Claim Missing Document
Check
Articles

Found 30 Documents
Search

Research trends review on RSA scheme of asymmetric cryptography techniques Mohd Saiful Adli Mohamad; Roshidi Din; Jasmin Ilyani Ahmad
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2493

Abstract

One of the cryptography classifications is asymmetric cryptography, which uses two different keys to encrypt and decrypt the message. This paper discusses a review of RSA scheme of asymmetric cryptography techniques. It is trying to present the domains of RSA scheme used including in public network, wireless sensor network, image encryption, cloud computing, proxy signature, Internet of Things and embedded device, based on the perspective of researchers’ effort in the last decade. Other than that, this paper reviewed the trends and the performance metrics of RSA scheme such as security, speed, efficiency, computational complexity and space based on the number of researches done. Finally, the technique and strengths of the proposed scheme are also stated in this paper. 
Steganography analysis techniques applied to audio and image files Roshidi Din; Alaa Jabbar Qasim
Bulletin of Electrical Engineering and Informatics Vol 8, No 4: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (214.361 KB) | DOI: 10.11591/eei.v8i4.1626

Abstract

The present work carries out a descriptive analysis of the main steganography techniques used in specific digital media such as audio and image files. For this purpose, a literary review of the domains, methods, and techniques as part of this set was carried out and their functioning, qualities, and weaknesses are identified. Hence, it is concluded that there is a wide relationship between audio and image steganography techniques in their implementation form. Nevertheless, it is determined that LSB is one of the weakest techniques, but the safest and the most robust technique within each type of the presented medium.
The evaluation performance of letter-based technique on text steganography system Roshidi Din; Rosmadi Bakar; Sunariya Utama; Jamaluddin Jasmis; Shamsul Jamel Elias
Bulletin of Electrical Engineering and Informatics Vol 8, No 1: March 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (386.851 KB) | DOI: 10.11591/eei.v8i1.1440

Abstract

Steganography is a part of information hiding in covering the hidden message in any medium such as text, image, audio, video and others. This paper concerns about the implementation of steganography in text domain called text steganography. It intends to concentrate on letter-based technique as one of the representative techniques in text steganography. This paper displays some techniques of letter-based that is integrated in one system technique displayeed in a logical and physical design. The integrated system is evaluated using some parameter that is used in order to discover the performance in term of capacity after embedding process and the time consuming in the development process. This paper is anticipated to contribute in describing the implementation of the techniques in one system and to display the performance some parameter evaluation.
Traid-bit embedding process on Arabic text steganography method Roshidi Din; Reema Ahmed Thabit; Nur Izura Udzir; Sunariya Utama
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2518

Abstract

The enormous development in the utilization of the Internet has driven by a continuous improvement in the region of security. The enhancement of the security embedded techniques is applied to save the intellectual property. There are numerous types of security mechanisms. Steganography is the art and science of concealing secret information inside a cover media such as image, audio, video and text, without drawing any suspicion to the eavesdropper. The text is ideal for steganography due to its ubiquity. There are many steganography embedded techniques used Arabic language to embed the hidden message in the cover text. Kashida, Shifting Point and Sharp-edges are the three Arabic steganography embedded techniques with high capacity. However, these three techniques have lack of performance to embed the hidden message into the cover text. This paper present about traid-bit method by integrating these three Arabic text steganography embedded techniques. It is an effective way to evaluate many embedded techniques at the same time, and introduced one solution for various cases.
Analysis review on spatial and transform domain technique in digital steganography Farah Qasim Ahmed Alyousuf; Roshidi Din; Alaa Jabbar Qasim
Bulletin of Electrical Engineering and Informatics Vol 9, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (461.052 KB) | DOI: 10.11591/eei.v9i2.2068

Abstract

This paper presents several techniques used in digital steganography in term of spatial and transform domain. Additionally, it analyses the performance and the metric evaluation of the techniques used in digital steganography based on spatial and transform domain. This paper aims to identify the main mediums of digital steganography, which are image-based, video-based and audio-based, in order to recognize the various techniques used with them. As a result, the primary technique used in the digital medium was LSB technique in the spatial domain, while in the transform domain, the main technique used was differentiated between DTC and DWT. Meanwhile, the common domain utilized in digital steganography was the spatial domain due to its simplicity and high embedding capacity. The future efforts for this paper will be considering the feature based in text steganography.
Performance analysis on secured data method in natural language steganography Roshidi Din; Rosmadi Bakar; Raihan Sabirah Sabri; Mohamad Yusof Darus; Shamsul Jamel Elias
Bulletin of Electrical Engineering and Informatics Vol 8, No 1: March 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (430.165 KB) | DOI: 10.11591/eei.v8i1.1441

