scispace - formally typeset
Search or ask a question
Author

Rossilawati Sulaiman

Other affiliations: University of Canberra
Bio: Rossilawati Sulaiman is an academic researcher from National University of Malaysia. The author has contributed to research in topics: Encryption & Cryptography. The author has an hindex of 8, co-authored 42 publications receiving 236 citations. Previous affiliations of Rossilawati Sulaiman include University of Canberra.

Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, the authors presented an efficient, lightweight encryption algorithm to develop a secure image encryption technique for the healthcare industry, which employs two permutation techniques to secure medical images.
Abstract: The importance of image security in the field of medical imaging is challenging. Several research works have been conducted to secure medical healthcare images. Encryption, not risking loss of data, is the right solution for image confidentiality. Due to data size limitations, redundancy, and capacity, traditional encryption techniques cannot be applied directly to e-health data, especially when patient data are transferred over the open channels. Therefore, patients may lose the privacy of data contents since images are different from the text because of their two particular factors of loss of data and confidentiality. Researchers have identified such security threats and have proposed several image encryption techniques to mitigate the security problem. However, the study has found that the existing proposed techniques still face application-specific several security problems. Therefore, this paper presents an efficient, lightweight encryption algorithm to develop a secure image encryption technique for the healthcare industry. The proposed lightweight encryption technique employs two permutation techniques to secure medical images. The proposed technique is analyzed, evaluated, and then compared to conventionally encrypted ones in security and execution time. Numerous test images have been used to determine the performance of the proposed algorithm. Several experiments show that the proposed algorithm for image cryptosystems provides better efficiency than conventional techniques.

92 citations

Journal ArticleDOI
TL;DR: The study found that students’ perception of the use of augmented reality is positive based on the average mean score, however, the disadvantage of this application is theUse of images as compared to the useof real microprocessor as the learning object.

55 citations

Proceedings ArticleDOI
22 Apr 2008
TL;DR: This paper presents an alternative way to secure communications in e-health by using different types of security processes and the requirements for each type for communications are described and the use of the cryptography to secure the communication is discussed.
Abstract: This paper presents an alternative way to secure communications in e-health. During the communication processes, users exchange different types of information with different levels of sensitivities. For example, communications between a doctor and a patient contain data of higher levels of sensitivities than communications between a social worker and a nurse. The different levels of the sensitivities of the information are secured by using different types of security processes. In this paper, these different communication types and different levels of data sensitivities in e-health are explained, the requirements for each type for communications are described and the use of the cryptography to secure the communication is discussed.

24 citations

Proceedings ArticleDOI
11 May 2009
TL;DR: A new security mechanism for online communications using mobile agents that gives Sender control over the transmitted data and allows recipient to avoid burden with the encryption details as long as he/she knows that the message is indeed comes from Recipient.
Abstract: This paper established a new security mechanism for online communications using mobile agents. E-health has been widely used as a communication system and information changes to deliver health services to the users through the Internet. However, the Internet imposes threats that will risk the information in transit. Therefore it is important to ensure that the communication is safe and the user’s privacy is protected. This paper extends our previous research results, Multilayer Communication (MLC) approach [1], and introduced mobile agents to MLC in e-health. The cryptographic protocols such as encryption/decryption, digital signature, and hash code are used as protection mechanisms. We focus on how Sender can securely transfer sensitive information to Recipient while still maintaining control over it. Sender keeps the key for decryption at his/her side until the agent needs it. A token is carried by the agent, which is used as a mean to call home platform to obtain the key for decryption processes. The significant of this new mechanism is that it gives Sender control over the transmitted data. Recipient can also avoid burden with the encryption details as long as he/she knows that the message is indeed comes from Recipient.

21 citations

Journal ArticleDOI
TL;DR: This paper is the result of a systematic literature review which answer three main questions in data carving filed and shows the need of realistic data sets for tools testing, and points to a new direction for using semantic validation to reduce false positive rates.

19 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: A thorough review of existing types of image steganography and the recent contributions in each category in multiple modalities including general operation, requirements, different aspects, different types and their performance evaluations is provided.

253 citations

OtherDOI
31 May 2013

245 citations

Journal ArticleDOI
13 Aug 2014-Sensors
TL;DR: This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al and proposes improvements to the protocol to fill the discovered weakness gaps.
Abstract: Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp 588-592) According to our analysis, Jing et al's protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol Therefore, we propose improvements to the protocol to fill the discovered weakness gaps The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost

85 citations