Claim Missing Document
Check
Articles

Found 13 Documents
Search
Journal : Indonesian Journal of Electrical Engineering and Computer Science

Evaluation review of effectiveness and security metrics performance on information technology domain Roshidi Din; Rosmadi Bakar; Azizan Ismail; Aida Mustapha; Sunariya Utama
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 2: November 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i2.pp1059-1064

Abstract

Information Technology (IT) development is the vital required for human life activities in this global era. This implementation of IT system has becomes competitive among developers to increase the quality of system performance. In order to discover the IT performance of system, it neccesary to evaluate the IT implementation performance. It determines the anticipated system output to prepare to enhance the application performance. In this paper the evaluation performance that is reviewd are effectiveness and security metrics because both of evaluations able to improve the development and protection of system. Therefore, this paper classifies some IT domain development that used in term of effectiveness and security metric approach from previous researchers’ effort. It is categorized the domain based on both evaluation term of effectiveness and security metrics from specific parameter their used. The concern of this paper is to discover the important effectiveness and security metrics in IT domain performance that is anticipated to achieve expected performance.
Review on secured data capabilities of cryptography, steganography, and watermarking domain Farah Qasim Ahmed Al-Yousuf; Roshidi Din
Indonesian Journal of Electrical Engineering and Computer Science Vol 17, No 2: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v17.i2.pp1053-1058

Abstract

Due to the increment of using Internet to transfer the critical and secret data, many studies interested in secured data and investigated many ways to secure the transferred information. This paper presents a review study on the field that used in a secured data domain. The main objective of this study is explore the capabilities of secured data that used widely by researchers. Furthermore, the benefits and the drawbacks for each of secured data domain are also studied. This paper concludes that cryptography techniques could be utilized with steganography and watermarking in secured data domain to enhance the security mechanisms.
Evaluation Review on Effectiveness and Security Performances of Text Steganography Technique Roshidi Din; Sunariya Utama; Aida Mustapha
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: August 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v11.i2.pp747-754

Abstract

Steganography is one of the categories in information hiding that is implemented to conceal the hidden message to ensure it cannot be recognized by human vision. This paper focuses on steganography implementation in text domain namely text steganography. Text steganography consists of two groups, which are word-rule based and feature-based techniques. This paper analysed these two categories of text steganography based on effectiveness and security evaluation because the effectiveness is critically important in order to determine that technique has the appropriate quality. Meanwhile, the security is important due to the intensity performance in securing the hidden message. The main goal of this paper is to review the evaluation of text steganography in terms of effectiveness and security that have been developed by previous research efforts. It is anticipated that this paper will identify the performance of text steganography based on effectiveness and security measurement.
Substitution-based linguistic steganography based on antonyms Fawwaz Zamir Mansor; Azizan Ismail; Roshidi Din; Aida Mustapha; Noor Azah Samsudin
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 1: October 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i1.pp530-538

Abstract

The study of steganography focuses on strengthening the security in protecting content message by hiding the true intention behind the texts. However, existing linguistic steganography approach especially in synonym-based substitution is prone to attack. In this paper, a new substitution-based approach for linguistic steganography is proposed using antonyms. The antonym-based stego-text generation algorithm is implemented in a tool called the Antonym Substitution-based (ASb). Evaluation of ASb was carried out via verification and validation. The results showed highly favorable performance of this approach.
Analysis review on linguistic steganalysis Syiham Mohd Lokman; Aida Mustapha; Azizan Ismail; Roshidi Din
Indonesian Journal of Electrical Engineering and Computer Science Vol 17, No 2: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v17.i2.pp950-956

Abstract

Steganography and steganalysis are essential topics for hiding information. Steganography is a technique of conceal secret messages by transmitting data through different domains. Its objective is to avoid discovery of secret messages. Steganalysis, meanwhile, is a method for locating the secret messages contained in the stego text. The objective of steganalysis is to find concealed data and to break the security of its domains. Steganalysis can be categorized into two types: targeted steganalysis and blind steganalysis. Steganography and steganalysis both have domains that are split into natural, also known as linguistic and digital media. There are three kinds of digital media which are picture, video and audio. The aim of this paper is to provide a survey on different linguistic steganalysis techniques used to find secret messages. This paper also highlighted two type of steganalysis method that are used in research and real practice. The discussion include findings on the most recent work on linguistic steganalysis techniques. This review hoped to help future research for improving and enhancing steganalytic capabilities.
Analytical Review on Graphical Formats Used in Image Steganographic Compression Roshidi Din; Osman Ghazali; Alaa Jabbar Qasim
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: November 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i2.pp441-446

