UPSI Digital Repository (UDRep)
Start | FAQ | About

QR Code Link :

Type :article
Subject :RA0421 Public health. Hygiene. Preventive Medicine
Main Author :Albahrey, Shihab Ahmed
Additional Authors :Al-Juboori, A. Z. Ansaef
Zaidan, Bilal Bahaa
Ali Hadi Mohsin
Albahri, A.s.
Alsalem, Mohammed Assim
K. I. Mohammed
Title :Based medical systems for patient
Place of Production :Tanjong Malim
Publisher :Fakulti Seni, Komputeran dan Industri Kreatif
Year of Publication :2019
Corporate Name :Universiti Pendidikan Sultan Idris
PDF Full Text :Login required to access this item.

Abstract : Universiti Pendidikan Sultan Idris
In medical systems for patient’s authentication, keeping biometric data secure is a general problem. Many studies have presented various ways of protecting biometric data especially finger vein biometric data. Thus, It is needs to find better ways of securing this data by applying the three principles of information security aforementioned, and creating a robust verification system with high levels of reliability, privacy and security. Moreover, it is very difficult to replace biometric information and any leakage of biometrics information leads to earnest risks for example replay attacks using the robbed biometric data. In this paper presented criticism and analysis to all attempts as revealed in the literature review and discussion the proposes a novel verification secure framework based confidentiality, integrity and availability (CIA) standard in triplex blockchain-particle swarm optimization (PSO)-advanced encryption standard (AES) techniques for medical systems patient’s authentication. Three stages are performed on discussion. Firstly, proposes a new hybrid model pattern in order to increase the randomization based on radio frequency identification (RFID) and finger vein biometrics. To achieve this, proposed a new merge algorithm to combine the RFID features and finger vein features in one hybrid and random pattern. Secondly, how the propose verification secure framework are followed the CIA standard for telemedicine authentication by combination of AES encryption technique, blockchain and PSO in steganography technique based on proposed pattern model. Finally, discussed the validation and evaluation of the proposed verification secure framework.

References

1. Poon, C. C. Y., and Zhang, Y.-T.-D. B., A Novel Biometrics Method to Secure Wireless Body Area Sensor Networks for Telemedicine and M-Health Networks for Telemedicine and MHealth. IEEE Commun. Mag. 44:73–81, 2006.

2. Kiah, M. L. M., Zaidan, B. B., Zaidan, A. A., Nabi, M., and Ibraheem, R., MIRASS: Medical Informatics Research Activity Support System Using Information Mashup Network. J. Med. Syst. 38(4):37, 2014.

3. Zaidan, B. B., Haiqi, A., Zaidan, A. A., Abdulnabi, M., Kiah, M. L. M., and Muzamel, H., A Security Framework for Nationwide Health Information Exchange based on Telehealth Strategy. J. Med. Syst. 39(5):51, 2015.

4. Mat Kiah, M. L., Al-Bakri, S. H., Zaidan, A. A., Zaidan, B. B., and Hussain, M., Design and Develop a Video Conferencing Framework for Real-Time Telemedicine Applications Usin Secure Group-Based Communication Architecture. J. Med. Syst.38(10):133, 2014.

5. Alsalem, M. A. et al., Systematic Review of an Automated Multiclass Detection and Classification System for Acute Leukaemia in Terms of Evaluation and Benchmarking, Open Challenges, Issues and Methodological Aspects. J. Med. Syst. 42(11):204, 2018.

6. Abdulnabi, M., Al-Haiqi, A., Kiah, M. L. M., Zaidan, A. A., Zaidan, B. B., and Hussain, M., A distributed framework for health information exchange using smartphone technologies. J. Biomed. Inform. 69:230–250, 2017.

7. Alsalem, M. A. et al., A review of the automated detection and classification of acute leukaemia: Coherent taxonomy, datasets,validation and performance measurements, motivation, open challenges and recommendations. Comput. Methods Prog. Biomed. 158:93–112, 2018.

8. Enaizan, O., et al., Electronic medical record systems: decision support examination framework for individual, security and privacy concerns using multi-perspective analysis. Health Technol. (Berl). 1–28, 2018.

9. Zaidan, A. A., Zaidan, B. B., Al-Haiqi, A., Kiah, M. L. M., Hussain, M., and Abdulnabi, M., Evaluation and selection of open-source EMR software packages based on integrated AHP and TOPSIS. J. Biomed. Inform. 53:390–404, 2015.

10. Kiah, M. L. M., Haiqi, A., Zaidan, B. B., and Zaidan, A. A., Open source EMR software: profiling, insights and hands-on analysis. Comput. Methods Prog. Biomed. 117(2):360–382, 2014.

11. Zaidan, A. A., Zaidan, B. B., Hussain, M., Haiqi, A., Mat Kiah, M. L., and Abdulnabi, M., Multi-criteria analysis for OS-EMR software selection problem: A comparative study. Decis. Support. Syst. 78:15–27, 2015.

