Papers by sajid mohammadi

Journal of Data and Information Quality
Cyberbullying is a form of abuse, manipulation, or humiliation directed against a single person v... more Cyberbullying is a form of abuse, manipulation, or humiliation directed against a single person via the Internet. CB makes advantage of nasty Internet comments and remarks. It occurs when someone publicly mocks, insults, slanders, criticizes, or mocks another person while remaining anonymous on the Internet. As a result, there is a rising need to create new methods for sifting through data on social media sites for symptoms of cyberbullying. The goal is to lessen the negative consequences of this condition. This article discusses a soft computing-based methodology for detecting cyberbullying in social multimedia data. This model incorporates social media data. Normalization is performed to remove noise from data. To improve a feature, the Particle Swarm Optimization Technique is applied. Feature optimization helps to make cyberbullying detection more accurate. The LSTM model is used to classify things. With the help of social media data, the PSO LSTM model is getting better at findi...

Journal of Food Quality
In recent years, agricultural image processing research has been a key emphasis. Image processing... more In recent years, agricultural image processing research has been a key emphasis. Image processing techniques are used by computers to analyze images. New advancements in image capture and data processing have simplified the resolution of a wide range of agricultural concerns. Crop disease classification and identification are crucial for the agricultural industry’s technical and commercial well-being. In agriculture, image processing begins with a digital color picture of a diseased leaf. Plant health and disease detection must be monitored on a regular basis in property agriculture. Plant diseases have had a tremendous impact on civilization and the Earth as a whole. Extensions of detection strategies and classification methods try to identify and categorize each ailment that affects the plant rather than focusing on a single disease among several illnesses and symptoms. This article describes a new support vector machine and image processing-enabled approach for detecting and clas...

BioMed Research International
A diagnosis of pancreatic cancer is one of the worst cancers that may be received anywhere in the... more A diagnosis of pancreatic cancer is one of the worst cancers that may be received anywhere in the world; the five-year survival rate is very less. The majority of cases of this condition may be traced back to pancreatic cancer. Due to medical image scans, a significant number of cancer patients are able to identify abnormalities at an earlier stage. The expensive cost of the necessary gear and infrastructure makes it difficult to disseminate the technology, putting it out of the reach of a lot of people. This article presents detection of pancreatic cancer in CT scan images using machine PSO SVM and image processing. The Gaussian elimination filter is utilized during the image preprocessing stage of the removal of noise from images. The K means algorithm uses a partitioning technique to separate the image into its component parts. The process of identifying objects in an image and determining the regions of interest is aided by image segmentation. The PCA method is used to extract i...

Computer Systems Science and Engineering
The paper presents a novel Graphics Interchange Format (GIF) Steganography system. The algorithm ... more The paper presents a novel Graphics Interchange Format (GIF) Steganography system. The algorithm uses an animated (GIF) file format video to apply on, a secured and variable image partition scheme for data embedding. The secret data could be any character text, any image, an audio file, or a video file; that is converted in the form of bits. The proposed method uses a variable partition scheme structure for data embedding in the (GIF) file format video. The algorithm estimates the capacity of the cover (GIF) image frames to embed data bits. Our method built variable partition blocks in an empty frame separately and incorporate it with randomly selected (GIF) frames. This way the (GIF) frame is divided into variable block same as in the empty frame. Then algorithm embeds secret data on appropriate pixel of the (GIF) frame. Each selected partition block for data embedding, can store a different number of data bits based on block size. Intruders could never come to know exact position of the secrete data in this stego frame. All the (GIF) frames are rebuild to make animated stego (GIF) video. The performance of the proposed (GIF) algorithm has experimented and evaluated based on different input parameters, like Mean Square Error (MSE) and Peak Signal-to-Noise Ratio (PSNR) values. The results are compared with some existing methods and found that our method has promising results.
International Journal of Image, Graphics and Signal Processing, 2017
In this paper, we propose a novel JPEG image Steganography algorithm based on partition schemes o... more In this paper, we propose a novel JPEG image Steganography algorithm based on partition schemes on image coefficient values. Our method selects the AC and DC coefficients of a JPEG image according to a channel selection method and then identifies appropriate coefficients to store the secret data-bits. As opposed to other reported works, in our algorithm each selected coefficient can store a variable number of data-bits that are decided using the concept called 'Partition Scheme'. Experimental results indicate the suitability of the proposed algorithm as compared to other existing methods.

