Mohamad Yusof Darus
University Technology of MARA

Published : 4 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 4 Documents
Search

Performance analysis on secured data method in natural language steganography Roshidi Din; Rosmadi Bakar; Raihan Sabirah Sabri; Mohamad Yusof Darus; Shamsul Jamel Elias
Bulletin of Electrical Engineering and Informatics Vol 8, No 1: March 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (430.165 KB) | DOI: 10.11591/eei.v8i1.1441

Abstract

The rapid amount of exchange information that causes the expansion of the internet during the last decade has motivated that a research in this field. Recently, steganography approaches have received an unexpected attention. Hence, the aim of this paper is to review different performance metric; covering the decoding, decrypting and extracting performance metric. The process of data decoding interprets the received hidden message into a code word. As such, data encryption is the best way to provide a secure communication. Decrypting take an encrypted text and converting it back into an original text. Data extracting is a process which is the reverse of the data embedding process. The effectiveness evaluation is mainly determined by the performance metric aspect. The intention of researchers is to improve performance metric characteristics. The evaluation success is mainly determined by the performance analysis aspect. The objective of this paper is to present a review on the study of steganography in natural language based on the criteria of the performance analysis. The findings review will clarify the preferred performance metric aspects used. This review is hoped to help future research in evaluating the performance analysis of natural language in general and the proposed secured data revealed on natural language steganography in specific.
Performance analysis on secured data method in natural language steganography Roshidi Din; Rosmadi Bakar; Raihan Sabirah Sabri; Mohamad Yusof Darus; Shamsul Jamel Elias
Bulletin of Electrical Engineering and Informatics Vol 8, No 1: March 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (791.722 KB) | DOI: 10.11591/eei.v8i1.1441

Abstract

The rapid amount of exchange information that causes the expansion of the internet during the last decade has motivated that a research in this field.  Recently, steganography approaches have received an unexpected attention. Hence, the aim of this paper is to review different performance metric; covering the decoding, decrypting and extracting performance metric. The process of data decoding interprets the received hidden message into a code word. As such, data encryption is the best way to provide a secure communication. Decrypting take an encrypted text and converting it back into an original text. Data extracting is a process which is the reverse of the data embedding process. The effectiveness evaluation is mainly determined by the performance metric aspect. The intention of researchers is to improve performance metric characteristics. The evaluation success is mainly determined by the performance analysis aspect.  The objective of this paper is to present a review on the study of steganography in natural language based on the criteria of the performance analysis. The findings review will clarify the preferred performance metric aspects used. This review is hoped to help future research in evaluating the performance analysis of natural language in general and the proposed secured data revealed on natural language steganography in specific.
Performance analysis on secured data method in natural language steganography Roshidi Din; Rosmadi Bakar; Raihan Sabirah Sabri; Mohamad Yusof Darus; Shamsul Jamel Elias
Bulletin of Electrical Engineering and Informatics Vol 8, No 1: March 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (791.722 KB) | DOI: 10.11591/eei.v8i1.1441

Abstract

The rapid amount of exchange information that causes the expansion of the internet during the last decade has motivated that a research in this field.  Recently, steganography approaches have received an unexpected attention. Hence, the aim of this paper is to review different performance metric; covering the decoding, decrypting and extracting performance metric. The process of data decoding interprets the received hidden message into a code word. As such, data encryption is the best way to provide a secure communication. Decrypting take an encrypted text and converting it back into an original text. Data extracting is a process which is the reverse of the data embedding process. The effectiveness evaluation is mainly determined by the performance metric aspect. The intention of researchers is to improve performance metric characteristics. The evaluation success is mainly determined by the performance analysis aspect.  The objective of this paper is to present a review on the study of steganography in natural language based on the criteria of the performance analysis. The findings review will clarify the preferred performance metric aspects used. This review is hoped to help future research in evaluating the performance analysis of natural language in general and the proposed secured data revealed on natural language steganography in specific.
The evaluation of AdBlock technique implementation for enterprise network environment Mohd Iskandar Bin Samsuddin; Mohamad Yusof Darus; Shamsul J Elias; Abidah Hj Mat Taib; Norkhushaini Awang; Roshidi Din
Indonesian Journal of Electrical Engineering and Computer Science Vol 13, No 3: March 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v13.i3.pp1102-1109

Abstract

This paper presents the evaluation of AdBlock technique implementation for enterprise network environment. This study has presented the impact of web browsing activities where it is the most active traffic where is consumed the highest inbound bandwidth usage in enterprise network environment. We can conclude that DNS AdBlock is the best solution for enterprise network environment in term of blocking advertisement compare to extension adblock. Adblock technique also reduce network data request by comparing front-end solution (browser extension AdBlock) at client web browser and networks level adblock. The parameters such as HTTP request, TCP connection and network bandwidth are being examined to measure the effectiveness of blocking online advertisement. Both techniques perform the reduction of traffics and bandwidth utilization. The result shows that DNS AdBlock is the most effective in blocking online advertisement using the examined parameters. DNS AdBlock can sustain the usage of web browsing activity for enterprise network and also generate substantial saving across several fonts. This study has identified current web browsing trends traffic in enterprise network where it consumed 50 percent in average. This number increased when industries are moving to cloud web-based consumption. However, industries such as educational sector, web browsing traffic is one of connectivity that enterprises network should be investing to support openness and heavy traffic from educational users.