UPSI Digital Repository (UDRep)
|
|
|
Abstract : Universiti Pendidikan Sultan Idris |
The main objective of this study is to propose a novel verification secure framework for patient authentication between an access point (patient enrolment device) and a node database. For this purpose, two stages are used. Firstly, we propose a new hybrid biometric pattern model based on a merge algorithm to combine radio frequency identification and finger vein (FV) biometric features to increase the randomisation and security levels in pattern structure. Secondly, we developed a combination of encryption, blockchain and steganography techniques for the hybrid pattern model. When sending the pattern from an enrolment device (access point) to the node database, this process ensures that the FV biometric verification system remains secure during authentication by meeting the information security standard requirements of confidentiality, integrity and availability. Blockchain is used to achieve data integrity and availability. Particle swarm optimisation steganography and advanced encryption standard techniques are used for confidentiality in a transmission channel. Then, we discussed how the proposed framework can be implemented on a decentralised network architecture, including access point and various databases node without a central point. The proposed framework was evaluated by 106 samples chosen from a dataset that comprises 6000 samples of FV images. Results showed that (1) high-resistance verification framework is protected against spoofing and brute-force attacks; most biometric verification systems are vulnerable to such attacks. (2) The proposed framework had an advantage over the benchmark with a percentage of 55.56% in securing biometric templates during data transmission between the enrolment device and the node database.
|
References |
[1] M. L. Mat Kiah et al., “Design and Develop a Video Conferencing Framework for Real-Time Telemedicine Applications Using Secure Group-Based Communication Architecture,” J. Med. Syst., vol. 38, no. 10, p. 133, Oct. 2014. [2] M. L. M. Kiah et al., “MIRASS: Medical Informatics Research Activity Support System Using Information Mashup Network,” J. Med. Syst., vol. 38, no. 4, p. 37, 2014. [3] M. A. Alsalem et al., “Systematic Review of an Automated Multiclass Detection and Classification System for Acute Leukaemia in Terms of Evaluation and Benchmarking, Open Challenges, Issues and Methodological Aspects,” J. Med. Syst., vol. 42, no. 11, p. 204, Nov. 2018. [4] M. A. Alsalem et al., “A review of the automated detection and classification of acute leukaemia: Coherent taxonomy, datasets, validation and performance measurements, motivation, open challenges andrecommendations,” Computer Methods and Programs in Biomedicine, vol. 158. pp. 93–112, 2018. [5] M. Hussain et al., “A security framework for mHealth apps on Android platform,” Comput. Secur., vol. 75, pp. 191–217, 2018. [6] N. Kalid et al., “Based Real Time Remote Health Monitoring Systems: A Review on Patients Prioritization and Related" Big Data" Using Body Sensors information and Communication Technology,” J. Med. Syst., vol. 42, no. 2, p. 30, 2018. [7] O. S. Albahri et al., “Real-Time Remote Health-Monitoring Systems in a Medical Centre: A Review of the Provision of Healthcare Services-Based Body Sensor Information, Open Challenges and Methodological Aspects,” J. Med. Syst., vol. 42, no. 9, p. 164, Sep. 2018. [8] A. A. Zaidan et al., “A review on smartphone skin cancer diagnosis apps in evaluation and benchmarking: coherent taxonomy, open issues and recommendation pathway solution,” Health Technol. (Berl)., vol. 8, no.4, pp. 223–238, Sep. 2018. [9] A. A. Zaidan et al., “Challenges, Alternatives, and Paths to Sustainability: Better Public Health Promotion Using Social Networking