcher circumscribed the MGs ...
-
Novel Application Software for the Semi-Automated Analysis of Infrared Meibography Images
Purpose: To develop semi-automated application software that quickly analyzes infrared meibography images taken with the CSO Sirius Topographer (CSO, Italy) and to compare them to the manual analysis system on the device (Phoenix software platform). Methods: A total of 52 meibography images verified as high quality were used and analyzed through manual and semi-automated meibomian gland (MG) detector software in this study. For the manual method, an experienced researcher circumscribed the MGs ...
-
Optimizing NEURON Brain Simulator With Remote Memory Access On Distributed Memory Systems
Authors:Shehzad, Danish; Bozkuş, Zeki
Publisher and Date:(Institute of Electrical and Electronics Engineers Inc., 2016)The Complex neuronal network models require support from simulation environment for efficient network simulations. To compute the models increasing complexity necessitated the efforts to parallelize the NEURON simulation environment. The computational neuroscientists have extended NEURON by dividing the equations for its subnet among multiple processors for increasing the competence of hardware. For spiking neuronal networks inter-processor spikes exchange consume significant portion of overall ...
-
Optimizing NEURON Brain Simulator with Remote Memory Access On Distributed Memory Systems
The Complex neuronal network models require support from simulation environment for efficient network simulations. To compute the models increasing complexity necessitated the efforts to parallelize the NEURON simulation environment. The computational neuroscientists have extended NEURON by dividing the equations for its subnet among multiple processors for increasing the competence of hardware. For spiking neuronal networks inter-processor spikes exchange consume significant portion of overall ...
-
Optimizing NEURON Simulation Environment Using Remote Memory Access with Recursive Doubling on Distributed Memory Systems
Increase in complexity of neuronal network models escalated the efforts to make NEURON simulation environment efficient. The computational neuroscientists divided the equations into subnets amongst multiple processors for achieving better hardware performance. On parallel machines for neuronal networks interprocessor spikes exchange consumes large section of overall simulation time. In NEURON for communication between processors Message Passing Interface (MPI) is used. MPI Allgather collective is ...
-
Performance Improvement of Threshold Based Audio Steganography Using Parallel Computation
Authors:Shoaib, Muhammad; Shehzad, Danish; Umar, Arif Iqbal; Khan, Zakir; Daǧ, Tamer; Ul Amin, Noor
Publisher and Date:(Science & Information SAI Organization Ltd, 2016)Audio steganography is used to hide secret information inside audio signal for the secure and reliable transfer of information. Various steganography techniques have been proposed and implemented to ensure adequate security level. The existing techniques either focus on the payload or security but none of them has ensured both security and payload at same time. Data Dependency in existing solution was reluctant for the execution of steganography mechanism serially. The audio data and secret data ...
-
Threshold-based Steganography: A Novel Technique for Improved Payload and SNR
Authors:Khan, Zakir; Shah, Mohsin; Naeem, Muhammad; Mahmood, Toqeer; Khan, Shah; Amin, Noor Ul; Shehzad, Danish
Publisher and Date:(Zarka Private Univ, 2016)Steganography is the art of hiding user information in various file types including image audio and video. Security of steganography lies in imperceptibility of secret information in the cover image. Human Visual System (HVS) is not able to detect the changes in low color values of an image. To the best of our knowledge none of the available steganographic techniques have exploited this weakness of HVS. In this paper a new LSB technique is presented which hides information in the cover image taking ...