Ainuddin Wahid

Ainuddin Wahid
University of Malaya | UM · Department of Computer System & Technology

PhD in Computing, University of Surrey

About

118
Publications
85,360
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,409
Citations
Additional affiliations
January 2012 - present
University of Malaya
Position
  • Professor (Associate)
June 2007 - October 2011
University of Surrey
Position
  • PhD Student

Publications

Publications (118)
Article
Full-text available
Organizations are adopting the Bring Your Own Device (BYOD) concept to enhance productivity and reduce expenses. However, this trend introduces security challenges, such as unauthorized access. Traditional access control systems, such as Attribute-Based Access Control (ABAC) and Role-Based Access Control (RBAC), are limited in their ability to enfo...
Article
Full-text available
The number of devices connected within organisational networks through ”Bring Your Own Device” (BYOD) initiatives has steadily increased. BYOD security risks have resulted in significant privacy and security issues impacting organisational security. Many researchers have reviewed security and privacy issues in BYOD policies. However, not all of the...
Article
Full-text available
Organisations are adopting new IT strategies such as “Bring Your Own Device” (BYOD) and remote working. These trends are highly beneficial both for enterprise owners and employees in terms of increased productivity and reduced costs. However, security issues such as unauthorised access as well as privacy concerns pose significant obstacles. These c...
Article
Full-text available
Enterprises have increased their involvement in sustainability because of social and ecological trends and quickly changing settings. The large-scale environmental influence in attaining sustainability is a serious problem for organisations. Organisations are coping with various negative environmental challenges, and social media is one of the driv...
Article
Full-text available
Skin cancer is the most common type of cancer in many parts of the world. As skin cancers start as skin lesions, it is important to identify precancerous skin lesions early. In this paper we propose an image based skin lesion identification to classify seven different classes of skin lesions. First, Multi Resolution Empirical Mode Decomposition (MR...
Article
Full-text available
Vehicular Ad Hoc Networks (VANETs) is an origination of Mobile Ad-Hoc Network (MANET), where road vehicles will distribute messages and provide safety alerts to notice hazardous circumstances to the drivers. One of its greatest challenges is ensuring Quality of Service (QoS) owing to channel sharing, high traffic and topology changes in VANETs. The...
Article
Full-text available
Communication in vehicular ad hoc networks (VANETs) is significantly increased due to several services such as location-based service (LBS), traffic management, road safety, and vehicle privacy. Authentication is one of the backbones for communication in the vehicular network to protect the whole system, and guarantee the unforgeability and effecti...
Article
Full-text available
In the current age, the wide use of digital images has led to the manipulations of content that misrepresent information with malicious goals. This issue demands the requirement of digital image investigation to authenticate the source and certify the trustworthiness of images. One image manipulation technique is called copy-move forgery (CMF), whi...
Article
Full-text available
Malware applications (Apps) targeting mobile devices are widespread, and compromise the sensitive and private information stored on the devices. This is due to the asymmetry between informative permissions and irrelevant and redundant permissions for benign Apps. It also depends on the characteristics of the Android platform, such as adopting an op...
Conference Paper
Full-text available
Vehicular Ad Hoc Networks (VANETs) is an origination of Mobile Ad-Hoc Network (MANET), where road vehicles will distribute messages and provide safety alerts to notice hazardous circumstances to the drivers. One of its greatest challenges is ensuring Quality of Service (QoS) owing to channel sharing, high traffic and topology changes in VANETs. The...
Article
Full-text available
Feature-based retinal fundus image registration (RIR) technique aligns fundus images according to geometrical transformations estimated between feature point correspondences. To ensure accurate registration, the feature points extracted must be from the retinal vessels and throughout the image. However, noises in the fundus image may resemble retin...
Article
Full-text available
Globally, breast cancer (BC) is the prevailing cause of unusual deaths in women. Breast tumor (BT) is a primary symptom and may lead to BC. Digital histology (DH) image modality is a gold standard medical test for a definite diagnosis of BC. Traditionally, DH images are visually examined by two or more pathologists to come up with a consensus for a...
Article
Full-text available
The vehicular network is a collection of vehicles and other components facilitated with versatile sensors to communicate, which is backboned by authentication. Present authentication protocols focus on either the lightweight feature or security. On the other hand, privacy during authentication is essential. Moreover, existing schemes are dependent...