Pages as Key Tools,” J. Med. Syst., vol. 39, no. 2, p. 7, Feb. 2015. [10] M. Abdulnabi et al., “A distributed framework for health information exchange using smartphone technologies,” J. Biomed. Inform., vol. 69, pp. 230–250, May 2017. [11] M. Hussain et al., “The landscape of research on smartphone medical apps: Coherent taxonomy, motivations, open challenges and recommendations,” Computer Methods and Programs in Biomedicine, vol. 122, no. 3. pp. 393–408, 2015. [12] S. Nidhal et al., “Computerized algorithm for fetal heart rate baseline and baseline variability estimation based on distance between signal average and alpha value,” Int J Pharmacol, vol. 7, no. 2, pp. 228–237, 2011. [13] A. S. Albahri et al., “Fault-Tolerant mHealth Framework in the Context of IoT Based Real-Time Wearable Health Data Sensor,” IEEE Access, 2019. [14] Q. M. Yas et al., “A Systematic Review on Smartphone Skin Cancer Apps: Coherent Taxonomy, Motivations, Open Challenges and Recommendations, and New Research Direction,” J. Circuits, Syst. Comput., p. 1830003, 2017. [15] O. H. Salman et al., “Novel Methodology for Triage and Prioritizing Using „Big Data? Patients with Chronic Heart Diseases Through Telemedicine Environmental,” Int. J. Inf. Technol. Decis. Mak., vol. 16, no. 05, pp. 1211–1245, Sep. 2017. [16] O. S. Albahri et al., “Based Multiple Heterogeneous Wearable Sensors?: A smart Real-Time HealthMonitoring Structured for Hospitals Distributor,” IEEE Access, p. 1, 2019. [17] N. Kalid et al., “Based on Real Time Remote Health Monitoring Systems: A New Approach for Prioritization „Large Scales Data? Patients with Chronic Heart Diseases Using Body Sensors and Communication Technology,” J. Med. Syst., vol. 42, no. 4, 2018. [18] M. Hussain et al., “Conceptual framework for the security of mobile health applications on Android platform,” Telemat. Informatics, vol. 35, no. 5, pp. 1335–1354, Mar. 2018. [19] A. A. Zaidan et al., “Multi-criteria analysis for OS-EMR software selection problem: A comparative study,” Decis. Support Syst., vol. 78, pp. 15–27, Oct. 2015. [20] M. S. Nabi et al., “Suitability of adopting S/MIME and OpenPGP email messages protocol to secure electronic medical records,” in Second International Conference on Future Generation Communication Technologies (FGCT 2013), 2013, pp. 93–97. [21] S. Iqbal et al., “Real-time-based E-health systems: design and implementation of a lightweight key management protocol for securing sensitive information of patients,” Health Technol. (Berl)., pp. 1–19, Aug. 2018. [22] M. L. M. Kiah et al., “Open source EMR software: Profiling, insights and hands-on analysis,” Comput. Methods Programs Biomed., vol. 117, no. 2, pp. 360–382, 2014. [23] A. Zaidan et al., “Evaluation and selection of open-source EMR software packages based on integrated AHP and TOPSIS,” Elsevier. [24] O. Enaizan et al., “Electronic medical record systems: decision support examination framework for individual, security and privacy concerns using multi-perspective analysis,” Health Technol. (Berl)., pp. 1–28, Nov. 2018. [25] H. O. Alanazi et al., “Secure topology for electronic medical record transmissions,” Int. J. Pharmacol., vol. 6, no. 6, pp. 954–958, 2010. [26] O. A. Hamdan et al., “Securing electronic medical records transmissions over unsecured communications: An overview for better medical governance,” J. Med. Plants Res., vol. 4, no. 19, pp. 2059–2074, Oct. 2010. [27] M. S. A. Nabi et al., “Suitability of using SOAP protocol to secure electronic medical record databases transmission,” Int. J. Pharmacol., vol. 6, no. 6, pp. 959–964, 2010. [28] M. A. Watari et al., “Securing m-Government Transmission Based on Symmetric and Asymmetric Algorithms”: A review,” Asian J. Sci. Ressearch, vol. 8, pp. 80–94, 2013. [29] H. Alanazi et al., “Intrusion detection system: