Zia U Saquib

Zia U Saquib
Centre for Development of Advanced Computing, Mumbai

PhD Electrical Engineering

About

54
Publications
19,969
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
505
Citations
Introduction
Additional affiliations
January 1989 - December 1991
Florida Institute of Technology
Position
  • Research Assistant

Publications

Publications (54)
Chapter
Turbo Codes and Tail Biting Convolutional Codes are used for channel coding in LTE, but these codes are not pertinent in 5G. For Channel coding, advanced error correction techniques are required for the 5G. Polar codes are adopted for control information and LDPC codes are required for Data information for the 5G. Various coding techniques such as...
Conference Paper
Speech enhancement using Kalman filter is an extensively researched area. The vast majority of work done in this area uses linear predictive coding (LPC) for modeling speech signal. A few important studies have revealed the superiority of Mel Frequency Cepstral Coefficients (MFCC) over LPC for speech recognition. With this paper, the shortcomings o...
Conference Paper
In general for any speech processing, represented speech signals are pre-processed for some features at front end and some estimation are performed at back end. Hidden Markov Model is exclusively used for modeling time-varying vector sequences due to its simplicity. It also provides high accuracy in non-stationary environment. In this paper, HTK (H...
Conference Paper
Full-text available
Recent development in e-Governance would like to leverage digital signature capabilities, but facing challenges due to lack in user experience, technology and procedural challenges associated with it. Digital signature as part of Public Key Cryptography is a well-known mechanism to carry out digital authentication and verification of electronic tra...
Article
Full-text available
Key management is a core mechanism to ensure the security of information in communication channels. Secret key is used for encryption and decryption in cryptographic security modules. Security of communication relies on secure and robust distribution of secret keys. Key need to be renewed periodically to prevent compromise the key. Most of the key...
Conference Paper
Full-text available
Power grid is an important element of the cyber physical systems. Attacks on such infrastructure may have catastrophic impact and hence the mitigation solutions for the attacks are necessary. It is impractical to test attacks and mitigation strategies on real networks. A testbed as a platform bridges the cyber-physical divide by bringing in the phy...
Conference Paper
Electronic authentication (a.k.a e-Authentication) is the process of establishing confidence in a user's identity electronically presented to an information system. In today's world of exploding internet usage and adoption of eGovernance and e-Commerce initiatives in countries across the world, it is imperative that a user is identified with confid...
Conference Paper
Full-text available
Recently periocular biometrics has drawn lot of attention of researchers and some efforts have been presented in the literature. In this paper, we propose a novel and robust approach for periocular recognition. In the approach face is detected in still face images which is then aligned and normalized. We utilized entire strip containing both the ey...
Conference Paper
Mobile Seva/ Mobile Governance is a revolutionary framework which is aimed at leveraging the exponential growth that has happened in the wireless communication technology and the far-reaching acceptability it has received in the country. It has been conceptualized and formulated by the Department of Electronics and Information Technology (DeitY), G...
Article
The compelling need for establishing the identity of a person is becoming critical in our vastly interconnected society. Biometrics is beginning to gain wide acceptance as a legitimate method for determining an individual’s identity in India. Minutiae features extracted from fingerprint images are widely used for automated fingerprint recognition....
Conference Paper
Full-text available
Supervisory Control and Data Acquisition (SCADA) systems, control and monitor utility infrastructure, such as electricity, gas, water etc, which happen to be part of critical infrastructure. Existing SCADA systems were originally designed for reliability. Initial SCADA systems used proprietary protocols like Modbus, DNP3 to access sensed data and i...
Conference Paper
Full-text available
Supervisory Control and Data Acquisition (SCADA) systems, control and monitor utility infrastructure, such as electricity, gas, water etc. Existing SCADA systems were originally designed for reliability. These initial SCADA systems used proprietary protocols over hub and spoke modem enabled networks to access sensed data and initiate supervisory co...
Conference Paper
Full-text available
This paper surveys the various initiatives and challenges of Mobile based Public Services in India. Mobile based channels e.g. SMS, USSD, IVRS, GPRS/3G and Mobile Applications using these channels are being explored for public services delivery. The DeitY (Department of Electronics and Information Technology), Government of India in collaboration w...
Conference Paper
Full-text available
In this paper we proposed a novel multimodal biometric approach using iris and periocular biometrics to improve the performance of iris recognition in case of non-ideal iris images. Though iris recognition has the highest accuracy among all the available biometrics, still the noises at the image acquisition stage degrade the recognition accuracy. T...
Conference Paper
Unique Identity (Aadhaar) is issued by Unique Identification Authority of India (UIDAI) to the residents of India. With Aadhaar enrolment happening in full swing across the country, there is a strong need to formulate and furnish Aadhaar-enabled Service Delivery for the citizens. The National e-Governance Service Delivery Gateway (NSDG) as a messag...
Conference Paper
Periocular recognition is an emerging field of research and people have experimented with some feature extraction techniques to extract robust and unique features from the periocular region. In this paper, we propose a novel feature extraction approach to use periocular region as a biometric trait. In this approach we first applied Local Binary Pat...
Article
Full-text available
Iris recognition is seen as a highly reliable biometric technology. The performance of iris recognition is severely impacted when encountering poor quality images. The selection of the features subset and the classification is an important issue for iris biometrics. Here, we explored the contribution of collarette region in identifying a person. We...
Conference Paper
Full-text available
Periocular recognition is an emerging field of research and people have experimented with some feature extraction techniques to extract robust and unique features from the periocular region. In this paper, we propose a novel approach to use periocular region as a biometric trait. In this approach we first applied Local Binary Patterns (LBPs) to ext...
Article
Legacy SCADA systems are inherently insecure. They were built using specialized and proprietary protocols and used serial link, radio or leased line for communication. As these protocols were little known and specific to the industry they catered to, security was not important for them. But, recently because of increased terrorist attacks and migra...
