Browsing by Author "Kamaruzzaman Seman"
Now showing 1 - 12 of 12
Results Per Page
Sort Options
- Some of the metrics are blocked by yourconsent settings
Publication Automatic Urban Road Users’ Tracking System(Penerbit UTHM, 2021) ;Ma’moun Al-Smadi ;Khairi Abdulrahim ;Kamaruzzaman SemanRosalina Abdul SalamThis paper presents a Dynamic Gradient Pattern (DGP) based on Kalman filtering technique for urban road users tracking. DGP technique is proposed to enhance rigid object descriptive ability for improved verification. DGP descriptor along with weighted centroid was integrated with a Kalman filtering framework to enhance data association robustness and tracking accuracy. To handle multiple objects tracking, a DGP verification approach is addressed based on normalized Bhattacharyya distance. The proposed technique achieves a closer trajectory for rigid body movement. The DGP descriptor can discriminate the objects correctly, and it overcomes the partial occlusion and misdetection by verifying object location using the normalized Bhattacharyya distance between DGP features. Experimental evaluation is performed on urban videos that include a slow-motion temporary stop and partial occlusion. The experimental results demonstrate that the detecting and tracking accuracy are above 98.08% and 97.70% respectively. - Some of the metrics are blocked by yourconsent settings
Publication The Comparative Study Of Randomness Analysis Between Modified Version Of LBlock Block Cipher And Its Original Design(International Journal of Computer and Information Technology, 2015) ;Nik Azura Nik Abdullah ;Liyana Chew Nizam Chew ;Abdul Alif Zakaria ;Kamaruzzaman SemanNorita Md NorwawiIn this research paper, we present and compare the randomness analysis conducted towards LBlock block cipher and its modified version namely Modified LBlock. Among the important requirement when designing a block cipher algorithm is that the algorithm can act as a random number generator. Therefore, the aim of performing modification towards LBlock algorithm is to enhance its randomness results. Modification were made by replacing the eight 4 X 4 S-boxes with four different 16 X 16 S-boxes which has the same security strength as S-box of AES. During experimentation, this research project considers a full rounds of LBlock and Modified LBlock algorithms which both algorithms accepts a 64-bit plaintext, utilizes an 80-bit key, executes in 32 rounds and produces a 64-bit ciphertext. Nine different data categories were used to generate inputs (plaintext and key), with each having 100 samples. Blocks of ciphertext were generated from these algorithms and were concatenated to construct a binary sequence. NIST Statistical Test Suite consisting of sixteen tests was used to conduct testing and analysis, and the significance level was set to 1%. From the comparative analysis done, it is concluded that the randomness analysis results for Modified LBlock block cipher has 42.96% improvement compared to its original design when tested under 1% significance level and using the same samples. - Some of the metrics are blocked by yourconsent settings
Publication Evaluation Of Existing ICT Infrastructure In KUIM(Universiti Sains Islam Malaysia, 2007) ;Nurdiana Azizan ;Kamaruzzaman Seman ;Najwa Hayaati Mohd AlwiShaharudin IsmailInformation and Communication Technology (ICT) has been created to fasten and easier the human tasks. Nowadays, the ICT is becoming more widely used by academic institutions to support the academic activities particularly in teaching and research. Kolej Universiti Islam Malaysia (KUIM) is being established to uphold and enhance Islamic Studies in education with the usage of information and communication technology (ICT) in its academic activities. KUIM provides the ICT infrastructure to the staffs to effectively integrate the facilities in performing their job tasks. The evaluation of the existing ICT infrastructure at KUIM is in need to identify the strength and availability of the facilities. Therefore this research highlights the ICT infrastructures available at KUIM in terms of hardware, software, services and maintenance. The other aspect this research will look will be the users' satisfaction towards the availability and performance of the infrastructure. At the end of this study, we identified the existing computer hardware, software used in KUIM. This is including the whereabouts and specifications details of those items. Secondly, this research understood the process of administration of the ICT infrastructure. This includes the performance, services, network and security management. Finally, this study recognized the satisfaction and IT literacy among the staffs. The evaluation of current ICT infrastructure is in need so that it can benefit the user and organization as a whole. The user can take full advantage of the available facilities in order to provide the best performance and the organization can plan for future ICT uses for the development purposes. The outcome of this research is expected to provide the information needed for the growth of the university. - Some of the metrics are blocked by yourconsent settings
Publication Finger Vein Minutiae Points Extraction based on Maximum Curvature Points in Image Profile and Finger Print Application Methods(AENSI Publisher, 2013) ;Wan Nourul Akmal Ab Aziz, ;Kamaruzzaman Seman ;Ismail Abdullah,M Norazizi Sham Mohd SayutiBiometric finger vein has been widely used for authentication as one of its advantages is resistance to criminal tempering whereby it is located underneath skin. Currently there are many methods proposed to extract the pattern of finger vein. In this paper, we extend one of the current methods by combining it with conventional method used in fingerprint for minutiae extraction to extract the minutiae points of finger vein. The minutiae points will be used for the authentication system that needs only points to be stored in its database. Experimentation has been conducted to monitor each of steps until the minutiae points were extracted. On the other hands, the trial also using different values of distance to evaluate which distance could produce acceptable results to be selected as good minutiae points - Some of the metrics are blocked by yourconsent settings