overview,” arXiv Prepr. arXiv1002.4047, 2010. [30] A. Medani et al., “Review of mobile short message service security issues and techniques towards the solution,” Sci. Res. Essays, vol. 6, no. 6, pp. 1147–1165, 2011. [31] A. W. Naji et al., “Security improvement of credit card online purchasing system,” Sci. Res. Essays, vol. 6, no. 16, pp. 3357–3370, 2011. [32] M. Hussain et al., “The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks,” Pervasive Mob. Comput., vol. 25, pp. 1–25, 2016. [33] Y. Y. A. Talib et al., “Optimizing Security and Flexibility by Designing a High Security System for EGovernment Servers”,” ICOCI09, Univ. Utara Malaysia, 2009. [34] M. Talal, “Comprehensive Review and Analysis of Anti-Malware Apps for Smartphones.,” Telecommun. Syst., 2019. [35] B. B. Zaidan et al., “Impact of data privacy and confidentiality on developing telemedicine applications: A review participates opinion and expert concerns,” International Journal of Pharmacology, vol. 7, no. 3. pp. 382–387, 2011. [36] M. Talal et al., “Smart Home-based IoT for Real-time and Secure Remote Health Monitoring of Triage and Priority System using Body Sensors: Multi-driven Systematic Review,” J. Med. Syst., vol. 43, no. 3, p. 42, 2019. [37] O. S. Albahri et al., “Systematic Review of Real-time Remote Health Monitoring System in Triage and Priority-Based Sensor Technology: Taxonomy, Open Challenges, Motivation and Recommendations,” J. Med. Syst., vol. 42, no. 5, 2018. [38] B. B. Zaidan et al., “A Security Framework for Nationwide Health Information Exchange based on Telehealth Strategy,” J. Med. Syst., vol. 39, no. 5, p. 51, May 2015. [39] M. L. Shuwandy et al., “Sensor-Based mHealth Authentication for Real-Time Remote Healthcare Monitoring System: A Multilayer Systematic Review,” J. Med. Syst., vol. 43, no. 2, p. 33, 2019. [40] H. O. Alanazi et al., “Meeting the Security Requirements of Electronic Medical Records in the ERA of High-Speed Computing,” J. Med. Syst., vol. 39, no. 1, p. 165, Jan. 2015. [41] A. S. Albahri et al., “Real-Time Fault-Tolerant mHealth System: Comprehensive Review of Healthcare Services, Opens Issues, Challenges and Methodological Aspects,” Journal of Medical Systems. 2018. [42] S. A. Hameed et al., “An accurate method to obtain bio-metric measurements for three dimensional skull,” J. Appl. Sci., vol. 10, no. 2, pp. 145–150, 2010. [43] S. A. Hameed et al., “Novel Simulation Framework of Three-Dimensional Skull Bio-Metric Measurement,” Shibab A. Hameed al/International J. Comput. Sci. Eng., vol. 1, no. 3, pp. 269–274, 2009. [44] A. H. Shihab et al., “Accurate Method to Measure Three Dimensional Skull Bio-Metric,” J. Appl. Sci, vol. 10, no. 2, pp. 145–150, 2010. [45] J. Da Wu and S. H. Ye, “Driver identification using finger-vein patterns with Radon transform and neural network,” Expert Syst. Appl., vol. 36, no. 3 PART 2, pp. 5793–5799, 2009. [46] T. S. Ong, J. H. Teng, K. S. Muthu, and A. B. J. Teoh, “Multi-instance finger vein recognition using minutiae matching,” Proc. 2013 6th Int. Congr. Image Signal Process. CISP 2013, vol. 3, no. Cisp, pp. 1730–1735, 2013. [47] V. P. N.Sugandhi, M.Mathankumar, “Real Time Authentication System using Advanced Finger Vein Recognition Technique,” Int. Conf. Commun. Signal Process. April 3-5, 2014, India, pp. 1183–1187, 2014. [48] J. Peng, N. Wang, A. a. A. El-Latif, Q. Li, and X. Niu, “Finger-vein Verification Using Gabor Filter and SIFT Feature Matching,” 2012 Eighth Int. Conf. Intell. Inf. Hiding Multimed. Signal Process., pp. 45–48, 2012. [49] F. Liu, G. Yang, Y. Yin, and S. Wang, “Singular value decomposition based minutiae matching method for finger vein recognition,” Neurocomputing, vol. 145, pp. 75–89, 2014. [50] M. M. S. Ibrahim, F. S. Al-namiy, M. Beno, and L. Rajaji, “Biometric Authentication for secured Transaction using