Article
Full-text available
In this article, a Host-Based Intrusion Detection System (HIDS) using a Modified Vector Space Representation (MVSR) N-gram and Multilayer Perceptron (MLP) model for securing the Internet of Things (IoT), based on lightweight techniques and using Fog Computing devices, is proposed. The Australian Defence Force Academy Linux Dataset (ADFA-LD), which...
Article
Full-text available
Internet of Drones (IoD) is a decentralized network and management framework that links drones’ access to the controlled airspace and provides inter-location navigation services. The interconnection of drones in the IoD network is through the Internet of Things (IoT). Hence the IoD network is vulnerable to all the security and privacy threats that...
Article
Full-text available
Security and privacy are among the most critical challenges on the internet of drones (IoD) network. The communication entities of the IoD network can communicate securely with the use of authenticated key agreement (AKA) based techniques. However, the design of such techniques must be balanced with security and lightweight features. Recently, Chen...
Article
Full-text available
Worldwide, the burden of cancer is drastically increasing over the past few years. Among all types of cancers in women, breast cancer (BrC) is the main cause of unnatural deaths. For early diagnosis, histopathology (Hp) imaging is a gold standard for positive and detailed (at tissue level) diagnosis of breast tumor (BrT) compared to mammogram image...
Chapter
Full-text available
Mobile communication witnesses a new generation after every 10 years. Following the same trend, the roll out of next generation called 5G network is anticipated by 2020. In this chapter, a critical review of enabling technologies and research issues of 5G network is provided. The novelty of the chapter lies in providing a holistic view of 5G networ...
Article
Full-text available
In this work we introduce Multi-Resolution Empirical Mode Decomposition (MREMD) as an image decomposition method that simplifies the implementation of Empirical Mode Decomposition (EMD) for bidimensional data. The proposed method is used in conjunction with the local binary pattern (LBP) to classify the images of six types of defects that can be fo...
Article
Full-text available
Breast cancer (BrC) is the leading cause of abnormal death in women. Mammograms and histopathology (Hp) biopsy images are generally recommended for early diagnosis of BrC because Hp image-based diagnosis enables doctors to make cancer diagnostic decisions more confidently than with mammograms. Several studies have used Hp images to classify BrC. Ho...
Article
Full-text available
Edge computing has significantly enhanced the capabilities of cloud computing. Edge data-centres are used for storing data of the end-user devices. Secure communication between the legitimate edge data-centres during the load balancing process has attracted industrial and academic researchers. Recently, Puthal et al. have proposed a technique for a...
Article
Full-text available
Edge computing is a promising paradigm that enhances the capabilities of cloud computing. In order to continue patronizing the computing services, it is essential to conserve a good atmosphere free from all kinds of security and privacy breaches. The security and privacy issues associated with the edge computing environment have narrowed the overal...
Article
Full-text available
Breast cancer is a common and fatal disease among women worldwide. Therefore, the early and precise diagnosis of breast cancer plays a pivotal role to improve the prognosis of patients with this disease. Several studies have developed automated techniques using different medical imaging modalities to predict breast cancer development. However, few...
Article
A feature‐based retinal image registration (RIR) technique aligns multiple fundus images and composed of pre‐processing, feature point extraction, feature descriptor, matching and geometrical transformation. Challenges in RIR include difference in scaling, intensity and rotation between images. The scale and intensity differences can be minimised w...
Article
Upper limb angular motion measurement is particularly a subject of interest in the field of rehabilitation. It is commonly measured manually by physiotherapist via goniometer to monitor stroke patient’s progress. However, manual measurement has many inherent drawbacks such as the need to have both patient and physiotherapist to be at the same place...
Article
Full-text available
Breast cancer (BC) infection, which is peculiar to women, brings about the high rate of deaths among women in every part of the world. The early investigation of BC has minimized the severe effects of cancer as compared to the last stage diagnosis. Doctors for diagnostic tests usually suggest the medical imaging modalities like mammograms or biopsy...
Article
Feature detection is an important concept in the area of image processing to compute image abstractions of image information, which is used for image recognition and many other applications. One of the popular algorithm used is called the Speeded-Up Robust Features (SURF), which realized the scale space pyramid to detect the features. For this reas...
Article
Full-text available
Fog computing is a paradigm that extends cloud computing and services to the edge of the network in order to address the inherent problems of the cloud, such as latency and lack of mobility support and location-awareness. The fog is a decentralized platform capable of operating and processing data locally and can be installed in heterogeneous hardw...