Publication Hardware Implementation Of Modified A5/1 Stream Cipher(IACSIT Press, 2017) ;Siti Yohana Akmal Mohd Fauzi ;Marinah Othman ;Farrah Masyitah Mohd ShuibKamaruzzaman SemanThis paper describes the implementation of the modified cryptographic algorithm namely A5/1 stream cipher which is widely used in Global System for Mobile (GSM) communication. While there are numerous published work on the A5/1 stream, very few have implemented the modified design into hardware and none of them, to the best of the author’s knowledge, has clearly analyzed as to how the different characteristics of the conventional A5/1 stream cipher would affect performance at hardware level implementation. Two modified designs with different total bits and combinational functions are implemented into hardware by means of an Field Programmable Gate Array (FPGA) board and the throughput, area consumption, power consumption as well as the throughput-to-area ratio performance of the hardware are analysed and compared with that of the conventional design of the A5/1 stream cipher. While the algorithms in use have the same level of randomness, and hence strength in terms of security, at the hardware level, when total bits in use is increased, the total power consumed actually reduces. It is also observed that the use of the XOR logic has the better power consumption rate, compared to when a multiplexer is implemented as the combinational function. Index Terms—A5/1 stream cipher, field programmable gate array, FPGA, throughput, cryptographic algorithm. - Some of the metrics are blocked by yourconsent settings
Publication Improving GSM Security By Enhancing Randomness Property Of A5/1 Design(AENSI Publisher, 2015) ;Siti Yohana Akmal Mohd Fauzi ;Marinah Othman ;Farrah Masyitah Mohd ShuibKamaruzzaman SemanBackground: A5/1 is well-known as the encryption standard for GSM communication, one of the most largely used cellular system in the world. Despite the popularity, its credibility was severed when its design was leaked in 1999 which consequently posed a threat to user’s privacy and confidentiality. The disclosure, incidentally, unveiled some weaknesses of the A5/1 stream cipher design such as short register phase, collision problem and simple combinational function. In this paper, a modified A5/1 is described. The proposed design looked at the effect of altering the combinational function from that of XOR to one using a 4-to-1 multiplexer (Mux) to increase the complexity of the algorithm which in turn will enhance its random features, and thus making it more secure overall. The generated output from the proposed design will be tested using the National Institute of Standard and Technology (NIST) test suite. The result will then be compared with that obtained using the modified design by Zakaria et. al. (2014), and next, analyzed. Objective: The objective for this study is to analyze and compare the use of different parameter toward the randomness of modified A5/1 structure by using the NIST test suite. Results: The analysis computed by the NIST test suite shows that the author’s proposed version is more secure compared to that of Zakaria et. al.’s version. Conclusion: The author’s version is shown to be more secure compared to that of Zakaria et. al. (2011), and while its randomness is comparable to that of the original A5/1 version, its structure is not that of public’s knowledge and will therefore minimize its probability of being deciphered. - Some of the metrics are blocked by yourconsent settings
Publication A New Proposed Design Of A Stream Cipher Algorithm: Modified Grain-128(2014) ;Norul Hidayah Lot @ Ahmad Zawawi ;Kamaruzzaman SemanNurzi Juana Mohd ZaiziThe objective of this research is to propose a new algorithm based on the existing Grain - 128 stream cipher algorithm. The comparison of Grain - 128 and Modified Grain - 128 will be evaluated by using NIST Statistical Test Suite. The NIST Statistical Test Suite is conducted to determine the randomness of both algorithms. Conclusively, the Modified Grain - 128 is random based on 1% of significance level compared to the Grain - 128 which is not random at the same significance level. - Some of the metrics are blocked by yourconsent settings
Publication A POX Controller Module To Prepare A List Of Flow Header Information Extracted From SDN Traffic.(World Academy of Science, Engineering and Technology, 2017) ;Wisam H. Muragaa ;Kamaruzzaman SemanMohd Fadzli MarhusinSoftware Defined Networking (SDN) is a paradigm designed to facilitate the way of controlling the network dynamically and with more agility. Network traffic is a set of flows, each of which contains a set of packets. In SDN, a matching process is performed on every packet coming to the network in the SDN switch. Only the headers of the new packets will be forwarded to the SDN controller. In terminology, the flow header fields are called tuples. Basically, these tuples are 5-tuple: the source and destination IP addresses, source and destination ports, and protocol number. This flow information is used to provide an overview of the network traffic. Our module is meant to extract this 5-tuple with the packets and flows numbers and show them as a list. Therefore, this list can be used as a first step in the way of detecting the DDoS attack. Thus, this module can be considered as the beginning stage of any flow-based DDoS detection method. - Some of the metrics are blocked by yourconsent settings