Finger Vein Technology,” no. Seiscon, pp. 760–763, 2011. [51] D. Tang, B. Huang, R. Li, W. Li, and X. Li, “Finger vein verification using Occurrence Probability Matrix (OPM),” Proc. Int. Jt. Conf. Neural Networks, pp. 21–26, 2012. [52] A. William, T. S. Ong, S. H. Lau, and M. K. O. Goh, “Finger Vein verification using local histogram of hybrid texture descriptors,” IEEE 2015 Int. Conf. Signal Image Process. Appl. ICSIPA 2015 - Proc., pp. 304–308, 2016. [53] A. H. Mohsin et al., “Real-Time Remote Health Monitoring Systems Using Body Sensor Information and Finger Vein Biometric Verification: A Multi-Layer Systematic Review,” J. Med. Syst., vol. 42, no. 12, p. 238, Dec. 2018. [54] H. Suzuki, M. Suzuki, T. Urabe, and T. Obi, “Secure biometric image sensor and authentication scheme based on compressed sensing,” Appl. Opt., vol. 52, no. 33, pp. 8161–8168, 2013. [55] A. Nandhinipreetha and N. Radha, “Multimodal biometric template authentication of finger vein and signature using visual cryptography,” 2016 Int. Conf. Comput. Commun. Informatics, ICCCI 2016, pp. 7–10, 2016. [56] J. Chavez-Galaviz, J. Ruiz-Rojas, and A. Garcia-Gonzalez, “Embedded biometric cryptosystem based on finger vein patterns,” 2015 12th Int. Conf. Electr. Eng. Comput. Sci. Autom. Control. CCE 2015, pp. 1–6, 2015. [57] D. Jagadiswary and D. Saraswady, “Biometric Authentication using Fused Multimodal Biometric,” Procedia - Procedia Comput. Sci., vol. 85, no. Cms, pp. 109–116, 2016. [58] X. N. Jialiang Peng, Qiong Li, Ahmed A. Abd El-Latif, “Finger multibiometric cryptosystems: fusion strategy and template security,” J. Biomed. Opt., vol. 19, no. 2, p. 020901, 2014. [59] T. Murakami, T. Ohki, and K. Takahashi, “Optimal sequential fusion for multibiometric cryptosystems,” Inf. Fusion, vol. 32, pp. 93–108, 2016. [60] Z. Wu, L. Tian, P. Li, T. Wu, M. Jiang, and C. Wu, “Generating stable biometric keys for flexible cloudcomputing authentication using finger vein,” Inf. Sci. (Ny)., vol. 0, pp. 1–17, 2016. [61] M. Jain and A. Kumar, “RGB channel based decision tree grey-alpha medical image steganography with RSA cryptosystem,” Int. J. Mach. Learn. Cybern., vol. 8, no. 5, pp. 1695–1705, 2017. [62] R. Von Solms and J. Van Niekerk, “From information security to cyber security,” Comput. Secur., vol. 38, pp. 97–102, 2013. [63] A. Skillen and M. Mannan, “Mobiflage: Deniable storage encryption for mobile devices,” IEEE Trans. Dependable Secur. Comput., vol. 11, no. 3, pp. 224–237, 2014. [64] 2 Kang Ryoung Park2 Eui Chul Lee, 1 Hyeon Chang Lee, “Finger Vein Recognition Using Minutia-Based Alignment and Local Binary Pattern-Based Feature Extraction,” Int. J. Imaging Syst. Technol., vol. 19, no. 3, pp. 179–186, 2009. [65] Naoto Miura, A. Nagasaka, and T. Miyatake, “Extraction of Finger-Vein Patterns Using Maximum Curvature Points in Image Profile,” Conf. Mach. Vis. Appl. May 16-18, 2005 Tsukuba Sci. City, Japan, vol. 34, no. 4, pp. 444–448, 2005. [66] H. Shen, J. Shen, M. K. Khan, and J.-H. Lee, “Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things,” Wirel. Pers. Commun., vol. 96, no. 4, pp. 5253–5266, 2017. [67] H. O. Alanazi, et al., “Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden?: Analytical study,” Sci. Res. Essays, vol. 5, no. 21, pp. 3254–3260, 2010. [68] B. B. Zaidan et al., “StegoMos: A secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem,” Int. J. Phys. Sci., vol. 5, no. 11, pp. 1796–1806, 2010. [69] A. A. Zaidan et al., Novel multi-cover steganography using remote sensing image and general recursion neural cryptosystem, vol. 5, no. 11. Academic Journals, 2010. [70] A. W. Naji et al., “Novel approach for cover file of hidden data in the unused area two within EXE file using distortion techniques and advance encryption standard,” Proceeding World Acad. Sci. Eng. Technol., vol. 56, no. 