scispace - formally typeset
Search or ask a question
Author

Sameer Abdulsattar Lafta

Bio: Sameer Abdulsattar Lafta is an academic researcher from Universiti Teknologi Malaysia. The author has contributed to research in topics: Quality of service & UMTS frequency bands. The author has an hindex of 3, co-authored 5 publications receiving 39 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: As the rapid growth of multimedia application over the Internet, it is essential to preserve the Quality of Service (QoS), which is certifying the guaranteed service through the Internet and representing the biggest challenges for the current IP based services.
Abstract: As the rapid growth of multimedia application over the Internet, it is essential to preserve the Quality of Service (QoS), which is certifying the guaranteed service through the Internet and representing the biggest challenges for the current IP based services. Multimedia traffic usage has been increased in relation to the streaming media such as video conferencing using OPNET, the performance can be simulated based on heavy and light scenarios for video conferencing including web traffic. The overall WLAN load data are obtained for such scenarios, also the performance of simulated overall Delay in the three scenario networks is measured .

14 citations

Journal ArticleDOI
TL;DR: Department of Medical Instrumentations Technique Engineering, Alkitab University, Kirkuk, Iraq Faculty of Engineering & Built Environment, University Kebangsaan Malaysia, (UKM)
Abstract: The energy protocols that have a mechanisms of shortest path routing considered predominant in the networking scenarios. The interesting matter in the routing protocols designing deal with mobile ad hoc network (MANET) must have an energy efficient network for better network performances. The Performances of such routing protocols that can be assessed will be focused on many metrics like delay, throughput, and packet delivery. MANET is a distribution network, having no infrastructure and network decentralization. There routing protocols are utilized for detecting paths among mobile nodes to simplify network communication. The performance comparison of three protocols are Optimized Link State Routing (OLSR), the second is Ad hoc On-Demand Distance Vector (AODV), while the third is Dynamic Source Routing (DSR) routing protocols concerning to average energy consumption and mobile node numbers are described thoroughly by NS-3 simulator. The nodes number is changing between 10 and 25 nodes, with various mobility models. The performance analysis shows that the suggested protocols are superior in relations to the energy consumption for networking data transmission and the performance of the wireless network can be improved greatly.

9 citations

Journal ArticleDOI
TL;DR: Investigation models for end-to-end QoS, total transmitted and received data, packet loss, and throughput providing techniques are run and assessed and the simulation results are examined, and appropriate QoS adaption allows for specific voice and video transmission.
Abstract: The universal mobile telecommunications system (UMTS) has distinct benefits in that it supports a wide range of quality of service (QoS) criteria that users require in order to fulfill their requirements. The transmission of video and audio in real-time applications places a high demand on the cellular network, therefore QoS is a major problem in these applications. The ability to provide QoS in the UMTS backbone network necessitates an active QoS mechanism in order to maintain the necessary level of convenience on UMTS networks. For UMTS networks, investigation models for end-to-end QoS, total transmitted and received data, packet loss, and throughput providing techniques are run and assessed and the simulation results are examined. According to the results, appropriate QoS adaption allows for specific voice and video transmission. Finally, by analyzing existing QoS parameters, the QoS performance of 4G/UMTS networks may be improved.

7 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This study showed that cloud-to-client authentication issues are disregarded by existing MCC models, and related MCC model surveys do not sufficiently address comprehensive MCC security issues such as securing and protecting data, resources, and communication channels.

