Zaheera Zainal Abidin
Universiti Teknikal Malaysia Melaka
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Zaheera Zainal Abidin.
ieee conference on open systems | 2011
Siti Rahayu Selamat; Robiah Yusof; Shahrin Sahib; Nor Hafeizah Hassan; Mohd Faizal Abdollah; Zaheera Zainal Abidin
Digital forensic is part of forensic science that implicitly covers crime that is related to computer technology. In a cyber crime, digital evidence investigation requires a special procedures and techniques in order to be used and be accepted in court of law. Generally, the goals of these special processes are to identify the origin of the incident reported as well as maintaining the chain of custody so that the legal process can take its option. Subsequently, the traceability process has become a key or an important element of the digital investigation process, as it is capable to map the events of an incident from difference sources in obtaining evidence of an incident to be used for other auxiliary investigation aspects. Hence, this paper introduces a trace map model to illustrate the relationship in the digital forensic investigation process by adapting and integrating the traceability features. The objective of this integration is to provide the capability of trace and map the evidence to the sources and shows the link between the evidence, the entities and the sources involved in the process, particularly in the collection phase of digital forensic investigation framework. Additionally, the proposed model is expected to help the forensic investigator in obtaining accurate and complete evidence that can be further used in a court of law.
information assurance and security | 2011
Mohammad Ali Arsyad bin Mohd Shuhaimi; Zaheera Zainal Abidin; Irda binti Roslan; Syarulnaziah Anawar
A new feature of services in Nagios has been added to the existing system which has no such services. The bandwidth monitoring and notification system are configured for alerting the network administrators when the bandwidth of the network in an organization hits a certain threshold settings. The system sent an email alert and sms notification to the network administrator for taking further action in order to maintain the Quality of Service (QoS) in the network. All the logs file of the Nagios actions is saved in the Nagios File Logs. The analysis was conducted from the case study and problem statements. Network Development Life Cycle (NDLC) was chosen as a methodology for implementing this system in the network. Nagios is installed inside Ubuntu 10 Operating System along with Multi-Router Traffic Grapher (MRTG) and Mail Postfix. MRTG and Mail Postfix were configured to be integrated with the Nagios System. On the client side, NSClient++ has been installed, for monitoring the bandwidth and performance of windows based on operating system. The Nagios services have been improved with the implementation of sms and emails notifications since the existing services have no such utilities. With the implementation of these services to Nagios, the performance could be even better for the future.
international conference on signal and image processing applications | 2013
Zaheera Zainal Abidin; Mazani Manaf; Abdul Samad Shibhgatullah
This study focus on compression in wavelet decomposition for security in biometric data. The objectives of this research are two folds: a) to investigate whether compressed human eye image differ with the original eye and b) to obtain the compression ratio values using proposed methods. The experiments have been conducted to explore the application of sparsity-norm balance and sparsity-norm balance square root techniques in wavelet decomposition. The eye image with [320x280] dimension is used through the wavelet 2D tool of Matlab. The results showed that, the percentage of coefficients before compression energy was 99.65% and number of zeros were 97.99%. However, the percentage of energy was 99.97%, increased while the number of zeros was same after compression. Based on our findings, the impact of the compression produces different ratio and with minimal lost after the compression. The future work should imply in artificial intelligent area for protecting biometric data.
international conference on signal and image processing applications | 2013
Zaheera Zainal Abidin; Mazani Manaf; Abdul Samad Shibghatullah; Syarulnaziah Anawar; Rabiah Ahmad
Iris recognition is the most accurate biometric identification system on hand. Most iris recognition systems use algorithms developed by Daugman. The performance of iris recognition is highly depends on edge detection. Canny is the edge detectors which commonly used. The objectives of this research are to a) study the edge detection criteria and b) measure the PSNR values in estimating the noise between the original iris feature and new iris template. The eye image with [320×280] dimension is obtained from the CASIA database which has been pre-processed through the segmentation and normalization in obtaining the rubber sheet model with [20×240] in dimension. Once it has been produced, the important information is extracted from the iris. Results show that, the PSNR values of iris feature before and after the process of extraction, was 24.93 and 9.12. For sobel and prewitt, both give 18.5 after the process. Based on our findings, the impact of edge detection techniques produces higher accuracy in iris recognition system.
international conference on software engineering and computer systems | 2011
Zaheera Zainal Abidin; Mazani Manaf; Abdul Samad Shibghatullah
The integration of steganography in biometric system is a solution for enhancing security in iris. The process of biometric enrollment and verification is not highly secure due to hacking activities at the biometric point system such as overriding iris template in database. In this paper, we proposed an enhancement of temporal-spatial domain algorithm which involves the scheme of Least Significant Bits (LSB) as the new model which converts iris images to binary stream and hides into a proper lower bit plane. Here, the stego key, n, will be inserted into the binary values from the plane which concealed the information; where n is the input parameter in binary values which inserted to the iris codes, m. These values produce the output which is the new iris stego image after binary conversion. Theoretically, the proposed model is promising a high security performance implementation in the future.
International Journal of Advanced Computer Science and Applications | 2018
Mohammed Nasser Al-Mhiqani; Rabiah Ahmad; Warusia Yassin; Aslinda Hassan; Zaheera Zainal Abidin; Nabeel Salih Ali; Karrar Hameed Abdulkareem
Cyber-Physical Systems refer to systems that have an interaction between computers, communication channels and physical devices to solve a real-world problem. Towards industry 4.0 revolution, Cyber-Physical Systems currently become one of the main targets of hackers and any damage to them lead to high losses to a nation. According to valid resources, several cases reported involved security breaches on Cyber-Physical Systems. Understanding fundamental and theoretical concept of security in the digital world was discussed worldwide. Yet, security cases in regard to the cyber-physical system are still remaining less explored. In addition, limited tools were introduced to overcome security problems in Cyber-Physical System. To improve understanding and introduce a lot more security solutions for the cyber-physical system, the study on this matter is highly on demand. In this paper, we investigate the current threats on Cyber-Physical Systems and propose a classification and matrix for these threats, and conduct a simple statistical analysis of the collected data using a quantitative approach. We confirmed four components i.e., (the type of attack, impact, intention and incident categories) main contributor to threat taxonomy of Cyber-Physical Systems.
Archive | 2010
Siti Rahayu Selamat; Robiah Yusof; Shahrin Sahib; Mohd Zaki Mas'ud; Mohd Faizal Abdollah; Zaheera Zainal Abidin
Journal of Telecommunication, Electronic and Computer Engineering | 2017
Nurul Akmal Hashim; Zaheera Zainal Abidin; Abdul Samad Shibghatullah
Health Care Management Science | 2018
Zuraida Abal Abas; Mohamad Raziff Ramli; Mohamad Ishak Desa; Nordin Saleh; Ainul Nadziha Mohd Hanafiah; Nuraini Aziz; Zaheera Zainal Abidin; Abdul Samad Shibghatullah; Ahmad Fadzli Nizam Abdul Rahman; Haslinda Musa
Archive | 2014
Zaheera Zainal Abidin; Mazani Manaf; Abdul Samad Shibghatullah; Syarulnaziah Anawar