Mohammad Sarosh Umar’s research while affiliated with Aligarh Muslim University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (40)


FIGURE 5: [(a), (c)] are depicting the original fingerprint templates with extracted minutiae 105_4.bmp and 102_3.bmp taken from Public fingerprint database FVC2004 DB1B and [(b), (d)] are their corresponding Mobius transformed template in 2d space. Blue square is representing the extracted minutiae and red square are representing the transformed minutiae with sequence numbers inside square., [(e), (f)] are representing the original & transformed minutiae locations of fingerprints respectively in 3D-space.
FIGURE 9: Score distribution graph in three different cases to analyse the unlikability analysis of computed templates among different database
A Non-Invertible Secure Template Generation Using AES Encrypted MCC and Random Triangle Projection
  • Article
  • Full-text available

January 2025

·

15 Reads

IEEE Access

Mohd Imran

·

Mohammad Sarosh Umar

·

The rapid growth of biometric authentication systems has heightened the need to address privacy and security concerns. The cancellable biometric template generation is one of the promising solutions in this situation which protects both the system and the user’s biometric data from unauthorized access ensuring non-invertibility, unlinkability, and secure template encryption. The random projection-based cancellable biometric template generation is one of the efficient techniques to secure the information of users. However, random projection-based approaches remain vulnerable to attacks where repeated projections may reconstruct the original template. This paper introduces MCC Encoded Random Triangle Hashing, which encodes the projection matrix using minutiae cylindrical codes to prevent template reconstruction in case of matrix leakage. The proposed method is evaluated on six publicly available fingerprint databases FVC2000 DB1, FVC2000 DB2, FVC2002 DB1, FVC2002 DB3, FVC2004 DB1, and FVC2004 DB3 using FMR, FAR, GAR, ROC, and EER metrics, demonstrating improved template security.

Download


Figure 2. Conditional GAN architecture
Figure 3. DCGAN architecture
Figure 4. StyleGAN architecture
Figure 5. Progressive GAN operation
Search results for literature review
Melanoma image synthesis: a review using generative adversarial networks

July 2024

·

109 Reads

Indonesian Journal of Electrical Engineering and Computer Science

Melanoma is a highly malignant skin cancer that may be fatal if not promptly detected and treated. The limited availability of high-quality melanoma images, which are needed for training machine learning models, is one of the obstacles to detecting melanoma. Generative adversarial networks (GANs) have grown in popularity as a strong technique for image synthesis. This research is also targeted at the sustainable development goal (SDG) for health care. In this study, we survey existing GAN-based melanoma image synthesis methods. In this work, we briefly introduce GANs and how they may be used for generating synthetic images. Ensuring healthy lifestyles and promoting well-being for everyone, regardless of age, is the main aim. A comparative study is carried out on how GANs are used in current research to generate melanoma images and how they improve the classification performance of neural networks. Various public and proprietary datasets for training GANs in melanoma image synthesis are also discussed. Lastly, we assess the examined studies' performance using measures like the Frechet Inception distance (FID), Inception score, structural similarity ındex (SSIM), and various classification performance metrics. We compare the evaluated findings and suggest further GAN-based melanoma image-creation research.






An investigation in detection and mitigation of smishing using machine learning techniques

October 2023

·

176 Reads

·

3 Citations

Social Network Analysis and Mining

Mobile devices are currently more susceptible to cyberattacks than other types of devices, such as personal computers, as a result of the effects and development and their common usage in daily life. Mobile phones have text messaging capabilities, often known as SMS (Short Text Messages), which are used by cybercriminals to target people. A malicious program that uses text messages to target smartphone users is frequently referred to as SMS phishing. Smishing is a sort of phishing, although there are several ways in which it differs from phishing, including the amount of information that is included in the SMS and the offensive approach. Then 50 literature works are examined that concentrate on smishing detection and prevention related to the mobile application for this survey to highlight the numerous shortcomings of the present methodologies for smishing prevention and identification in mobile apps. The study of numerous approaches will be clarified in this instance based on many aspects, like significant metrics, publication year and journals, numerical values, and other criteria. This paper also discusses possibilities for future research as well as the difficulties encountered with the detection techniques currently employed in mobile applications.


Phishing detection model using feline finch optimisation-based LSTM classifier

August 2023

·

19 Reads

·

2 Citations

International Journal of Sensor Networks

Phishing detection technologies are essential to ensuring that users have a secure online experience by preventing users from falling prey to online fraud, divulging personal information to an attacker, and other risks. To stop e-mail scams, this research employs the FFO-LSTM classifier to identify phishing websites. The FFO method is used to pick and optimise the relevant parameters from many parameters that the LSTM offers. This reduces the computational complexity of the system and improves performance. The LSTM classifier conducts a more thorough examination of the network, which aids in enhancing the effectiveness of phishing detection. The FFO-LSTM classifier achieved exceptional values of 93.16%, 94.59%, and 92.66%, which illustrates the efficiency of the research. The performance metrics are utilised to illustrate the significance of the research.