Chapter
Full-text available
Mobile communication witnesses a new generation after every 10 years. Following the same trend, the roll out of next generation called 5g network is anticipated by 2020. In this chapter, a critical review of enabling technologies and research issues of 5g network is provided. The novelty of the chapter lies In providing a holistic view of 5g networ...
Article
Full-text available
Energy and memory limitations are considerable constraints of sensor nodes in wireless sensor networks (WSNs). The limited energy supplied to network nodes causes WSNs to face crucial functional limitations. Therefore, the problem of limited energy resource on sensor nodes can only be addressed by using them efficiently. In this research work, an e...
Article
Taking into consideration that the prior CMF detection methods rely on several fixed threshold values in the filtering process, we propose an efficient CMF detection method with an automatic threshold selection, named as CMF-iteMS. The CMF-iteMS recommends a PatchMatch-based CMF detection method that adapts Fourier-Mellin Transform (FMT) as the fea...
Article
Full-text available
Steganography is the art and practice of communication using hidden messages. The least significant bits (LSB) based method is the well-known type of steganography in the spatial domain. Usually, achieving the larger embedding capacity in LSB-based methods requires a large number of LSB bits modification which indirectly reduces the visual quality...
Article
Retrieving desired information from databases containing video, natural scene, and license plate images through keyword spotting is a big challenge to expert systems due to different complexities that occur because of background and foreground variations of texts in real-time environments. To reduce background complexity of input images, we introdu...
Article
Full-text available
Cloud computing is intensifying the necessity for searchable encryption (SE) for data protection in cloud storage. SE encrypts data to preserve its confidentiality while offering a secure search facility on the encrypted data. Typical index-based SEs in data sharing scenarios can effectively search secure keyword indexes. However, due to the smalle...
Article
User activity logs can be a valuable source of information in cloud forensic investigations; hence, ensuring the reliability and integrity of such logs is crucial. Most existing solutions for secure logging are designed for conventional systems rather than the complexity of a cloud environment. In this paper, we propose the Cloud Log Assuring Sound...
Article
Full-text available
This paper presents a literature review of image steganography techniques in the spatial domain for last 5 years. The research community has already done lots of noteworthy research in image steganography. Even though it is interesting to highlight that the existing embedding techniques may not be perfect, the objective of this paper is to provide...
Article
Audio streams, such as news broadcasting, meeting rooms, and special video comprise sound from an extensive variety of sources. The detection of audio events including speech, coughing, gunshots, etc. leads to intelligent audio event detection (AED). With substantial attention geared to AED for various types of applications, such as security, speec...
Article
Full-text available
Retinal image registration is important to assist diagnosis and monitor retinal diseases, such as diabetic retinopathy and glaucoma. However, registering retinal images for various registration applications requires the detection and distribution of feature points on the low-quality region that consists of vessels of varying contrast and sizes. A r...
Article
Full-text available
The widespread use of digital images has led to a new challenge in digital image forensics. These images can be used in court as evidence of criminal cases. However, digital images are easily manipulated which brings up the need of a method to verify the authenticity of the image. One of the methods is by identifying the source camera. In spite of...
Article
Full-text available
Recently, many researchers have paid attention toward denial of services (DoS) and its malicious handling. The Intrusion detection system is one of the most common detection techniques used to detect malicious attack which attempts to compromise the security goals. To deal with such an issue, some of the researchers have used entropy calculation re...
Article
Full-text available
The advancement of digital technology has increased the deployment of wireless sensor networks (WSNs) in our daily life. However, locating sensor nodes is a challenging task in WSNs. Sensing data without an accurate location is worthless, especially in critical applications. The pioneering technique in range-free localization schemes is a sequentia...
Article
Full-text available
In recent years, the number of applications utilizing mobile wireless sensor networks (WSNs) has increased, with the intent of localization for the purposes of monitoring and obtaining data from hazardous areas. Location of the event is very critical in WSN, as sensing data is almost meaningless without the location information. In this paper, two...
Article
Copy-move forgery (CMF) is a popular image manipulation technique that is simple and effective in creating forged illustrations. The bulk of CMF detection methods concentrate on common geometrical transformation attacks (e.g., rotation and scale) and post-processing attacks (e.g., Joint Photographic Experts Group (JPEG) compression and Gaussian noi...
Article
Full-text available
In this study, a new data embedding method is proposed to enhance the embedding payload by combining irreversible and reversible methods. The proposed method is based on pixel value difference (PVD), least significant bit (LSB) substitution, PVD shift, and modification of prediction error (MPE). A pixel block (2 × 1) is initially classified into lo...