5, pp. 498–502, 2010. [71] A. W. Naji, S. A. Hameed, W. F. Al-khateeb, O. O. Khalifa, and T. S. Gunawan, “Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques,” Int. J. Comput. Sci. Inf. Secur., vol. 3, no. 1, pp. 1–6, 2009. [72] M. Abomhara et al., “Enhancing Selective Encryption for H. 264/AVCUsing Advanced Encryption Standard,” Int. J. Comput. Electr. Eng., vol. 2, no. 2, p. 223, 2010. [73] M. Abomhara et al., “Suitability of using symmetric key to secure multimedia data: An overview,” J. Appl. Sci., vol. 10, no. 15, pp. 1656–1661, 2010. [74] Y. Salem et al., “A review on multimedia communications cryptography,” Res. J. Inform. Technol, vol. 3, pp. 146–152, 2011. [75] B. B. Zaidan et al., “New Comprehensive Study to Assess Comparatively the QKD, XKMS, KDM in the PKI encryption algorithms,” Int. J. Comput. Sci. Eng, vol. 1, no. 3, pp. 263–268, 2009. [76] Z. Yun-peng, “Digital Image Encryption Algorithm Based on Chaos and Improved DES,” no. October, pp. 480–485, 2009. [77] G. Singh, “A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security,” Int. J. Comput. Appl., vol. 67, no. 19, pp. 975–8887, 2013. [78] H. Alanazi et al., “New comparative study between DES, 3DES and AES within nine factors,” arXiv Prepr. arXiv1003.4085, 2010. [79] M. L. M. Kiah et al., “An Enhanced Security Solution for Electronic Medical Records Based on AES Hybrid Technique with SOAP/XML and SHA-1,” J. Med. Syst., vol. 37, no. 5, p. 9971, Oct. 2013. [80] A. A Zaidan et al., “High Securing Cover-File of Hidden Data Using Statistical Technique and AES Encryption Algorithm,” in World Academy of Science, Engineering and Technology 54 2009, 2009, pp. 463–474. [81] A. Taqa et al., “New Framework for High Secure Data Hidden in the MPEG Using AES Encryption Algorithm,” Citeseer, vol. 1, no. 5, p. 8163, 2009. [82] A. A. Zaidan and B. Zaidan, “A New System for Hiding Data within (Unused Area Two + Image Page) of Portable Executable File using Statistical Technique and Advance Encryption Standared.” [83] N. Mathur and R. Bansode, “AES Based Text Encryption Using 12 Rounds with Dynamic Key Selection,” Procedia Comput. Sci., vol. 79, pp. 1036–1043, 2016. [84] D. S. Kundi, A. Aziz, and N. Ikram, “A high performance ST-Box based unified AES encryption/decryption architecture on FPGA,” Microprocess. Microsyst., vol. 41, pp. 37–46, 2016. [85] A. H. Mohsin et al., “Blockchain authentication of network applications: Taxonomy, classification, capabilities, open challenges, motivations, recommendations and future directions,” Comput. Stand. Interfaces, 2018. [86] T. M. Fernández-caramés and S. Member, “A Review on the Use of Blockchain for the Internet of Things,” vol. 3536, no. c, pp. 1–23, 2018. [87] X. Li, P. Jiang, T. Chen, X. Luo, and Q. Wen, “A survey on the security of blockchain systems,” Futur. Gener. Comput. Syst., 2017. [88] K. Salah, M. H. U. Rehman, N. Nizamuddin, and A. Al-Fuqaha, “Blockchain for AI: Review and open research challenges,” IEEE Access, vol. 7, pp. 10127–10149, 2019. [89] M. Alblooshi, K. Salah, and Y. Alhammadi, “Blockchain-based Ownership Management for Medical IoT (MIoT) Devices,” no. November, pp. 151–156, 2019. [90] M. Alshehhi, M. Kadadha, M. Alhemeiri, K. Salah, and R. Almadhoun, “A User Authentication Scheme of IoT Devices using Blockchain-Enabled Fog Nodes,” no. October, pp. 1–8, 2019. [91] N. Kshetri, “Blockchain?s roles in strengthening cybersecurity and protecting privacy,” Telecomm. Policy, vol. 41, no. 10, pp. 1027–1038, 2017. [92] F. Tian, “An Agri-food Supply Chain Traceability System for China Based on RFID & Blockchain Technology,” 2016 13th Int. Conf. Serv. Syst. Serv. Manag., pp. 1–6, 2016. [93] S. S. Nassar et al., “Secure Wireless Image Communication Using LSB Steganography and Chaotic Baker Ciphering,” Wirel. Pers. Commun., vol. 91, no. 3, pp. 1023–1049, 