Abstract

This paper reviews the method of classification of the types of images used in data concealment based on the perspective of the researcher’s efforts in the past decade. Therefore, all papers were analyzed and classified according to time periods. The main objective of the study is to infer the best types of images that researchers have discussed and used, several reasons will be shown in this study, which started from 2006 to 2017, through this paper the pros and the cons in the use of favourite types in the concealment of data through previous studies.
An Antonym Substitution-based Model on Linguistic Steganography Method Fawwaz Zamir Mansor; Aida Mustapha; Roshidi Din; Azizi Abas; Sunariya Utama
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i1.pp225-232

Abstract

This paper implement the antonym procedure in substitution-based approach for linguistic steganography that is expected to be an alternative to the existing substitution approach that using synonym. This method is hidden the message as existing approach, however that is changing the semantic of the stego text from cover text as the medium. This paper proposed the development method is named Antonym Substitution-based that applied based on implementation linguistic steganography in covering the secret message. This approach refines the word choices makes antonym substitution-based approach linguistically is comparable with the previous effort of synonym substitution. Furthermore, this paper also used the verification and validation approaches as the procedure to evaluate performance of this method. The evaluation through verification approach used in order to determine the effectiveness and quality performance. This proposed method is expected has become the new technique implementation of linguistic steganography in process securing secret message that hide in the text medium.
Analysis Review on Performance Metrics for Extraction Schemes in Text Steganography Raihan Sabirah Sabri; Roshidi Din; Aida Mustapha
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: August 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v11.i2.pp761-767

Abstract

In today's era of big data computer networks, protection of secret messages when transmitting information is a major concern. The openness and publicity of the communication channel are the main attraction for malicious people to steal personal data even though privacy protection in operational. Data extraction is process that reverses the data embedding process in information hiding. However, the performance of an information hiding framework highly depends on the evaluation metrics used. The effectiveness of evaluation itself is mainly determined by the performance aspect or critera such as capacity, imperceptibility or security. The aim of this paper is to present a review on trends for existing performance metrics used in extraction schemes from a data hiding framework. This review is hoped to help future research in evaluating the performance of data hiding framework in general and the proposed extraction schemes in specific.
A review of arabic text steganography: past and present Suhaibah Jusoh; Aida Mustapha; Azizan Ismail; Roshidi Din
Indonesian Journal of Electrical Engineering and Computer Science Vol 17, No 2: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v17.i2.pp1040-1046

Abstract

Steganography is a strategy for hiding secret information in a cover document in order to avoid attacker from predict about hidden information. Steganography exploit cover message, for instance text, audio, picture and video to hide the secret message. Before this, linguistic text steganographic techniques are implemented just for the English language. But nowadays different languages are used to hide the data like Arabic language. This language is still new in the steganography and still need practices for empowerment. This paper will present the text steganographic method for Arabic language, scholar paper within 5 year will be analyze and compared. The main objective of this paper is to give the comparative analysis in the Arabic steganography method that has been applied by previous researchers. Finally, the disadvantage and advantage of the method also will be presented in this paper.
The Embedding Performance of StegSVM Model in Image Steganography Hanizan Shaker Hussain; Roshidi Din; Mohd Hanif Ali; Nor Balqis
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i1.pp233-238

Abstract

This paper focuses on one of the areas of information hiding which is image steganography. It proposes the StegSVM model as an embedding technique in steganography that has exploited human visual system through Shifted LSB that shows an expected performance. The performance of this technique evaluation is based on imperceptibility and robustness of the technique compared to the other previous models in image steganography doamin. Thus, the result shows that the proposed StegSVM model is promising. For further work, it is suggested that the other image domain through other intelligent methods should be investigated.