
Zia U SaquibCentre for Development of Advanced Computing, Mumbai
Zia U Saquib
PhD Electrical Engineering
About
54
Publications
19,969
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
505
Citations
Introduction
Skills and Expertise
Additional affiliations
January 1989 - December 1991
Publications
Publications (54)
Turbo Codes and Tail Biting Convolutional Codes are used for channel coding in LTE, but these codes are not pertinent in 5G. For Channel coding, advanced error correction techniques are required for the 5G. Polar codes are adopted for control information and LDPC codes are required for Data information for the 5G. Various coding techniques such as...
Speech enhancement using Kalman filter is an extensively researched area. The vast majority of work done in this area uses linear predictive coding (LPC) for modeling speech signal. A few important studies have revealed the superiority of Mel Frequency Cepstral Coefficients (MFCC) over LPC for speech recognition. With this paper, the shortcomings o...
In general for any speech processing, represented speech signals are pre-processed for some features at front end and some estimation are performed at back end. Hidden Markov Model is exclusively used for modeling time-varying vector sequences due to its simplicity. It also provides high accuracy in non-stationary environment. In this paper, HTK (H...
Recent development in e-Governance would like to leverage digital signature capabilities, but facing challenges due to lack in user experience, technology and procedural challenges associated with it. Digital signature as part of Public Key Cryptography is a well-known mechanism to carry out digital authentication and verification of electronic tra...
Key management is a core mechanism to ensure the security of information in communication channels. Secret key is used for encryption and decryption in cryptographic security modules. Security of communication relies on secure and robust distribution of secret keys. Key need to be renewed periodically to prevent compromise the key. Most of the key...
Power grid is an important element of the cyber physical systems. Attacks on such infrastructure may have catastrophic impact and hence the mitigation solutions for the attacks are necessary. It is impractical to test attacks and mitigation strategies on real networks. A testbed as a platform bridges the cyber-physical divide by bringing in the phy...
Electronic authentication (a.k.a e-Authentication) is the process of establishing confidence in a user's identity electronically presented to an information system. In today's world of exploding internet usage and adoption of eGovernance and e-Commerce initiatives in countries across the world, it is imperative that a user is identified with confid...
Recently periocular biometrics has drawn lot of attention of researchers and some efforts have been presented in the literature. In this paper, we propose a novel and robust approach for periocular recognition. In the approach face is detected in still face images which is then aligned and normalized. We utilized entire strip containing both the ey...
Mobile Seva/ Mobile Governance is a revolutionary framework which is aimed at leveraging the exponential growth that has happened in the wireless communication technology and the far-reaching acceptability it has received in the country. It has been conceptualized and formulated by the Department of Electronics
and Information Technology (DeitY), G...
The compelling need for establishing the identity of a person is becoming critical in our vastly interconnected society. Biometrics is beginning to gain wide acceptance as a legitimate method for determining an individual’s identity in India. Minutiae features extracted from fingerprint images are widely used for automated fingerprint recognition....
Supervisory Control and Data Acquisition (SCADA) systems, control and monitor utility infrastructure, such as electricity, gas, water etc, which happen to be part of critical infrastructure. Existing SCADA systems were originally designed for reliability. Initial SCADA systems used proprietary protocols like Modbus, DNP3 to access sensed data and i...
Supervisory Control and Data Acquisition (SCADA) systems, control and monitor utility infrastructure, such as electricity, gas, water etc. Existing SCADA systems were originally designed for reliability. These initial SCADA systems used proprietary protocols over hub and spoke modem enabled networks to access sensed data and initiate supervisory co...
This paper surveys the various initiatives and challenges of Mobile based Public Services in India. Mobile based channels e.g. SMS, USSD, IVRS, GPRS/3G and Mobile Applications using these channels are being explored for public services delivery. The DeitY (Department of Electronics and Information Technology), Government of India in collaboration w...
In this paper we proposed a novel multimodal biometric approach using iris and periocular biometrics to improve the performance of iris recognition in case of non-ideal iris images. Though iris recognition has the highest accuracy among all the available biometrics, still the noises at the image acquisition stage degrade the recognition accuracy. T...
Unique Identity (Aadhaar) is issued by Unique Identification Authority of India (UIDAI) to the residents of India. With Aadhaar enrolment happening in full swing across the country, there is a strong need to formulate and furnish Aadhaar-enabled Service Delivery for the citizens. The National e-Governance Service Delivery Gateway (NSDG) as a messag...
Periocular recognition is an emerging field of research and people have experimented with some feature extraction techniques to extract robust and unique features from the periocular region. In this paper, we propose a novel feature extraction approach to use periocular region as a biometric trait. In this approach we first applied Local Binary Pat...
Iris recognition is seen as a highly reliable biometric technology. The performance of iris recognition is severely impacted when encountering poor quality images. The selection of the features subset and the classification is an important issue for iris biometrics. Here, we explored the contribution of collarette region in identifying a person. We...
Periocular recognition is an emerging field of research and people have experimented with some feature extraction techniques to extract robust and unique features from the periocular region. In this paper, we propose a novel approach to use periocular region as a biometric trait. In this approach we first applied Local Binary Patterns (LBPs) to ext...
Legacy SCADA systems are inherently insecure. They were built using specialized and proprietary protocols and used serial link, radio or leased line for communication. As these protocols were little known and specific to the industry they catered to, security was not important for them. But, recently because of increased terrorist attacks and migra...