2016. [94] B. B. Zaidan et al., “Enhancement of the amount of hidden data and the quality of image,” Fac. Comput. Sci. Inf. Technol. Univ. Malaya, Kuala Lumpur, Malaysia, 2008. [95] A. A. Zaidan and B. B. Zaidan, “Novel approach for high secure data hidden in MPEG video using public key infrastructure,” Int. J. Comput. Netw. Secur., vol. 1, no. 1, pp. 1553–1985, 2009. [96] A. K. Al-Frajat et al., “Hiding Data in Video File: An Overview,” J. Appl. Sci., vol. 10, no. 15, pp. 1644– 1649, Dec. 2010. [97] A. K. Hmood et al., “On the capacity and security of steganography approaches: An overview,” J. Appl. Sci., vol. 10, no. 16, pp. 1825–1833, 2010. [98] B. B. Zaidan et al., “An empirical study for impact of the increment the size of hidden data on the image texture,” ICFCC09, 2009. [99] B. B. Zaidan and A. A. Zaidan, “Comparative study on the evaluation and benchmarking information hiding approaches based multi-measurement analysis using TOPSIS method with different normalisation, separation and context techniques,” Measurement, vol. 117, pp. 277–294, 2018. [100] M. A. Ahmed et al., “A Novel Embedding Method to Increase Capacity and Robustness of Low-bit Encoding Audio Steganography Technique Using Noise Gate Software Logic Algorithm,” J. Appl. Sci., vol. 10, no. 1, pp. 59–64, Jan. 2010. [101] A. W. Naji et al., “New approach of hidden data in the portable executable file without change the size ofcarrier file using distortion techniques,” Proceeding World Acad. Sci. Eng. Technol., vol. 56, pp. 493–497, 2009. [102] A. A. Zaidan et al., “Novel approach for high (secure and rate) data hidden within triplex space for executable file,” Sci. Res. Essays, vol. 5, no. 15, 1965. [103] A. A. Zaidan et al., “New Technique of Hidden Data in PE-File with in Unused Area One,” Int. J. Comput. Electr. Eng., vol. 1, no. 5, pp. 642–650, 2009. [104] A. Hamdan et al., “New frame work of hidden data with in non multimedia file,” Int. J. Comput. Netw. Secur., vol. 2, no. 1, pp. 46–54, 2010. [105] A. W. Naji et al., “„ Stego-Analysis Chain, Session Two? Novel Approach of Stego-Analysis System for Image File,” in 2009 International Association of Computer Science and Information Technology-Spring Conference, 2009, pp. 410–413. [106] A. H. Ali et al., “High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain,” Multimed. Tools Appl., Jun. 2018. [107] A. W. Naji et al., “Challenges of hidden data in the unused area two within executable files,” J. Comput.Sci., vol. 5, no. 11, pp. 890–897, 2009. [108] A. K. Hmood et al., “On the accuracy of hiding information metrics: Counterfeit protection for education and important certificates,” Int. J. Phys. Sci., vol. 5, no. 7, pp. 1054–1062, 2010. [109] W. F. Al-khateeb and S. A. Hameed, “New Approach of Hidden Data in the portable Executable File without Change the Size of Carrier File Using Statistical Technique,” Int. J. Comput. Sci. Netw. Secur., vol. 9, no. 7, pp. 218–224, 2009. [110] A. A. Zaidan et al., “Approved undetectable-antivirus steganography for multimedia information in PE-file,” in International Conference on IACSIT Spring Conference (IACSIT-SC09), Advanced Management Science (AMS), Listed in IEEE Xplore and be indexed by both EI (Compendex) and ISI Thomson (ISTP), Session, 2009, vol. 9, pp. 425–429. [111] M. E. Eltahir et al., “High Rate Video Streaming Steganography,” in 2009 International Conference on Information Management and Engineering, 2009, pp. 550–553. [112] F. Othman et al., “An extensive empirical study for the impact of increasing data hidden on the images texture,” in 2009 International Conference on Future Computer and Communication, 2009, pp. 477–481. [113] B. B. Zaidan et al., “A new digital watermarking evaluation and benchmarking methodology using an external group of evaluators and multi-criteria analysis