Publication The Security Level Of Two Xored-based A5 Crypto System(Institut Teknologi Bandung, 2011) ;Nur Hafiza Zakaria ;Kamaruzzaman SemanIsmail AbdullahA5/1 is a stream cipher used to supply over the air communication privacy in the GSM cellular telephone standard. It was at first kept secret, but became open knowledge through leaks and reverse engineering. The purpose of this paper is to compare the security level of two (2) XORed-based A5 crypto systems. Five (5) statistical tests were used to test the strength of the algorithm. Both of the proposed modified XORed-based A5/1 algorithms successfully passed the five (5) statistical tests. - Some of the metrics are blocked by yourconsent settings
Publication Signaling And Scheduling Wimax Gateway Design Based On Resource Reservation Protocol(Indian Journal of Science & Technology, 2017) ;Mahmoud Ahmad Albawaleez ;Kamaruzzaman Seman ;Kamarudin SaadanKhairi AbdulrahimObjectives: As a result of signal transmission in WiMAX too long distance, and because there are many request packets arrive at WiMAX gateway request handovers, this cost a congestion which may result in loss or delay in packet time sensitive. The objectives of this paper are to investigate the delay when packets with real time sensitive handover in WiMAX gateway and to measure and enhance the handover performance. Methods/Statistical Analysis: To overcome this problem, and achieve the objectives is propose a new scheme Resource Reservation Protocol & Random Early Detection with Weighted Fair Queuing (RR-WFQ) in order to analyze and enhance delay for real time packet in WiMAX gateway. This schema applies all Resource Reservation Protocol (RSVP), Random Early Detection (RED), and Weighted Fair Queuing (WFQ) as a Scheduling, RED as a mechanism and RSVP as a signaling protocol. Findings: The proposed scheme enhances the QoS by minimizing the delay in WiMAX gateway and BS. The scheme enhances the delay in all queues in a gateway, and video conferencing. The result of the scheme shows an enhancement delay in the WiMAX gateway. Application/ Improvements: Mathematical analysis and modeling have been done using queuing theory. Simulation has been done using OPNET simulation. Simulation results for the new approach confirms that has minimized delay in WiMAX gateway and BS the gateway and enhances the QoS. - Some of the metrics are blocked by yourconsent settings
Publication Substitution Box Design Based From Symmetric Group Composition(IOP Publishing Ltd, 2019) ;Muhammad Fahim Roslan ;Kamaruzzaman Seman ;Azni Haslizan Ab HalimM Norazizi Sham Mohd SayutiThis work shows a new design of substitution box (S-Box) construction for the implementation in the block cipher. The S-Box is the only component in block cipher such as advanced encryption standard (AES) that possess the nonlinearity characteristics. Hence, it is crucial to properly design so that it able resist the cipher against known attack such as linear and differential attacks. Thee construction is based on composition of permutation within the symmetric group. This paper focus on the AES S-Box class which received 8-bit input and produced 8-bit output. This bijective S-Box consist of 256 elements which later involve in the process of composition. Initially, a set of 30 S-Box with high nonlinearity is generated using 30 irreducible polynomials under the finite field GF(28). These S-Box is then undergoing two rounds of composition which finally yield about 1.62 million S-Box. More than half of the generated S-Box achieve the nonlinearity of at least 100 with the maximum recorded nonlinearity of 110. This method also guarantee that the generated S-Box is bijective. To show the security level of our construction method, a comparison to other constriction methods is conducted. The methods introduced in this paper have slightly higher nonlinearity compared to several construction with the value of differential uniformity not on the par as AES however comparable to other similar heuristic construction. - Some of the metrics are blocked by yourconsent settings
Publication A Theoretical Comparative Analysis Of Dna Techniques Used In Dna Based Cryptography(Penerbit UMT, 2022) ;Nik Azura Nik Abdullah ;Nur Hafiza Zakaria ;Azni Haslizan Ab Halim ;Farida Hazwani Mohd Ridzuan ;Azuan Ahmad ;Kamaruzzaman SemanSuriyani AriffinCryptography has been extensively employed in the information security field for the purpose of providing security for confidential data. The field of cryptography has recently considered a hybrid cryptographic implementation that combines conventional cryptographic techniques with the knowledge of DNA technologies to formulate what is known as DNA cryptography. DNA based cryptography is considered a branch of sustainability science as it combines transdisciplinary structures from natural sciences (biology) and technological sciences (information security). This paper discusses the various biological DNA techniques that have been implemented in recent DNA cryptographic algorithms. Among them are the Watson-Crick Complementary Rules, DNA Encoding/Decoding Rules, DNA Operation Rules, the Triplet Codon DNA Code, DNA Segmentation, DNA Hybridisation (DNA Annealing) and DNA Transcription and DNA Replication from the Central Dogma Molecular Biology process. A description of the algorithms and a theoretical comparative analysis of these DNA cryptographic algorithms is also presented in this research paper. Comparisons have also been made based on the following parameters: Conventional cryptographic techniques vis-a-vis the techniques used by DNA cryptographic algorithms, the application of these algorithms, their limitations and a security analysis to see how well DNA cryptography perform as against current conventional cryptography.