Border security is becoming increasingly important to nations and there is a conflicting requirement not to impede movement of individuals across borders. Seafarers who conduct their trade on merchant ships require a quick resolution of their identity in international territories so that they can perform their duties. The shipping industry is vital...
Security of SCADA (supervisory Control and Data Acquisition) has become a challenging issue today because of its connectivity with the outside world and remote access to the system. One major challenge in the SCADA systems is securing the data over the communication channel. PKI (public key infrastructure) is a well known framework for securing the...
Key management in SCADA (Supervisory Control And Data Acquisition) networks is a major challenge today. Due to resource constraints and latency requirements in such networks, it is infeasible to use traditional key management schemes such as RSA based PKC (Public key cryptography). In this paper, we propose a key management scheme, making use of Id...
DSN is a special network which can provide a useful interface to the real world with their data acquisition and processing
capabilities. However, DSN is extremely vulnerable against any type of internal or external attacks, due to resource constraints,
lack of tamper-resistant packages, and the nature of its communication channels. Therefore, it is...
SCADA (supervisory Control and Data Acquisition) security has become a challenge in today’s scenario because of its connectivity with the world and remote access to the system. Major challenge in the SCADA systems is securing the data over the communication channel.
PKI (public key infrastructure) is an established framework to make the communicati...
Diffie-Hellman key exchange protocol is a well known protocol for establishing the key on the open channel but due to man-in-middle
attack confidentiality of the message might be compromised. Public Key Infrastructure (PKI) requires a central authority or
trusted third party to provide fundamental security services. To address above issues like tru...
Multicast gives large-scale content distribution by providing an efficient transport mechanism for one-to-many and many-to-many
communications. There are various security issues in multicast communication, related to the nature of multicast. Group Diffie-Hellman
key exchange protocol is a well known protocol for establishing common key on the open...
Singular point detection is one of the most crucial processes in fingerprint recognition systems. Singular points are used for fingerprint classification, matching and alignment. This paper presents a method for reliable detection of singular points, which is largely insensitive to the degradation of fingerprint quality. The approach involves two p...
In automated fingerprint identification systems, an efficient and accurate alignment algorithm in the preprocessing stage plays a crucial role in the performance of the whole system, affecting greatly the speed and accuracy otherwise. This paper proposes a fusion scheme (weighted sum) for aligning the enrolled and query images using modified ring m...
The detection of singular points (SP), the core and delta points is an important step for automatic fingerprint identification system (AFIS). The number and location of singular points, are used to classify fingerprint images into five general groups; and therefore to narrow down the search space in large fingerprint databases. This paper proposes...
At present it is almost impossible to detect zero day attack with help of supervised anomaly detection methods. Unsupervised techniques also have the drawback of low detection rate in spite of detection of zero day attacks. Using combination of both unsupervised and supervised methods, promising detection results can be produced. In this paper we p...
This paper presents a novel scheme for the detection and extraction of sweat pores (categorized as one of the fingerprint level 3 micro features). The proposed scheme seamlessly fuses two distinct methods into a novel model capable of obtaining good results from fingerprint images captured through optical live-scan devices with resolutions ranging...
The performance of an automatic fingerprint authentication system relies heavily on the quality of the captured fingerprint images. The error rates of such systems can significantly be decreased just by detecting and removing poor quality images right at the early stages. In this paper, an effective quality estimation scheme is proposed, which perf...
Poor-quality images mostly result in spurious or missing features, which further degrade the overall performance of the recognition systems. This work augments the fingerprint quality with respect to one of the level 3 micro features, i.e., sweat pores. The paper proposes sweat pores-based an effective fingerprint quality estimation scheme, which i...
Security of SCADA (supervisory Control and Data Acquisition) has become a challenging issue today because of its connectivity with the outside world and remote access to the system. One major challenge in the SCADA systems is securing the data over the communication channel. PKI (public key infrastructure) is a well known framework for securing the...
Human listeners are capable of identifying a speaker, over the telephone or an entryway out of sight, by listening to the
voice of the speaker. Achieving this intrinsic human specific capability is a major challenge for Voice Biometrics. Like human
listeners, voice biometrics uses the features of a person’s voice to ascertain the speaker’s identity...
SCADA (Supervisory Control And Data Acquisition) security has become a challenging issue today because of its connectivity with the outside world and remote access to the system. One critical security aspect for SCADA systems is that the communication needs to be secured. Several techniques have been proposed for securing the communication channels...
The term eGovernment is widely used by many individuals, academic institutions, and professional bodies, governmental and private agencies. It has become an agreed neologism despite the fact that till now there has not been a universal understanding about the concept behind the term "eGovernment". We firmly believe that awareness about a concept or...
Infrared imagery of 512 x 512 pixels were processed with 128 x 128 arrays by computer simulation of an optical correlator using various correlation filters. Pyramidal processing using binary phase-only filters (BPOFs), synthetic discriminant function (SDF) filters, and feature-based filters was used to process an entire image in parallel at differe...
Voiceprint Recognition System also known as a Speaker Recognition System (SRS) is the best-known commercialized forms of voice Biometrics. Automated speaker recognition is the computing task of validating a user's claimed identity using characteristics extracted from their voices. In contrast to other biometric technologies which are mostly image b...