based on „large-scale data,?” Softw. Pract. Exp., vol. 47, no. 10, pp. 1365–1392, Oct. 2017. [114] B. B. Zaidan and A. A. Zaidan, “Software and hardware FPGA-based digital watermarking and steganography approaches: Toward new methodology for evaluation and benchmarking using multi-criteria decision-making techniques,” J. Circuits, Syst. Comput., vol. 26, no. 07, p. 1750116, 2017. [115] A. A. Zaidan et al., “Investigate the capability of applying hidden data in text file: An overview,” J. Appl. Sci., vol. 10, no. 17, pp. 1916–1922, 2010. [116] B. B. Zaidan et al., “A New Approach based on Multi-Dimensional Evaluation and Benchmarking for Data Hiding Techniques,” Int. J. Inf. Technol. Decis. Mak., pp. 1–42, Mar. 2017. [117] A. K. Hmood et al., “An Overview on Hiding Information Technique in Images,” J. Appl. Sci., vol. 10, no. 18, pp. 2094–2100, Dec. 2010. [118] H. A. Jalab et al., “New Design for Information Hiding with in Steganography Using Distortion Techniques,” ijetch.org, vol. 2, no. 1, 2010. [119] B. Zaidan et al., “Quality of Image vs. Quantity of Data Hidden in the Image.,” IPCV, vol. 6, pp. 343–350, 2009. [120] A. Majeed et al., “Novel Approach for High Secure and High Rate Data Hidden in the Image Using Image Texture Analysis,” eprints.um.edu.my, vol. 1, no. 2, pp. 63–69, 2009. [121] H. Alanazi et al., “New Classification Methods for Hiding Information into Two Parts: Multimedia Files and Non Multimedia Files,” arXiv Prepr. arXiv1003.4084, 2010. [122] A. W. Naji et al., “„stego-analysis chain, session one? investigations on steganography weakness VS stegoanalysis system for multimedia file,” in 2009 International Association of Computer Science and Information Technology - Spring Conference, IACSIT-SC 2009, 2009, pp. 405–409. [123] B. Zaidan et al., 2009, “Stego-image vs stego-analysis system,” Citeseer, vol. 1, no. 5, pp. 1793–8163, 2009. [124] M. Hussain et al., “Secure password transmission for web applications over internet using cryptography and image steganography,” Int. J. Secur. its Appl., vol. 9, no. 2, pp. 179–188, 2015. [125] S. M. Elshoura and D. B. Megherbi, “A secure high capacity full-gray-scale-level multi-image information hiding and secret image authentication scheme via Tchebichef moments,” Signal Process. Image Commun., vol. 28, no. 5, pp. 531–552, 2013. [126] H. A. Jalab et al., “Frame Selected Approach for Hiding Data within MPEG Video Using Bit Plane Complexity Segmentation,” J. Comput., vol. 1, no. 1, pp. 108–113, Dec. 2009. [127] M. Elnajjar et al., “Optimization digital image watermarking technique for patent protection,” arXiv Prepr. arXiv1002.4049, 2010. [128] Z. K. Al-Ani et al., “Overview: Main Fundamentals for Steganography,” undefined, 2010. [129] A. W. Naji, “New System for Secure Cover File of Hidden Data in the Image Page within Executable File Using Statistical Steganography Techniques,” Int. J. Comput. Sci. Inf. Secur., vol. 7, no. 1, pp. 273–279, 2009. [130] M. L. M. Kiah et al., “A review of audio based steganography and digital watermarking,” Int. J. Phys. Sci., vol. 6, no. 16, pp. 3837–3850, 2011. [131] S. H. Al-Bakri et al., “Securing peer-to-peer mobile communications using public key cryptography: New security strategy,” Int. J. Phys. Sci., vol. 6, no. 4, pp. 930–938, 2011. [132] B. B. Zaidan et al., “On the differences between hiding information and cryptography techniques: An overview,” Journal of Applied Sciences, vol. 10, no. 15. pp. 1650–1655, 2010. [133] A. A. Zaidan et al., “Securing Cover-File Without Limitation of Hidden Data Size Using Computation Between Cryptography and Steganography,” in Proceedings of the World Congress on Engineering, 2009, vol. I. [134] A.