12. Zaidan, A. A., Zaidan, B. B., Kadhem, Z., Larbani, M., Lakulu, M. B., and Hashim, M., Challenges, Alternatives, and Paths toSustainability: Better Public Health Promotion Using Social Networking Pages as Key Tools. J. Med. Syst. 39(2):7, 2015.

13. Hussain, M. et al., The landscape of research on smartphone medical apps: Coherent taxonomy, motivations, open challenges and recommendations. Comput. Methods Prog. Biomed. 122(3):393–408, 2015.

14. Zaidan, A. A. et al., A review on smartphone skin cancer diagnosis apps in evaluation and benchmarking: coherent taxonomy, open issues and recommendation pathway solution. Health Technol. (Berl). 8(4):223–238, 2018

15. Alanazi, H. O., Zaidan, A. A., Zaidan, B. B., Kiah, M. L. M., and Al-Bakri, S. H., Meeting the Security Requirements of Electronic Medical Records in the ERA of High-Speed Computing. J. Med. Syst. 39(1):165, 2015.

16. Nidhal, S., Ali, M. A. M., Zaidan, A. A., Zaidan, B. B., and Najah, H., Computerized algorithm for fetal heart rate baseline and baseline variability estimation based on distance between signal average and alpha value. Int. J. Pharmacol. 7(2):228–237, 2011.

17. Yas, Q. M., Zaidan, A. A., Zaidan, B. B., Hashim, M., and Lim, C. K., A systematic review on smartphone skin cancer apps: Coherent taxonomy, motivations, open challenges and recommendations, and new research direction. J. Circuits, Syst. Comput. 1830003, 2017.

18. Rajan, S. P., Review and investigations on future research directions of mobile based telecare system for cardiac surveillance. Journal of Applied Research and Technology 13(4. Universidad Nacional Autónoma de México, Centro de Ciencias Aplicadas y Desarrollo Tecnológico.):454–460, 2015.

19. Negra, R., Jemili, I., and Belghith, A., Wireless Body Area Networks: Applications and Technologies. Procedia Comput. Sci. 83:1274–1281, 2016.

20. Albahri, A. S., Zaidan, A. A., Albahri, O. S., Zaidan, B. B., and Alsalem, M. A., Real-Time Fault-Tolerant mHealth System: Comprehensive Review of Healthcare Services, Opens Issues,Challenges and Methodological Aspects. J. Med. Syst., 2018.

21. Albahri, O. S. et al., Systematic Review of Real-time Remote Health Monitoring System in Triage and Priority-Based Sensor Technology: Taxonomy, Open Challenges, Motivation and Recommendations. J. Med. Syst. 42(5), 2018.

22. Albahri, O. S., Zaidan, A. A., Zaidan, B. B., Hashim, M., Albahri, A. S., and Alsalem, M. A., Real-Time Remote Health-Monitoring Systems in a Medical Centre: A Review of the Provision of Healthcare Services-Based Body Sensor Information, Open Challenges and Methodological Aspects. J. Med. Syst. 42(9): 164, 2018.

23. Salman, O. H., Zaidan, A. A., Zaidan, B. B., Kalid, N., and Hashim, M., Novel Methodology for Triage and Prioritizing Using ‘Big Data’ Patients with Chronic Heart Diseases Through Telemedicine Environmental. Int. J. Inf. Technol. Decis. Mak. 16(05):1211–1245, 2017.

24. Albahri, A. S., Zaidan, A. A., Albahri, O. S., Zaidan, B. B., and Alsalem, M. A., Real-Time Fault-Tolerant mHealth System: Comprehensive Review of Healthcare Services, Opens Issues, Challenges and Methodological Aspects. J. Med. Syst. 42(8. Springer US):137, 2018.

25. Shuwandy, M. L., Zaidan, B. B., Zaidan, A. A., and Albahri, A. S., Sensor-Based mHealth Authentication for Real-Time Remote Healthcare Monitoring System: A Multilayer Systematic Review. J. Med. Syst. 43(2):33, 2019.

26. Talal, M. et al., Smart Home-based IoT for Real-time and Secure Remote Health Monitoring of Triage and Priority System using Body Sensors: Multi-driven Systematic Review. J. Med. Syst. 43(3):42, 2019.

27. Albahri, A. S., et al., Fault-Tolerant mHealth Framework in the Context of IoT Based Real-Time Wearable Health Data Sensor. IEEE Access, 2019.

28. Albahri, O. S., et al., Based multiple heterogeneous wearable sensors: a smart real-time health-monitoring structured for hospitals distributor. IEEE Access. 1, 2019.

29. Kalid, N. et al., Based on Real Time Remote Health Monitoring systems: A New Approach for Prioritization ‘Large Scales Data’ Patients with Chronic Heart Diseases Using Body Sensors and Communication Technology. J. Med. Syst. 42(4), 2018.