Abstract

The rapid amount of exchange information that causes the expansion of the internet during the last decade has motivated that a research in this field. Recently, steganography approaches have received an unexpected attention. Hence, the aim of this paper is to review different performance metric; covering the decoding, decrypting and extracting performance metric. The process of data decoding interprets the received hidden message into a code word. As such, data encryption is the best way to provide a secure communication. Decrypting take an encrypted text and converting it back into an original text. Data extracting is a process which is the reverse of the data embedding process. The effectiveness evaluation is mainly determined by the performance metric aspect. The intention of researchers is to improve performance metric characteristics. The evaluation success is mainly determined by the performance analysis aspect. The objective of this paper is to present a review on the study of steganography in natural language based on the criteria of the performance analysis. The findings review will clarify the preferred performance metric aspects used. This review is hoped to help future research in evaluating the performance analysis of natural language in general and the proposed secured data revealed on natural language steganography in specific.
Analysis review on feature-based and word-rule based techniques in text steganography Farah Qasim Ahmed Alyousuf; Roshidi Din
Bulletin of Electrical Engineering and Informatics Vol 9, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (305.125 KB) | DOI: 10.11591/eei.v9i2.2069

Abstract

This paper presents several techniques used in text steganography in term of feature-based and word-rule based. Additionally, it analyses the performance and the metric evaluation of the techniques used in text steganography. This paper aims to identify the main techniques of text steganography, which are feature-based, and word-rule based, to recognize the various techniques used with them. As a result, the primary technique used in the text steganography was feature-based technique due to its simplicity and secured. Meanwhile, the common parameter metrics utilized in text steganography were security, capacity, robustness, and embedding time. Future efforts are suggested to focus on the methods used in text steganography.
Increasing data storage of coloured QR code using compress, multiplexing and multilayered technique Azizi Abas; Yuhanis Yusof; Roshidi Din; Fazli Azali; Baharudin Osman
Bulletin of Electrical Engineering and Informatics Vol 9, No 6: December 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v9i6.2481

Abstract

Quick response (QR) code is a printed code of black and white squares that is able to store data without the use of any of the electronic devices. There are many existing researches on coloured QR code to increase the storage capacity but from time to time the storage capacity still need to be improved. This paper proposes the use ofcompress, multiplexing and multilayered techniques, as an integrated technique known as CoMM, to increase the storage of the existing QR code. The American Standard Code for Information Interchange (ASCII) text characters are used as an input and performance is measured by the number of characters that can be stored in a single black and white QR code version 40. The experiment metrics also include percentage of missing characters, number of produced QR code, and elapsed time to create the QR code. Simulation results indicate that the proposed algorithm stores 24 times more characters than the black and white QR code and 9 times more than other coloured QR code. Hence, this shows that the coloured QR code has the potential of becoming useful mini-data storage as it does not rely on internet connection.
Review on techniques and file formats of image compression Alaa Jabbar Qasim; Roshidi Din; Farah Qasim Ahmed Alyousuf
Bulletin of Electrical Engineering and Informatics Vol 9, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (860.484 KB) | DOI: 10.11591/eei.v9i2.2085

Abstract

This paper presents a review of the compression technique in digital image processing. As well as a brief description of the main technologies and traditional format that commonly used in image compression. It can be defined as image compression a set of techniques that are applied to the images to store or transfer them in an effective way. In addition, this paper presents formats that use to reduce redundant information in an image, unnecessary pixels and non-visual redundancy. The conclusion of this paper The results for this paper concludes that image compression is a critical issue in digital image processing because it allows us to store or transmit image data efficiently.
The evaluation performance of letter-based technique on text steganography system Roshidi Din; Rosmadi Bakar; Sunariya Utama; Jamaluddin Jasmis; Shamsul Jamel Elias
Bulletin of Electrical Engineering and Informatics Vol 8, No 1: March 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (522.055 KB) | DOI: 10.11591/eei.v8i1.1440

Abstract

Steganography is a part of information hiding in covering the hidden message in any medium such as text, image, audio, video and others. This paper concerns about the implementation of steganography in text domain called text steganography. It intends to concentrate on letter-based technique as one of the representative techniques in text steganography. This paper displays some techniques of letter-based that is integrated in one system technique displayeed in a logical and physical design. The integrated system is evaluated using some parameter that is used in order to discover the performance in term of capacity after embedding process and the time consuming in the development process. This paper is anticipated to contribute in describing the implementation of the techniques in one system and to display the performance some parameter evaluation.