Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mohd Rosmadi Mokhtar is active.

Publication


Featured researches published by Mohd Rosmadi Mokhtar.


Multimedia Tools and Applications | 2018

High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain

Ahmed Hussain Ali; Loay E. George; A. A. Zaidan; Mohd Rosmadi Mokhtar

Information hiding researchers have been exploring techniques to improve the security of transmitting sensitive data through an unsecured channel. This paper proposes an audio steganography model for secure audio transmission during communication based on fractal coding and a chaotic least significant bit or also known as HASFC. This model contributes to enhancing the hiding capacity and preserving the statistical transparency and security. The HASFC model manages to embed secret audio into a cover audio with the same size. In order to achieve this result, fractal coding is adopted which produces high compression ratio with the acceptable reconstructed signal. The chaotic map is used to randomly select the cover samples for embedding and its initial parameters are utilized as a secret key to enhancing the security of the proposed model. Unlike the existing audio steganography schemes, The HASFC model outperforms related studies by improving the hiding capacity up to 30% and maintaining the transparency of stego audio with average values of SNR at 70.4, PRD at 0.0002 and SDG at 4.7. Moreover, the model also shows resistance against brute-force attack and statistical analysis.


International Conference of Reliable Information and Communication Technology | 2018

Enhancement of Text Steganography Technique Using Lempel-Ziv-Welch Algorithm and Two-Letter Word Technique

Salwa Shakir Baawi; Mohd Rosmadi Mokhtar; Rossilawati Sulaiman

Text steganography is regarded as the most challenging type to hide secret data to a text file because it is not enough unnecessary information compared with other carrier files. This study aimed to deal with the capacity (how much data can be hidden in the cover carrier) and security (the inability of disclosing the data by an unauthorized party) issues of text steganography. Generally, the data hiding capacity of text steganography is limited, and imperceptibility is very poor. Therefore, a new scheme was suggested to improve the two-letter word technique by using the Lempel-Ziv-Welch algorithm. This scheme can hide 4 bits in each position of a two-letter word in the cover text by inserting a nonprinting Unicode symbol. Each two-letter word can have four different locations in the text. Some experiments were conducted on the proposed method (enhancement) and our previous method (two-letter word) to compare their performance applying twelve secret message samples in terms of capacity and Jaro-Winkler. On the other hand, the performance of our proposed method was compared with other related studies in terms of capacity. The results show that the proposed method not only had a high embedding capacity but also reduced the growing size ratio between the original cover and stego cover. In addition, the security of the proposed approach was improved through improving imperceptibility and by using stego-key.


Journal of theoretical and applied information technology | 2017

Enhancing the hiding capacity of audio steganography based on block mapping

Ahmed Hussain Ali; Mohd Rosmadi Mokhtar; Loay E. George


Journal of theoretical and applied information technology | 2017

New text steganography technique based on a set of two-letter words

Salwa Shakir Baawi; Mohd Rosmadi Mokhtar; Rossilawati Sulaiman


Indian journal of science and technology | 2016

Recent approaches for VoIP steganography

Ahmed Hussain Ali; Mohd Rosmadi Mokhtar; Loay E. George


Journal of theoretical and applied information technology | 2015

Evaluation of the TPM user authentication model for trusted computers

Marwan Alshar’E; Abdullah Mohd Zin; Rossilawati Sulaiman; Mohd Rosmadi Mokhtar


Journal of Computer Science | 2014

DESIGN AND IMPLEMENTATION OF THE TPM USER AUTHENTICATION MODEL

Marwan Ibrahim Alshar'e; Rossilawati Sulaiman; Mohd Rosmadi Mokhtar; Abdullah MohdZin


Research Journal of Applied Sciences, Engineering and Technology | 2012

A Systematic Technology Selection Method for Context-Aware Applications Development

Rozilawati Razali; Abdullah Mohd Zin; Mohd Rosmadi Mokhtar; Seyed Hadi Mirisaee


ARPN journal of engineering and applied sciences | 2018

A comparative study on the advancement of text steganography techniques in digital media

Salwa Shakir Baawi; Mohd Rosmadi Mokhtar; Rossilawati Sulaiman


international conference on electrical engineering and informatics | 2017

3C-CSIRT model a sustainable national CSIRT for afghanistan

Islahuddin Jalal; Zarina Shukur; Mohd Rosmadi Mokhtar

Collaboration


Dive into the Mohd Rosmadi Mokhtar's collaboration.

Top Co-Authors

Avatar

Abdullah Mohd Zin

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Ahmed Hussain Ali

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Rossilawati Sulaiman

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Salwa Shakir Baawi

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Rabab A. Abbas

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Rossilawati Sulaiman

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

A. A. Zaidan

Sultan Idris University of Education

View shared research outputs
Top Co-Authors

Avatar

Abdullah MohdZin

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Islahuddin Jalal

National University of Malaysia

View shared research outputs
Researchain Logo
Decentralizing Knowledge