30. Mohsin, A. H. et al., Real-Time Remote Health Monitoring Systems Using Body Sensor Information and Finger Vein Biometric Verification: A Multi-Layer Systematic Review. J. Med. Syst. 42(12):238, 2018.

31. Kalid, N., Zaidan, A. A., Zaidan, B. B., Salman, O. H., Hashim, M., and Muzammil, H., Based Real Time Remote Health Monitoring Systems: A Review on Patients Prioritization and Related" Big Data" Using Body Sensors information and Communication Technology. J. Med. Syst. 42(2):30, 2018.

32. Mishra, D., and Mukhopadhyay, S., Security Enhancement of Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce. J. Med. Syst. 37(5):1–24, 2013.

33. Nabi, M. S., Kiah, M. L. M., Zaidan, A. A., and Zaidan, B. B., Suitability of adopting S/MIME and OpenPGP email messages protocol to secure electronic medical records. In: Second International Conference on Future Generation Communication Technologies (FGCT 2013), pp. 93–97, 2013.

34. Iqbal, S., et al., Real-time-based E-health systems: design and implementation of a lightweight key management protocol for securing sensitive information of patients,” Health Technol. (Berl)., pp. 1–19, 2018.

35. Zaidan, B. B., Zaidan, A. A., and Mat Kiah, M. L., Impact of data privacy and confidentiality on developing telemedicine applications: A review participates opinion and expert concerns. Int. J. Pharmacol. 7(3):382–387, 2011.

36. Hameed, S. A., Zaidan, B. B., Zaidan, A. A., Naji, A. W., and tawfiq, O. F., An accurate method to obtain bio-metric measurements for three dimensional skull. J. Appl. Sci. 10(2):145–150, 2010.

37. Shihab, A. H., Zaidan, B. B., Zaidan, A. A., Naji, A. W., and Omar, F., Accurate Method to Measure Three Dimensional Skull Bio-Metric. J. Appl. Sci. 10(2):145–150, 2010.

38. Brogan, J., Baskaran, I., and Ramachandran, N., Authenticating Health Activity Data Using Distributed Ledger Technologies. Comput. Struct. Biotechnol. J. 16:257–266, 2018.

39. Hameed, S. A., Zaidan, B. B., Zaidan, A. A., Naji, A. W., and Faroq, O., Novel Simulation Framework of Three-Dimensional Skull Bio-Metric Measurement. International J. Comput. Sci. Eng. 1(3):269–274, 2009.

40. Zaidan, B. B., Zaidan, A. A., and Mwafak, H., New Comprehensive Study to Assess Comparatively the QKD, XKMS, KDM in the PKI encryption algorithms. Int. J. Comput. Sci. Eng. 1(3):263–268, 2009.

41. Talib, Y. Y. A., Zaidan, B. B., Zaidan, A. A., and Naji, A. W., Optimizing security and flexibility by designing a high security system for E-government servers. ICOCI09, Univ. Utara Malaysia, 2009.

42. Hussain, M. et al., Conceptual framework for the security of mobile health applications on Android platform. Telemat. Informatics 35(5):1335–1354, 2018.

43. Hussain, M. et al., A security framework for mHealth apps on Android platform. Comput. Secur. 75:191–217, 2018.

44. Watari, M. A., Zaidan, A. A., and Zaidan, B. B., Securing mGovernment Transmission Based on Symmetric and Asymmetric Algorithms: A review. Asian J. Sci. Research 8:80–94, 2013.

45. Alanazi, H., Noor, R. M., Zaidan, B. B., and Zaidan, A. A., Intrusion detection system: overview. arXiv Prepr. arXiv1002.4047, 2010.

46. Raad, M., Yeassen, N. M., Alam, G. M., Zaidan, B. B., and Zaidan, A. A., Impact of spam advertisement through e-mail: A study to assess the influence of the anti-spam on the e-mail marketing. Afr. J. Bus. Manag. 4(11):2362–2367, 2010.

47. Medani, A., Gani, A., Zakaria, O., Zaidan, A. A., and Zaidan, B. B., Review of mobile short message service security issues and techniques towards the solution. Sci. Res. Essays 6(6):1147–1165, 2011.

48. Naji, A. W., Housain, A. S., Zaidan, B. B., Zaidan, A. A., and Hameed, S. A., Security improvement of credit card online purchasing system. Sci. Res. Essays 6(16):3357–3370, 2011.

49. Hussain, M. et al., The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks. Pervasive Mob. Comput. 25:1–25, 2016.

50. Alanazi, H. O., Mat Kiah, M. L., Zaidan, A. A., Zaidan, B. B., and Alam, G. M., Secure topology for electronic medical record transmissions. Int. J. Pharmacol. 6(6):954–958, 2010.