Article
The VoIP services provide fertile ground for criminal activity, thus identifying the transmitting computer devices from recorded VoIP call may help the forensic investigator to reveal useful information. It also proves the authenticity of the call recording submitted to the court as evidence. This paper extended the previous study on the use of rec...
Article
Full-text available
Wireless sensor networks (WSNs) are a collection of several small and inexpensive battery-powered nodes, commonly used to monitor regions of interests and to collect data from the environment. Several issues exist in routing data packets through WSN, but the most crucial problem is energy. There are a number of routing approaches in WSNs that addre...
Article
Full-text available
In recent years, the migration of the computational workloadto computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, clo...
Conference Paper
The IEEE 802.11e standard intends to enhance the Quality of Service (QoS) by introducing Hybrid Coordination Function Controlled Channel Access (HCCA). In HCCA, the QoS-enabled Station (QSTA) is assigned a Transmission Opportunity (TXOP) based on TS Specification (TSPEC) assigned during traffic setup time. Allocating fixed TXOP is only efficient fo...
Article
Full-text available
Soft set is a mathematical tool for dealing with vague and imprecise data. It is used in many applications and decision-making after representing the uncertain data in the Boolean-valued information system (BIS). BISs become incomplete because of various reasons, such as security, viral attack, and errors. Several soft set-based approaches exist to...
Article
Full-text available
Vehicular ad hoc networks (VANETs) are considered an emerging technology in the industrial and educational fields. This technology is essential in the deployment of the intelligent transportation system, which is targeted to improve safety and efficiency of traffic. The implementation of VANETs can be effectively executed by transmitting data among...
Conference Paper
There has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successful...
Article
Full-text available
The fundamental objectives of image steganographic algorithm are to simultaneously achieve high payload, good visual imperceptibility, and security. This paper proposes a new data hiding method that increases visual quality and payload, as well as maintains steganographic security. The proposed scheme consists of two novel methods of parity-bit pix...
Article
The separation of the control plane from the data plane of a switch enables abstraction of a network through a logically centralized controller. The controller functions as the “brain” of a software-defined network. However, centralized control draws attackers to exploit different network devices by hijacking the controller. Security was initially...
Conference Paper
Target tracking is a significant application of wireless sensor networks (WSNs) in which deployment of self-organizing and energy efficient algorithms is required. The tracking accuracy increases as more sensor nodes are activated around the target but more energy is consumed. Thus, in this study, we focus on limiting the number of sensors by formi...
Article
Video editing software can be used to combine different videos into one video using the chroma key feature. However, detecting such video manipulation is an understudied topic. Digital forgers may present a manipulated video from chroma key composition as evidence in court, thus creating a severe problem. In this paper, we propose a blind detection...
Article
The authenticity and reliability of digital images are increasingly important due to the ease in modifying such images. Thus, the capability to identify image manipulation is a current research focus, and a key domain in digital image authentication is Copy-Move Forgery Detection (CMFD). Copy-move forgery is the process of copying and pasting from...
Article
Full-text available
Soft set theory is a mathematical approach that provides solution for dealing with uncertain data. As a standard soft set, it can be represented as a Boolean-valued information system, and hence it has been used in hundreds of useful applications. Meanwhile, these applications become worthless if the Boolean information system contains missing data...
Article
Full-text available
Wireless sensor applications are susceptible to energy constraints. Most of the energy is consumed in communication between wireless nodes. Clustering and data aggregation are the two widely used strategies for reducing energy usage and increasing the lifetime of wireless sensor networks. In target tracking applications, large amount of redundant d...
Article
Full-text available
The use of digital video during forensic investigation helps in providing evidence related to crime scene. However, due to freely available user friendly video editing tools, the forgery of acquired digital videos that are used as evidence in a law suit is now simpler and faster. As a result, it has become easier for manipulators to alter the conte...
Article
Full-text available
Cloud computing represents the most recent enterprise trend in information technology and refers to the virtualization of computing resources that are available on demand. Cloud computing saves cost and time for businesses. Moreover, this computing process reflects a radical technological revolution in how companies develop, deploy, and manage ente...
Article
The fundamental role of Software Defined Networks (SDN) is to decouple the data plane from the control plane; thus providing a logically centralized visibility of the entire network to the controller. The centralized visibility of the controller attracts applications to enable innovations through network programmability. To establish a centralized...