Article
Border security is becoming increasingly important to nations and there is a conflicting requirement not to impede movement of individuals across borders. Seafarers who conduct their trade on merchant ships require a quick resolution of their identity in international territories so that they can perform their duties. The shipping industry is vital...
Article
Full-text available
Security of SCADA (supervisory Control and Data Acquisition) has become a challenging issue today because of its connectivity with the outside world and remote access to the system. One major challenge in the SCADA systems is securing the data over the communication channel. PKI (public key infrastructure) is a well known framework for securing the...
Article
Full-text available
Key management in SCADA (Supervisory Control And Data Acquisition) networks is a major challenge today. Due to resource constraints and latency requirements in such networks, it is infeasible to use traditional key management schemes such as RSA based PKC (Public key cryptography). In this paper, we propose a key management scheme, making use of Id...
Conference Paper
Full-text available
DSN is a special network which can provide a useful interface to the real world with their data acquisition and processing capabilities. However, DSN is extremely vulnerable against any type of internal or external attacks, due to resource constraints, lack of tamper-resistant packages, and the nature of its communication channels. Therefore, it is...
Conference Paper
SCADA (supervisory Control and Data Acquisition) security has become a challenge in today’s scenario because of its connectivity with the world and remote access to the system. Major challenge in the SCADA systems is securing the data over the communication channel. PKI (public key infrastructure) is an established framework to make the communicati...
Conference Paper
Diffie-Hellman key exchange protocol is a well known protocol for establishing the key on the open channel but due to man-in-middle attack confidentiality of the message might be compromised. Public Key Infrastructure (PKI) requires a central authority or trusted third party to provide fundamental security services. To address above issues like tru...
Conference Paper
Multicast gives large-scale content distribution by providing an efficient transport mechanism for one-to-many and many-to-many communications. There are various security issues in multicast communication, related to the nature of multicast. Group Diffie-Hellman key exchange protocol is a well known protocol for establishing common key on the open...
Article
Full-text available
Singular point detection is one of the most crucial processes in fingerprint recognition systems. Singular points are used for fingerprint classification, matching and alignment. This paper presents a method for reliable detection of singular points, which is largely insensitive to the degradation of fingerprint quality. The approach involves two p...
Article
Full-text available
In automated fingerprint identification systems, an efficient and accurate alignment algorithm in the preprocessing stage plays a crucial role in the performance of the whole system, affecting greatly the speed and accuracy otherwise. This paper proposes a fusion scheme (weighted sum) for aligning the enrolled and query images using modified ring m...
Article
The detection of singular points (SP), the core and delta points is an important step for automatic fingerprint identification system (AFIS). The number and location of singular points, are used to classify fingerprint images into five general groups; and therefore to narrow down the search space in large fingerprint databases. This paper proposes...
Article
Full-text available
At present it is almost impossible to detect zero day attack with help of supervised anomaly detection methods. Unsupervised techniques also have the drawback of low detection rate in spite of detection of zero day attacks. Using combination of both unsupervised and supervised methods, promising detection results can be produced. In this paper we p...
Conference Paper
This paper presents a novel scheme for the detection and extraction of sweat pores (categorized as one of the fingerprint level 3 micro features). The proposed scheme seamlessly fuses two distinct methods into a novel model capable of obtaining good results from fingerprint images captured through optical live-scan devices with resolutions ranging...
Conference Paper
The performance of an automatic fingerprint authentication system relies heavily on the quality of the captured fingerprint images. The error rates of such systems can significantly be decreased just by detecting and removing poor quality images right at the early stages. In this paper, an effective quality estimation scheme is proposed, which perf...
Article
Full-text available
Poor-quality images mostly result in spurious or missing features, which further degrade the overall performance of the recognition systems. This work augments the fingerprint quality with respect to one of the level 3 micro features, i.e., sweat pores. The paper proposes sweat pores-based an effective fingerprint quality estimation scheme, which i...
Article
Full-text available
Security of SCADA (supervisory Control and Data Acquisition) has become a challenging issue today because of its connectivity with the outside world and remote access to the system. One major challenge in the SCADA systems is securing the data over the communication channel. PKI (public key infrastructure) is a well known framework for securing the...
Conference Paper
Full-text available
Human listeners are capable of identifying a speaker, over the telephone or an entryway out of sight, by listening to the voice of the speaker. Achieving this intrinsic human specific capability is a major challenge for Voice Biometrics. Like human listeners, voice biometrics uses the features of a person’s voice to ascertain the speaker’s identity...
Article
Full-text available
SCADA (Supervisory Control And Data Acquisition) security has become a challenging issue today because of its connectivity with the outside world and remote access to the system. One critical security aspect for SCADA systems is that the communication needs to be secured. Several techniques have been proposed for securing the communication channels...
Conference Paper
Full-text available
The term eGovernment is widely used by many individuals, academic institutions, and professional bodies, governmental and private agencies. It has become an agreed neologism despite the fact that till now there has not been a universal understanding about the concept behind the term "eGovernment". We firmly believe that awareness about a concept or...
Article
Infrared imagery of 512 x 512 pixels were processed with 128 x 128 arrays by computer simulation of an optical correlator using various correlation filters. Pyramidal processing using binary phase-only filters (BPOFs), synthetic discriminant function (SDF) filters, and feature-based filters was used to process an entire image in parallel at differe...
Article
Full-text available
Voiceprint Recognition System also known as a Speaker Recognition System (SRS) is the best-known commercialized forms of voice Biometrics. Automated speaker recognition is the computing task of validating a user's claimed identity using characteristics extracted from their voices. In contrast to other biometric technologies which are mostly image b...

Network

Cited By