51. Hamdan, O. A., Gazi, M. A., Zaidan, B. B., and Zaidan, A. A., Securing electronic medical records transmissions over unsecured communications: An overview for better medical governance. J. Med. Plant Res. 4(19):2059–2074, 2010.

52. Nabi, M. S. A., Kiah, M. L. M., Zaidan, B. B., Zaidan, A. A., and Alam, G. M., Suitability of Using SOAP Protocol to Secure Electronic Medical Record Databases Transmission. Int. J. Pharmacol. 6(6):959–964, 2010.

53. Nandhinipreetha, A., and Radha, N., Multimodal biometric template authentication of finger vein and signature using visual cryptography. 2016 Int. Conf. Comput. Commun. Informatics, ICCCI 2016, pp. 7–10, 2016.

54. Suzuki, H., Suzuki, M., Urabe, T., and Obi, T., Secure biometric image sensor and authentication scheme based on compressed sensing. Appl. Opt. 52(33):8161–8168, 2013.

55. Wu, Z., Tian, L., Li, P., Wu, T., Jiang, M., and Wu, C., Generating stable biometric keys for flexible cloud computing authentication using finger vein. Inf. Sci. (Ny).:1–17, 2016.

56. Cheng, Y., Chen, H., and Cheng, B., Special point representations for reducing data space requirements of finger-vein recognition applications. Multimed. Tools Appl. 76(278), 2016.

57. Chavez-Galaviz, J., Ruiz-Rojas, J., and Garcia-Gonzalez, A., Embedded biometric cryptosystem based on finger vein patterns. 2015 12th Int. Conf. Electr. Eng. Comput. Sci. Autom. Control. CCE 2015, pp. 1–6, 2015.

58. Jagadiswary, D., and Saraswady, D., Biometric Authentication using Fused Multimodal Biometric. Procedia - Procedia Comput. Sci. 85(CMS):109–116, 2016.

59. Jialiang Peng, X. N., Li, Q., and Abd El-Latif, A. A., Finger multibiometric cryptosystems: fusion strategy and template security. J. Biomed. Opt. 19(2):020901, 2014.

60. Murakami, T., Ohki, T., and Takahashi, K., Optimal sequential fusion for multibiometric cryptosystems. Inf. Fusion 32:93–108, 2016.

61. Alanazi, H. O., Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden : Analytical study. Sci. Res. Essays 5(21):3254–3260, 2010.

62. Zaidan, A. A., Zaidan, B. B., Taqa, Y. A., Sami, M. K., Alam, G. M., and Jalab, A. H., Novel multi-cover steganography using remote sensing image and general recursion neural cryptosystem. Academic Journals 5(11), 2010.

63. Zaidan, B. B., Zaidan, A. A., Taqa, A., Alam, G. M., Kiah, M. L. M., and Jalab, H., StegoMos: A secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem. Int. J. Phys. Sci. 5(11):1796–1806, 2010.

64. Naji, A. W., Zaidan, A. A., Zaidan, B. B., and Muhamadi, I. A. S., Novel approach for cover file of hidden data in the unused area two within EXE file using distortion techniques and advance encryption standard. Proceeding World Acad. Sci. Eng. Technol. 56(5):498–502, 2010.

65. Naji, A. W., Hameed, S. A., Al-khateeb, W. F., Khalifa, O. O., and Gunawan, T. S., Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques. Int. J. Comput. Sci. Inf. Secur. 3(1):1–6, 2009.

66. Abomhara, M., Zakaria, O., Khalifa, O. O., Zaidan, A. A., and Zaidan, B. B., Enhancing Selective Encryption for H. 264/ AVCUsing Advanced Encryption Standard. Int. J. Comput. Electr. Eng. 2(2):223, 2010.

67. Abomhara, M., Khalifa, O. O., Zakaria, O., Zaidan, A. A., Zaidan, B. B., and Alanazi, H. O., Suitability of using symmetric key to secure multimedia data: An overview. J. Appl. Sci. 10(15):1656– 1661, 2010.

68. Alanazi, H., Zaidan, B. B., Zaidan, A. A., Jalab, H. A., Shabbir, M., and Al-Nabhani, Y., New comparative study between DES, 3DES and AES within nine factors. arXiv Prepr. arXiv1003.4085, 2010.

69. Salem, Y., Abomhara, M., Khalifa, O. O., Zaidan, A. A., and Zaidan, B. B., A review on multimedia communications cryptography. Res. J. Inf. Technol. 3:146–152, 2011.

70. Zaidan, B. B., Zaidan, A. A., Al-Frajatand, A. K., and Jalab, H. A., On the differences between hiding information and cryptography techniques: An overview. J. Appl. Sci. 10(15):1650–1655, 2010.

71. Al-Bakri, S. H., Mat Kiah, M. L., Zaidan, A. A., Zaidan, B. B., and Alam, G. M., Securing peer-to-peer mobile communications using public key cryptography: New security strategy. Int. J. Phys. Sci. 6(4):930–938, 2011.