35 citations

Journal ArticleDOI
TL;DR: This study combines Cryptography (Twofish and Triple data decryption (3DES) algorithms and Steganography (Least Significant Bits) to solve the problem of attacking or hacking biometric template for a malicious act, which has become a huge problem in the iris recognition system.
Abstract: This study combines Cryptography (Twofish and Triple data decryption (3DES)) algorithms and Steganography (Least Significant Bits) to solve the problem of attacking or hacking biometric template for a malicious act, which has become a huge problem in the iris recognition system. Twofish and Triple data encryption are good and secured cryptography algorithms which are used to change readable secret data (plain image) into an unreadable format (cipher image) while least significant bits (LSB) is a steganography algorithm which embeds ciphertext/image directly into a cover image to produce an image known as stego image. In this work, Hough transform, Daugman rubber-sheet model and Log Gabor filter were used for iris image segmentation, normalization and feature extraction and the iris template generated was encrypted using 3DES and Twofish algorithms. The cipher image was then embedded into a cover image to produce stego image using LSB. The result of this work slightly changes the master file after embedding the secret image (stego file) that cannot be identified by the physical eyes and only a JPEG image was used as the master or cover file. The two levels of security technique provide high embedded capacity and eminence stego images that will able to withstand attackers.

29 citations

Journal ArticleDOI
TL;DR: The paper validates the system on healthcare information datasets and revealed extraordinary results in respect to the quality of perceptibility, extreme opposition to data loss, extreme embedding capability and security, which made the proposed system an authentic strategy for resourceful and efficient medical information on IoTM platform.
Abstract: The integration of the Internet of Things in medical systems referred to as the Internet of Medical Things (IoMT), which supports medical events for instance real-time diagnosis, remote monitoring of patients, real-time drug prescriptions, among others. This aids the quality of services provided by the health workers thereby improve patients’ satisfaction. However, the integrity and confidentiality of medical information on the IoMT platform remain one of the contentions that causes problems in medical services. Another serious concern with achieving protection for medical records is information confidentiality for patient’s records over the IoMT environment. Therefore, this paper proposed a Crypto-Stegno model to secure medical information on the IoMT environment. The paper validates the system on healthcare information datasets and revealed extraordinary results in respect to the quality of perceptibility, extreme opposition to data loss, extreme embedding capability and security, which made the proposed system an authentic strategy for resourceful and efficient medical information on IoTM platform.

21 citations

Journal ArticleDOI
TL;DR: By analyzing and comparing the proposed system with the existing system, it is proved that the system proposed was much better than the existing systems.
Abstract: Steganography is a tool which allows the data for transmission by concealing secret information in a tremendously growing network. In this paper, a novel technique quick response method (QRM) is proposed for the purpose of encryption and decryption. Existing system uses side match vector quantization (SMVQ) technique which has some challenges such as security issues and performance issues. To handle the security and performance issues, the proposed system uses two methods, namely, quick response method and shifting method. In the proposed system, encoding part calculates the performance for capacity, PSNR (peak signal-to-noise ratio), MSE (mean square error), and SSIM (structural similarity index method), and the decoding part calculates the performance of MSE (mean square error) and PSNR (peak signal-to-noise ratio). The shifting method is used to increase the data hiding capacity. In this system, the encryption part embeds the secret image using steganography and the decryption part extracts the original image. By analyzing and comparing the proposed system with the existing system, it is proved that the system proposed was much better than the existing systems.

17 citations

Journal ArticleDOI
TL;DR: The review study throws light on the algorithm and properties of transform domain techniques and its benefits to utilize in securing data for Image, Audio and Video steganography.
Abstract: Steganography is a technology which is utilized in securing information through hiding data over another data which can be stored or passed over public network without a clue that secret data is hidden in the cover medium. This article focus on securing and hiding the data through transform domain techniques used in Image, Audio and Video steganography. The review study throws light on the algorithm and properties of transform domain techniques and its benefits to utilize in securing data. Parameters such as imperceptibility, capacity and robustness are evaluated for discrete cosine transform (DCT) and discrete wavelet transform (DWT). Key-words—Steganography; Discrete cosine transform; Discrete Fourier Transform; Discrete Wavelet Transform; Network security; Secure Communication Received: August 26, 2020 . Revised: November 16, 2020. Accepted: January 15, 2021. Published: January 22, 2021.

14 citations