Comparative Analysis using Machine Learning Techniques for Detecting and Mitigating Phishing

August 2023

·

9 Reads

·

3 Citations

Phishing is a malicious technique employed by hackers to illicitly obtain confidential user information for their own misuse. In contemporary times, three notable approaches have emerged as effective countermeasures against such attacks: awareness-focused strategies, blacklist-based methods, and machine learning (ML) techniques. Hence, this systematic paper aims to provide researchers, readers, and users with an analysis of diverse proposals from other scholars on how to effectively combat phishing using ML algorithms. The research focuses on phishing detection utilizing ML techniques, establishing a taxonomy of machine learning models by examining their respective advantages and disadvantages. Furthermore, the performance analysis based on the available datasets of the ML classifiers such as NB, SVM, KNN, RF, and ANN is evaluated in terms of the performance metrics and the accuracy values of the classifiers on kfold at 10 is 82.40%, 83.00%, 83.60%, 84.39%, and 84.84%, and TP at 8 is 81.03%, 81.62%, 82.21%, 83.23%, and 83.77%, respectively.


Citations (24)


... Web address features like length of these URLs and use of dashes are good predictors. Domain-specific factors such as the age of the domains are also important [56]. It has also been pointed out that there are various types of features where lexical and network-based features and content feature sets have been identified [7]. ...

Reference:

Benchmarking Machine Learning Techniques for Phishing Detection and Secure URL Classification
Comparative Analysis using Machine Learning Techniques for Detecting and Mitigating Phishing
  • Citing Conference Paper
  • August 2023

... Ao fazer isso, as pessoas idosas podem inadvertidamente instalar software malicioso em seus dispositivos ou divulgar informações pessoais sensíveis. Os ladrões, ao receberem as informações, procedem para retirar dinheiro da conta ou abrir um novo cartão de crédito em nome da vítima (Shoaib;Umar, 2023). ...

An investigation in detection and mitigation of smishing using machine learning techniques

Social Network Analysis and Mining

... (9) introduced a distinctive method by calculating the proportionate distance between input and database URLs, incorporating a Favicon Images Recognition Algorithm alongside established approaches like False Positive and False Negative. (10) Adopted a simple yet effective machine learning approach for phishing URL detection. ...

URL based Phishing Detection using Machine Learning
  • Citing Conference Paper
  • March 2023

... Breast cancer is the most common disease in women caused by the unchecked growth of abnormal cells. Identifying and categorising breast cancer are formidable challenges [24]. Therefore, several modern computational methods have been used to the detection and classification of breast cancer. ...

SaRa: A Novel Activation Function with Application to Melanoma Image Classification

... Blind people have difficulty interacting with their environment and feeling their environment, they have little contact with the environment, since sight is the most important part of human physiology, 83% of the information humans get from the environment is through sight. According to the World Health Organization, more than 40 million people worldwide are blind and another 250 million suffer from some form of visual impairment and, due to age-related diseases such as glaucoma and diabetes, these figures are in an increase [1]- [4]. Today, blind people use a white cane or a relative to help them detect objects while walking. ...

Assistive Stick for Visually Impaired People
  • Citing Conference Paper
  • November 2022

... Generally, CNNs are employed to analyse visual imagery and perform tasks beyond classification. With the advancement in computer hardware and computing speed, they have emerged as a core solution in a wide range of tasks such as Facebook's photo tagging, medical diagnosis, environment, security, self-driving car, waste classification, and event detection to determine people behaviour towards waste [59]. Therefore, CNNs are the best alternative to identify and locate the illegal activities in a city using satellite imagery data. ...

Application of Event Detection to Improve Waste Management Services in Developing Countries

... The study [60]proposes an Electronic Voting Machine to address tampering, fraudulent voting, and security concerns. The design incorporates biometric data, specifically fingerprints, for voter authentication. ...

Secure Electronic Voting Machine using Biometric Authentication
  • Citing Conference Paper
  • March 2022

... According to The World Bank (2022), annual waste generation is expected to increase from 2.24 to 3.88 billion tonnes in 2050, with rapid population growth and urbanization. In addition, more than 33% of the total solid waste generated is not handled in environmentally safer manner (Shahab, Anjum, & Umar, 2022). In Malaysia, almost 38,699 tonnes of solid waste are generated every day, at least 1.17kg per person (TheStar, 2021). ...

Deep Learning Applications in Solid Waste Management: A Deep Literature Review

International Journal of Advanced Computer Science and Applications

... The use of advanced technologies such as the IoT, self-driving cars, and GNSS is a distinguishing feature of modern logistics operations (Joubert et al., 2020). Technological advancements have facilitated improved communication, automation, and waste management process optimization (Anjum et al., 2022;Hannan et al., 2015). ...

Analysis of IoT and Communication Technologies to Develop Waste Management Service Framework for Smart City
  • Citing Chapter
  • February 2022