72. Abomhara, M., Khalifa, O. O., Zaidan, A. A., Zaidan, B. B., Zakaria, O., and Gani, A., An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): Selective cryptography. Int. J. Phys. Sci. 6(16):4053–4063, 2011.

73. Zaidan, A. A., Othman, F., Zaidan, B. B., Raji, R. Z., Hasan, A. K., and Naji, A. W., Securing Cover-File Without Limitation of Hidden Data Size Using Computation Between Cryptography and Steganography. Proceedings of the World Congress on Engineering I, 2009.

74. Kiah, M. L. M., Nabi, M. S., Zaidan, B. B., and Zaidan, A. A., An Enhanced Security Solution for Electronic Medical Records Based on AES Hybrid Technique with SOAP/XML and SHA-1. J. Med. Syst. 37(5):9971, 2013.

75. Yang, X., Li, Z., Wang, A., and Wen, S., Design research of the des against power analysis attacks based on FPGA. Microprocess. Microsyst. 35(1):18–22, 2011.

76. Yun-Peng, Z., Digital image encryption algorithm based on chaos and improved DES. pp. 480–485, 2009.

77. Singh, G., A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security. Int. J. Comput. Appl. 67(19): 975–8887, 2013.

78. Patil, P., Narayankar, P., Narayan, D. G., and Meena, S. M., A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish. Procedia Comput. Sci. 78:617– 624, 2016.

79. Zaidan, A. A., Majeed, A., and Zaidan, B. B., High Securing Cover-File of Hidden Data Using Statistical Technique and AES Encryption Algorithm. World Acad. Sci. Eng. Technol. 54:463– 474, 2009.

80. Kundi, D. S., Aziz, A., and Ikram, N., A high performance STBox based unified AES encryption/decryption architecture on FPGA. Microprocess. Microsyst. 41:37–46, 2016.

81. Mathur, N., and Bansode, R., AES Based Text Encryption Using 12 Rounds with Dynamic Key Selection. Procedia Comput. Sci. 79:1036–1043, 2016.

82. Von Solms, R., and Van Niekerk, J., From information security to cyber security. Comput. Secur. 38:97–102, 2013.

83. Nassar, S. S. et al., Secure Wireless Image Communication Using LSB Steganography and Chaotic Baker Ciphering. Wirel. Pers. Commun. 91(3):1023–1049, 2016.

84. Skillen, A., and Mannan, M., Mobiflage: Deniable storage encryption for mobile devices. IEEE Trans. Dependable Secur. Comput. 11(3):224–237, 2014.

85. Rahman, F., Bhuiyan, M. Z. A., and Ahamed, S. I., A privacy preserving framework for RFID based healthcare systems. Futur. Gener. Comput. Syst. 72:339–352, 2017.

86. Joseph, S. A., and Joby, N. J., Analyzing RFID Tags in a Distributed Environment. Procedia Technol. 24:1483–1490, 2016.

87. Shen, H., Shen, J., Khan, M. K., and Lee, J.-H., Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things. Wirel. Pers. Commun. 96(4):5253–5266, 2017.

88. Williamson, A., Tsay, L.-S., Kateeb, I. A., and Burton, L., Solutions for RFID Smart Tagged Card Security Vulnerabilities. AASRI Procedia 4:282–287, 2013.

89. Mohsin, A. H. et al., Blockchain authentication of network applications: Taxonomy, classification, capabilities, open challenges, motivations, recommendations and future directions. Comput. Stand. Interfaces, 2018.

90. Fernández-Caramés, T. M., and Member, S., A review on the use of blockchain for the internet of things. 3536(c): 1–23, 2018.

91. Li, X., Jiang, P., Chen, T., Luo, X., and Wen, Q., A survey on the security of blockchain systems. Futur. Gener. Comput. Syst, 2017.

92. Kshetri, N., Blockchain’s roles in strengthening cybersecurity and protecting privacy. Telecommun. Policy 41(10):1027–1038, 2017.

93. Tian, F., An Agri-food supply chain traceability system for China based on RFID & blockchain Technology. 2016 13th Int. Conf. Serv. Syst. Serv. Manag., pp. 1–6, 2016.

94. B. Cresitello-Dittmar, “Application of the Blockchain For Authentication and Verification of Identity,” 2016.

95. Zaidan, B. B., Zaidan, A. A., and Othman, F., Enhancement of the amount of hidden data and the quality of image. Kuala Lumpur: Fac. Comput. Sci. Inf. Technol. Univ. Malaya, 2008.

96. Zaidan, A. A., and Zaidan, B. B., Novel approach for high secure data hidden in MPEG video using public key infrastructure. Int. J. comput. Netw. Secur. 1(1):1553–1985, 2009.

97. Naji, A. W., Zaidan, A. A., and Zaidan, B. B., Challenges of hidden data in the unused area two within executable files. J. Comput. Sci. 5(11):890–897, 2009.