We are presenting a more secured and nonspecifically dependent on image formats steganography tec... more We are presenting a more secured and nonspecifically dependent on image formats steganography technique for any bmp or JPEG digital images, based on clustering technique. It is a new color image clustering technique used for robust steganography. It can be defined as the persistence of the embedded steganography under image unrests resulting from attacks. Firstly, the image under consideration is divided into 8x8 blocks and then the clusters of blocks, using the Content Addressable Method (CAM). The cluster of blocks is divided into sub-clusters and Payload data are embedded into next level of cluster i.e. sub clusters. Duplication of the same payload data has been achieved through these sub-clusters which prove the robustness of our proposed steganography technique. Moreover, the distribution rate of image sub-clusters over a cluster it is another parameter that can be tuned to improve this robustness. We used this technique and proved with bmp images in previous works and it showe...

Nowadays, one of the most significant challenges that faces many families is baby care. Parents c... more Nowadays, one of the most significant challenges that faces many families is baby care. Parents cannot continuously observe or monitor their babies all the time. Baby monitors help in reassuring millions of parents that their children are safe. Many of baby monitors are available; however, we find that many of them do not fulfil the desired requirements. The aim of this paper is to produce a baby monitor system, which we called smart infant monitoring system that provides highquality features. The idea is to design a system that will simplify the process of monitoring the baby by using Raspberry Pi device. The proposed system will have many features such as: displaying live video and audio, recording audio and playing it to the baby, measuring the room temperature and humidity, supporting Arabic language, determine if the baby is awake or sleep, and the most important characteristic is the ability to listen to the baby noise, which is the cry detection feature. Finally, the proposed system is tested and compared with the current system and proved its effectiveness and functionality.

In today’s Internet communication scenario to guarantee the security of data being transmitted an... more In today’s Internet communication scenario to guarantee the security of data being transmitted and to believe on the integrity and authenticity of data, the hash function play very important role. It is one of the fundamental tools in security algorithms. There are studies that show the security flaws in widely used hash functions. Thus it is the need of the hour to have a new hash function design to enhance the security and authenticity of data, in turn network communication. In the proposed work we are presenting a new message digest scheme, based on an ASCII character and random numbers. The algorithm also uses secretly designed character filter to generate the final Hash key. Different hashing performances tests are evaluated like statistical property analysis, collision analysis, absolute difference, and uniqueness test by changing original message conditions. Results of these tests are promising. The mean changed probabilities are greater than 50%, low collision frequency, and...
Implementation of Novel and Secured Parking Lot System Using Image Hashing and Matlab
International Journal of Engineering Research and Technology
Digital Colour Image Steganography for PNG Format and Secured Based on Encoding and Clustering
International Journal of Engineering Research and Technology
International Journal of Computer Network and Information Security
Steganography is the technique for exchanging concealed secret information in a way to avoid susp... more Steganography is the technique for exchanging concealed secret information in a way to avoid suspicion. The aim of Steganography is to transfer secrete message to another party by hiding the data in a cover object, so that the imposter who monitors the traffic should not distinguish between genuine secret message and the cover object. This paper presents the comparative study and performance analysis of different image Steganography methods using various types of cover media ((like BMP/JPEG/PNG etc.) with the discussion of their file formats. We also discuss the embedding domains along with a discussion on salient technical properties, applications, limitations, and Steganalysis.
International Journal of Computer Network and Information Security, Jan 8, 2019
Steganography is the technique for exchanging concealed secret information in a way to avoid susp... more Steganography is the technique for exchanging concealed secret information in a way to avoid suspicion. The aim of Steganography is to transfer secrete message to another party by hiding the data in a cover object, so that the imposter who monitors the traffic should not distinguish between genuine secret message and the cover object. This paper presents the comparative study and performance analysis of different image Steganography methods using various types of cover media ((like BMP/JPEG/PNG etc.) with the discussion of their file formats. We also discuss the embedding domains along with a discussion on salient technical properties, applications, limitations, and Steganalysis.
Uploads
Papers by sajid mohammadi