University of Malaya, Malaysia
Computer Science & Information Technology
Mobile phones are considered to be the most common communication devices in history. Recently, mobile phones are not only used for casual greetings but also, sending and receiving important data such as, social security numbers, bank... more
With the increasing usage of digital multimedia, the protection of intellectual property rights problem has become a very important issue. Everyday, thousands of multimedia files are being uploaded and downloaded. Therefore, multimedia... more
Ad-Hoc networks are decentralized wireless networks. A fundamental problem in Ad-Hoc networks is finding a secure and correct route between a source and a destination efficiently. The need for scalable and energy efficient routing... more
In this study, we developed a novel method that is able to shift the limit for transparent data hiding in audio from the fourth LSB layer to the eighth LSB layer, thus the method has improved the capacity and robustness of data hiding in... more
Wireless Ad-Hoc networks are collections of nodes that communicate without any fixed infrastructure. A critical problem in Ad-Hoc networks is finding an efficient and correct route between a source and a destination. The need for scalable... more
Malwares control computer systems by infecting system files. They take advantage of system compatibilities to ensure their survival from one version to another. The structure of the windows portable executable (PE) files between available... more
Mosaic image approaches have been successfully proposed to solve different problems in the image processing such as image segmentation. As it becomes a well known art, there are thousands of mosaic images available in the internet... more
In this study, handshake protocol for patient, medical center and doctor, medical center is proposed for electronic medical record transmission to improve the confidentiality of data transmission and non-repudiation of sending and... more
Short message service (SMS) is a very popular and easy to use communications technology for mobile phone devices. Originally, this service was not designed to transmit secured data, so the security was not an important issue during its... more
Picture-based password has been proposed as an alternative authentication method to replace text-based password. Ensuring the security of picture-based password is not a simple task as picture-based objects are a lot easier to access and... more
Wireless Ad-Hoc networks are collection of nodes that can communicate without any fixed infrastructure. A crucial problem in Ad-Hoc networks is finding an efficient route between a source and a destination. The need for scalable and... more
Mobile Ad-Hoc Networks (MANETs) are becoming increasingly popular as more and more mobile devices find their way to the public. A crucial problem in Ad-Hoc networks is finding an efficient route between a source and a destination. Due to... more
Steganography is the idea of hiding private, sensitive data or information within something that appears to be nothing but normal. If a person views the digital object that the information is hidden inside, he or she will have no idea... more
Secure group communication allows a set of nodes (or devices) to communicate securely amongst each other over unprotected and open networks. Provision of security for group communication is based on cryptographic services, which relies on... more
A honeypot is a computer resource that is deployed in the network to attract attackers. It is designed to be attacked and misused by them. The functionality of a honeypot depends on its technical configuration made by the system... more
In this paper a new approach of image steganography has been proposed that hides a gray scale secret image into colored (BMP) image. The proposed approach has two phases, in the first phase we compress the secret image using artificial... more
Malwares control computer systems by infecting system files. They take advantage of system compatibilities to ensure their survival from one version to another. The structure of the windows portable executable (PE) files between available... more
Major provisioning of cloud computing is mainly delivered via Software as a Service, Platform as a Service and Infrastructure as a Service. However, these service delivery models are vulnerable to a range of security attacks, exploiting... more
For the last few years, academia and research organizations are continuously investigating and resolving the security and privacy issues of mobile cloud computing environment. The additional consideration in designing security services... more
Abstract—Steganography is the idea of hiding private, sensitive data or information within something that appears to be nothing but normal. If a person views the digital object that the information is hidden inside, he or she will have no... more