98. Yahya, A.-N., Zaidan, A. A., Zaidan, B. B., Jalab, H. A., andAlanazi, H. O., A new system for hidden data within header space  for EXE-File using object oriented technique. In: 2010 3rd International Conference on Computer Science and Information Technology, vol. 7, pp. 9–13, 2010.

99. Hmood, A. K., Kasirun, Z. M., Jalab, H. A., Alam, G. M., Zaidan, A. A., and Zaidan, B. B., On the accuracy of hiding information metrics: Counterfeit protection for education and important certificates. Int. J. Phys. Sci. 5(7):1054–1062, 2010.

100. Jalab, H. A., Zaidan, A. A., and Zaidan, B. B., New design for information hiding with in steganography using Distortion Techniques. ijetch.org, vol. 2, no. 1, 2010.

101. Majeed, A., Kiah, L. M., Madhloom, H. T., Zaidan, B. B., and Zaidan, A. A., Novel approach for high secure and high rate data hidden in the image using image texture analysis. eprints.um.edu. my, vol. 1, no. 2, pp. 63–69, 2009.

102. Zaidan, B. B., Zaidan, A. A., Taqa, A. Y., and Othman, F., An empirical study for impact of the increment the size of hidden data on the image texture. ICFCC09, 2009.

103. Zaidan, A. A., Zaidan, B. B., Abdulrazzaq, M. M., Raji, R. Z., and Mohammed, S. M., Implementation stage for high securing coverfile of hidden data using computation between cryptography and steganography. Int. Assoc. Comput. Sci. Inf. Technol. (IACSIT), Index. by Nielsen, Thomson ISI (ISTP), IACSIT Database, Br. Libr. EI Compend., vol. 20, 2009.

104. Zaidan, B. B., and Zaidan, A. A., Comparative study on the evaluation and benchmarking information hiding approaches based multi-measurement analysis using TOPSIS method with different normalisation, separation and context techniques. Measurement 117:277–294, 2018.

105. Zaidan, A. A., Naji, A. W., Hameed, S. A., Othman, F., andZaidan, B. B., Approved undetectable-antivirus steganography for multimedia information in PE-file. In International Conference on IACSIT Spring Conference (IACSIT-SC09), Advanced Management Science (AMS), Listed in IEEE Xplore and be indexed by both EI (Compendex) and ISI Thomson (ISTP), Session, vol. 9, pp. 425–429, 2009.

106. Ahmed, M. A., Mat Kiah, M. L., Zaidan, B. B., and Zaidan, A. A., A Novel Embedding Method to Increase Capacity and Robustness of Low-bit Encoding Audio Steganography Technique Using Noise Gate Software Logic Algorithm. J. Appl. Sci. 10(1):59–64, 2010.

107. Al-Frajat, A. K., Jalab, H. A., Kasirun, Z. M., Zaidan, A. A., and Zaidan, B. B., Hiding Data in Video File: An Overview. J. Appl. Sci. 10(15):1644–1649, 2010.

108. Naji, A. W., Zaidan, A. A., Zaidan, B. B., and Muhamadi, I. A. S., New approach of hidden data in the portable executable file without change the size of carrier file using distortion techniques. Proceeding World Acad. Sci. Eng. Technol. 56:493–497, 2009.

109. Eltahir, M. E., Kiah, L. M., Zaidan, B. B., and Zaidan, A. A., High rate video streaming steganography. In 2009 International Conference on Information Management and Engineering, pp. 550–553, 2009.

110. Zaidan, B. B., Zaidan, A. A., Karim, H. A., and Ahmad, N. N., A new digital watermarking evaluation and benchmarking methodology using an external group of evaluators and multicriteria analysis based on ‘large-scale data. Softw. Pract. Exp. 47(10):1365–1392, 2017.

111. Zaidan, B. B., and Zaidan, A. A., Software and Hardware FPGABased Digital Watermarking and Steganography Approaches: Toward New Methodology for Evaluation and Benchmarking Using Multi-Criteria Decision-Making Techniques. J. Circuits, Syst. Comput. 26(07):1750116, 2017.

112. Othman, F., Maktom, L., Taqa, A. Y., Zaidan, B. B., and Zaidan, A. A., An extensive empirical study for the impact of increasing data hidden on the images texture. In: 2009 International Conference on Future Computer and Communication, pp. 477–481, 2009.

113. Zaidan, A. A., Zaidan, B. B., Hamdan Alanazi, O., Gani, A., Zakaria, O., and Alam, G. M., Novel approach for high (secure and rate) data hidden within triplex space for executable file. Sci.Res. Essays 5(15), 1965.

114. Zaidan, B., Zaidan, A., Othman, F., Raji, R. Z., Mohammed, S., and Abdulrazzaq, M., Quality of Image vs. Quantity of Data Hidden in the Image. IPCV 6:343–350, 2009.