-N. Yahya et al., “A new system for hidden data within header space for EXE-File using object oriented technique,” in 2010 3rd International Conference on Computer Science and Information Technology, 2010, vol. 7, pp. 9–13. [135] A. A. Zaidan et al., “Implementation stage for high securing cover-file of hidden data using computation between cryptography and steganography,” Int. Assoc. Comput. Sci. Inf. Technol. (IACSIT), Index. by Nielsen, Thomson ISI (ISTP), IACSIT Database, Br. Libr. EI Compend., vol. 20, 2009. [136] O. O. Khalifa et al., “Novel approach of hidden data in the (unused area 2 within EXE file) using computation between cryptography and steganography,” Int. J. Comput. Sci. Netw. Secur., vol. 9, no. 5, pp. 294–300, 2010. [137] A. W. Naji et al., “Novel Approach for Secure Cover File of Hidden Data in the Unused Area within EXE File Using Computation between Cryptography and Steganography,” J. Comput. Sci., vol. 9, no. 5, pp. 294–300, 2009. [138] A. H. Mohsin et al., “Real-Time Medical Systems Based on Human Biometric Steganography: a Systematic Review,” J. Med. Syst., vol. 42, no. 12, p. 245, Dec. 2018. [139] C. K. Chan and L. M. Cheng, “Hiding data in images by simple LSB substitution,” Pattern Recognit., vol. 37, no. 3, pp. 469–474, 2004. [140] C. H. Yang, C. Y. Weng, S. J. Wang, and H. M. Sun, “Adaptive data hiding in edge areas of images with spatial LSB domain systems,” IEEE Trans. Inf. Forensics Secur., vol. 3, no. 3, pp. 488–497, 2008. [141] A. Ioannidou, S. T. Halkidis, and G. Stephanides, “A novel technique for image steganography based on a high payload method and edge detection,” Expert Syst. Appl., vol. 39, no. 14, pp. 11517–11524, 2012. [142] S. Ordaz-Gutierrez, F. J. Gallegos-Funes, A. J. Rosales-Silva, B. E. Carvajal-Gamez, and D. Mujica-Vargas, “Diagnosis of acute lymphoblastic leukaemia using fuzzy logic and neural networks,” Imaging Sci. J., vol. 61, no. 1, pp. 57–64, 2013. [143] A. Thamallah, A. Sakly, and F. M?Sahli, “A new constrained PSO for fuzzy predictive control of QuadrupleTank process,” Meas. J. Int. Meas. Confed., vol. 136, pp. 93–104, 2019. [144] J. Matos, R. P. V. Faria, I. B. R. Nogueira, J. M. Loureiro, and A. M. Ribeiro, “Optimization strategies for chiral separation by true moving bed chromatography using Particles Swarm Optimization (PSO) and new Parallel PSO variant,” Comput. Chem. Eng., vol. 123, pp. 344–356, 2019. [145] I. Tariq et al., “MOGSABAT: a metaheuristic hybrid algorithm for solving multi-objective optimisation problems,” Neural Comput. Appl., vol. 30, pp. 1–15, Oct. 2018. [146] F. Sameer et al., “A new algorithm of modified binary particle swarm optimization based on the GustafsonKessel for credit risk assessment,” Neural Comput. Appl., no. Preprints, pp. 1–10, 2018. [147] A. A. Zaidan et al., “A new hybrid algorithm of simulated annealing and simplex downhill for solving multiple-objective aggregate production planning on fuzzy environment,” Neural Comput. Appl., Jul. 2017. [148] Y. Prasad, K. K. Biswas, and M. Hanmandlu, “A recursive PSO scheme for gene selection in microarray data,” Appl. Soft Comput. J., vol. 71, pp. 213–225, 2018. [149] L. Hongbo and A. Abraham, “Fuzzy adaptive turbulent particle swarm optimization,” Proc. - HIS 2005 Fifth Int. Conf. Hybrid Intell. Syst., vol. 2005, pp. 445–450, 2005. [150] Y. Lu, S. J. Xie, S. Yoon, Z. Wang, and D. S. Park, “An available database for the research of finger vein recognition,” Proc. 2013 6th Int. Congr. Image Signal Process. CISP 2013, vol. 1, no. February 2015, pp. 410–415, 2013. [151] Y. Lu, S. J. Xie, S. Yoon, J. Yang, and D. S. Park, “Robust finger vein ROI localization based on flexible segmentation,” Sensors (Switzerland), vol. 13, no. 11, pp. 14339–14366, 2013
|
This material may be protected under Copyright Act which governs the making of photocopies or reproductions of copyrighted materials. You may use the digitized material for private study, scholarship, or research. |