115. Naji, A. W., Gunawan, T. S., Hameed, S. A., Zaidan, B. B., and Zaidan, A. A., Stego-analysis chain, session one’ investigations on steganography weakness VS stego-analysis system for multimedia file. In 2009 International Association of Computer Science and Information Technology - Spring Conference, IACSIT-SC 2009, pp. 405–409, 2009.

116. Zaidan, B., Zaidan, A., Taqa, A., F. O.-I. J. Of, and U., Stegoimage vs stego-analysis system. Citeseer 1(5):1793–8163, 2009.

117. Zaidan, A. A., Zaidan, B. B., Al-Frajat, A. K., and Jalab, H. A., Investigate the capability of applying hidden data in text file: An overview. J. Appl. Sci. 10(17):1916–1922, 2010.

118. Zaidan, B. B., Zaidan, A. A., Abdul Karim, H., and Ahmad, N. N., A New Approach based on Multi-Dimensional Evaluation and Benchmarking for Data Hiding Techniques. Int. J. Inf. Technol. Decis. Mak.:1–42, 2017.

119. Hmood, A. K., Zaidan, B. B., Zaidan, A. A., and Jalab, H. A., An Overview on Hiding Information Technique in Images. J. Appl. Sci. 10(18):2094–2100, 2010.

120. Khalifa, O. O., Naji, A. W., Zaidan, A. A., Zaidan, B. B., and Hameed, S. A., Novel approach of hidden data in the (unused area 2 within EXE file) using computation between cryptography and steganography. Int. J. Comput. Sci. Netw. Secur. 9(5):294–300, 2010.

121. Naji, A. W., Zaidan, A. A., Zaidan, B. B., Hameed, S. A., and Khalifa, O. O., Novel Approach for Secure Cover File of Hidden Data in the Unused Area within EXE File Using Computation between Cryptography and Steganography. J. Comput. Sci. 9(5): 294–300, 2009.

122. Zaidan, A. A., Zaidan, B., and Othman, F., New Technique of Hidden Data in PE-File with in Unused Area One. Int. J. Comput. Electr. Eng. 1(5):642–650, 2009.

123. Hamdan, A., Jalab, H. A., Zaidan, A. A., and Zaidan, B. B., New frame work of hidden data with in non multimedia file. Int. J. Comput. Netw. Secur. 2(1):46–54, 2010.

124. Hussain, M., Abdul Wahab, A. W., Batool, I., and Arif, M., Secure password transmission for web applications over internet using cryptography and image steganography. Int. J. Secur. its Appl. 9(2):179–188, 2015.

125. Naji, A. W., Hameed, S. A., Islam, M. R., Zaidan, B. B., Gunawan, T. S., and Zaidan, A. A., Stego-analysis chain, session two’ novel approach of stego-analysis system for image file. In 2009 International Association of Computer Science and Information Technology-Spring Conference, pp. 410–413, 2009.

126. Mohsin, A. H. et al., Real-Time Medical Systems Based on Human Biometric Steganography: a Systematic Review. J. Med. Syst. 42(12):245, 2018.

127. Ali, A. H., George, L. E., Zaidan, A. A., and Mokhtar, M. R., High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain. Multimed. Tools Appl., 2018.

128. Taqa, A., Zaidan, A. A., and Zaidan, B. B., New Framework for High Secure Data Hidden in the MPEG Using AES Encryption Algorithm. Citeseer 1(5):8163, 2009.

129. Hmood, A. K., Jalab, H. A., Kasirun, Z. M., Zaidan, B. B., and Zaidan, A. A., On the capacity and security of steganography approaches: An overview. J. Appl. Sci. 10(16):1825–1833, 2010.

130. Al-khateeb, W. F., and Hameed, S. A., New Approach of Hidden Data in the portable Executable File without Change the Size of Carrier File Using Statistical Technique. Int. J. Comput. Sci. Netw. Secur. 9(7):218–224, 2009.

131. Alanazi, H., Zaidan, A. A., Zaidan, B. B., Jalab, H. A., and AlAni, Z. K., New classification methods for hiding information into two parts: multimedia files and non multimedia files. arXiv Prepr. arXiv1003.4084, 2010.

132. Zaidan, A. A., and Zaidan, B., A New System for Hiding Data within (Unused Area Two + Image Page) of Portable Executable File using Statistical Technique and Advance Encryption Standared.

133. Elshoura, S. M., and Megherbi, D. B., A secure high capacity fullgray-scale-level multi-image information hiding and secret image authentication scheme via Tchebichef moments. Signal Process. Image Commun. 28(5):531–552, 2013.

134. Jalab, H. A., Zaidan, A. A., and Zaidan, B. B., Frame Selected Approach for Hiding Data within MPEG Video Using Bit Plane Complexity Segmentation. J. Comput. 1(1):108–113, 2009.

135. Elnajjar, M., Zaidan, A. A., Zaidan, B. B., Sharif, M. E. M., and Alanazi, H., Optimization digital image watermarking technique for patent protection. arXiv Prepr. arXiv1002.4049, 2010.

136. Al-Ani, Z. K., Zaidan, A. A., Zaidan, B. B., and Alanazi, H. O., Overview: Main Fundamentals for Steganography. undefined, 2010.

137. Naji, A. W., New System for Secure Cover File of Hidden Data in the Image Page within Executable File Using Statistical Steganography Techniques. Int. J. Comput. Sci. Inf. Secur. 7(1): 273–279, 2009.

138. Kiah, M. L. M., Zaidan, B. B., Zaidan, A. A., Ahmed, A. M., and

Al-Bakri, S. H., A review of audio based steganography and digital watermarking. Int. J. Phys. Sci. 6(16):3837–3850, 2011.

139. Kanan, H. R., and Nazeri, B., A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst. Appl. 41(14): 6123–6130, 2014.

140. Fard, A. M., and Varasteh A. F., A new genetic algorithm approach for secure JPEG steganography. 2006 IEEE Int. Conf. Eng. Intell. Syst., pp. 1–6, 2006.

141. Tseng, L. Y., Chan, Y. K., Ho, Y. A., and Chu, Y. P., “Image hiding with an improved genetic algorithm and an optimal pixel adjustment process,” Proc. - 8th Int. Conf. Intell. Syst. Des. Appl. ISDA 2008, vol. 3, pp. 320–325, 2008.

142. Bhattacharya, T., Bhowmik, S., and Chaudhuri, S. R. B., “A steganographic approach by using Session based Stego-Key, genetic algorithm and variable bit replacement technique,” Proc. 2008 Int. Conf. Comput. Electr. Eng. ICCEE 2008, pp. 51–55, 2008.

143. Wang, S., Yang, B., and Niu, X., A secure steganography method based on genetic algorithm. vol. 1, no. 1, pp. 28–35, 2010.

144. Ghasemi, E. and Shanbehzadeh, J., An imperceptible steganographic method based on Genetic Algorithm. 2010 5th Int. Symp. Telecommun., pp. 836–839, 2010.

145. Eberhart, R. C. and Shi, Y., Particle swarm optimization: developments, applications and resources. Proc. 2001 Congr. Evol. Comput. (IEEE Cat. No.01TH8546), vol. 1, pp. 81–86, 2001.

146. Sameer, F. O., Abu Bakar, M. R., Zaidan, A. A., and Zaidan, B. B., A new algorithm of modified binary particle swarm optimization based on the Gustafson-Kessel for credit risk assessment. Neural Comput. Appl., 2017.

147. Zaidan, A. A., Atiya B., Abu Bakar M. R., and Zaidan B. B., A new hybrid algorithm of simulated annealing and simplex downhill for solving multiple-objective aggregate production planning on fuzzy environment. Neural Comput. Appl., 2017.

148. Tariq, I. et al., MOGSABAT: a metaheuristic hybrid algorithm for solving multi-objective optimisation problems. Neural Comput. & Applic. 30:1–15, 2018.

149. Lu, Y., Xie, S. J., Yoon, S., Wang, Z., and Park, D. S., An available database for the research of finger vein recognition. Proc. 2013 6th Int. Congr. Image Signal Process. CISP 2013 1:410–415, 2013.

150. Lu, Y., Xie, S. J., Yoon, S., Yang, J., and Park, D. S., Robust finger vein ROI localization based on flexible segmentation. Sensors (Switzerland) 13(11):14339–14366, 2013

151. Liu, F., Yang, G., Yin, Y., and Wang, S., Singular value decomposition based minutiae matching method for finger vein recognition. Neurocomputing 145:75–89, 2014.

152. Park, K. R., Lee, E. C., and Lee, H. C., Finger Vein Recognition Using Minutia-Based Alignment and Local Binary Pattern-Based Feature Extraction. Int. J. Imaging Syst. Technol. 19(3):179–186, 2009.

153. Naoto, M., Nagasaka, A., and Miyatake, T., Extraction of FingerVein Patterns Using Maximum Curvature Points in Image Profile. Conf. Mach. Vis. Appl. Tsukuba Sci. City, Japan 34(4):444–448, 2005.

154. Dalal, N. and Triggs B., Histograms of oriented gradients for human detection. Proc. - 2005 IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognition, CVPR 2005, vol. I, pp. 886–893, 2005

 


This material may be protected under Copyright Act which governs the making of photocopies or reproductions of copyrighted materials.
You may use the digitized material for private study, scholarship, or research.

Back to previous page

Installed and configured by Bahagian Automasi, Perpustakaan Tuanku Bainun, Universiti Pendidikan Sultan Idris
If you have enquiries with this repository, kindly contact us at pustakasys@upsi.edu.my or Whatsapp +60163630263 (Office hours only)