Dr. Aws Alaa Zaidan
My Social Links

Dr. Aws Alaa Zaidan

Senior Lecturer
University Pendidikan Sultan Idris, Malaysia


Highest Degree
Ph.D. in Computer Engineering from Multimedia University, Malaysia

Share this Profile

Biography

Dr. Aws Alaa Zaidan is currently working as Senior Lecturer at University Pendidikan Sultan Idris, Malaysia. He has completed his Ph.D. in Computer Engineering from Multimedia University, Malaysia. He is member of ICT and Computational Science Research Cluster (ICTCS), University of Malay, IEEE (In progress), International Association of Computer Science and Information Technology (IACSIT), Academic and Scientific Research Organizations, International Association of Engineers (IAENG) London, and International Association of Engineers (IAENG). He successfully completed many research projects as member of group and group leader. He also attended number of seminars. He was a Golden Winner for Anti-Pornography software, International Conference and Exposition on Invitation of Institutions of Higher Learning PECIPCA 2013 and received ITEX Golden Medal. He also received number of grants/funding for his research work. He is also serving as member of editorial board and reviewer for several journals. He has published 91 research articles in international journals, 19 articles in national and international conferences contributed as author/co-author. His main area of research interest focuses on Information Security (Steganography and Digital Watermarking), Network Security (Encryption Methods), Image Processing (Skin Detectors), Pattern Recognition.(Classification and Prediction), Machine Learning (Neural Network, Fuzzy Logic and Bayesian) Methods, Text Mining and Video Mining, Telemedicine and knowledge sharing based systems, Multiple Criteria Decision Making (Multiplicative Exponential Weighting, Weighted Product Method, Weighted Sum Model, Simple Additive Weighting, Hierarchical Adaptive Weighting, Technique for Order Performance by Similarity to Ideal Solution, Analytic Hierarchy Process).

Area of Interest:

Computer Sciences
100%
Signal and Image Processing
62%
Artificial Intelligence
90%
Information Security
75%
AI Applications
55%

Research Publications in Numbers

Books
0
Chapters
0
Articles
217
Abstracts
10

Selected Publications

  1. Zaidan, A.A., N.N. Ahmad, H. Abdul Karim, M. Larbani and B.B. Zaidan et al., 2014. On the multi-agent learning neural and Bayesian methods in skin detector and pornography classifier: An automated anti-pornography system. Neurocomput., 131: 397-418.
    CrossRef  |  Direct Link  |  
  2. Zaidan, A.A., N.N. Ahmad, H. Abdul Karim, M. Larbani and B.B. Zaidan et al., 2014. Image skin segmentation based on multi-agent learning Bayesian and neural network. Eng. Appl. Artif. Intell., 32: 136-150.
    CrossRef  |  Direct Link  |  
  3. Zaidan, A.A., H. Abdul Karim, N.N. Ahmad, B.B. Zaidan and A. Sali, 2014. A four-phases methodology to propose Anti-pornography system based on neural and bayesian methods of artificial intelligence. Int. J. Pattern Recognit. Artif. Intell., Vol. 28. 10.1142/S0218001414590010.
    CrossRef  |  
  4. Zaidan, A.A., B.B. Zaidan, A. Al-Haiqi, M.L.M. Kiah, M. Hussain and M. Abdulnabi, 2014. Evaluation and selection of open-source EMR software packages based on integrated AHP and TOPSIS. J. Biomed. Inf., 10.1016/j.jbi.2014.11.012.
    CrossRef  |  Direct Link  |  
  5. Kiah, M.M., S.H. Al-Bakri, A.A. Zaidan, B.B. Zaidan and M. Hussain, 2014. Design and develop a video conferencing framework for real-time telemedicine applications using secure group-based communication architecture. J. Med. Syst., 38: 1-11.
    CrossRef  |  
  6. Kiah, M.L.M., B.B. Zaidan, A.A. Zaidan, M. Nabi and R. Ibraheem, 2014. MIRASS: Medical informatics research activity support system using information mashup network. J. Med. Syst., 38: 37-37.
    CrossRef  |  PubMed  |  Direct Link  |  
  7. Kiah, M.L.M., A. Haiqi, B.B. Zaidan and A.A. Zaidan, 2014. Open source EMR software: Profiling, insights and hands-on analysis. Comput. Methods Prog. Biomed., 117: 360-382.
    CrossRef  |  Direct Link  |  
  8. Zaidan, A.A., H.A. Karim, N.N. Ahmad, B.B. Zaidan and A. Sali, 2013. An automated anti-pornography system using a skin detector based on artificial intelligence: A review. Int. J. Pattern Recognit. Artif. Intell., Vol. 27. 10.1142/S0218001413500122.
    CrossRef  |  
  9. Watari, M.A., A.A. Zaidan and B.B. Zaidan, 2013. Securing m-government transmission based on symmetric and asymmetric algorithms: A review. Asian J. Sci. Res., 6: 632-649.
    CrossRef  |  Direct Link  |  
  10. Nabi, M.S., M.L.M. Kiah, A.A. Zaidan and B.B. Zaidan, 2013. Suitability of adopting S/MIME and open pgp email messages protocol to secure electronic medical records. Proceedings of the 2nd International Conference on Future Generation Communication Technology, November 12-14, 2013, UK., pp: 93-97.
  11. Kiah, M.M., M.S. Nabi, B.B. Zaidan and A.A. Zaidan, 2013. An enhanced security solution for electronic medical records based on AES hybrid technique with SOAP/XML and SHA-1. J. Med. Syst., Vol. 37. 10.1007/s10916-013-9971-2.
    CrossRef  |  
  12. Zakaria, O., M. Abomhara, O.O. Khalifa, A.A. Zaidan and B.B. Zaidan, 2011. An Experiment of scalable video security solution using H.264/AVC and AES: Selective Cryptography. Int. J. Physical Sci., 6: 4075-4085.
    Direct Link  |  
  13. Zaidan, B.B., A.A. Zaidan and M.L.M. Kiah, 2011. Impact of data privacy and confidentiality on developing telemedicine applications: A review participates opinion and expert concerns. Int. J. Pharmacol., 7: 382-387.
    CrossRef  |  Direct Link  |  
  14. Zaidan, A.A., N.N. Ahmed, H. Abdul Karim, G.M. Alam and B.B. Zaidan, 2011. Spam influence on business and economy: theoretical and experimental studies for textual anti-spam filtering using mature document processing and naive Bayesian classifier. Afr. J. Bus. Manage., 5: 596-607.
    Direct Link  |  
  15. Yass, A.A., N.A. Yasin, G.M. Alam, B.B. Zaidan and A.A. Zaidan, 2011. SSME architecture design in reserving parking problems in Malaysia. Afr. J. Bus. Manage., 4: 3911-3923.
    Direct Link  |  
  16. Salem, Y., M. Abomhara, O.O. Khalifa, A.A. Zaidan and B.B. Zaidan, 2011. A review on multimedia communications cryptography. Res. J. Inform. Technol., 3: 146-152.
    CrossRef  |  Direct Link  |  
  17. Nidhal, S., M.A.M Ali, A.A. Zaidan, B.B. Zaidan and H. Najah, 2011. Computerized algorithm for fetal heart rate baseline and baseline variability estimation based on distance between signal average and α value. Int. J. Pharmacol., 7: 228-237.
  18. Naji, A.W., M.A. Mohammed, B.B. Zaidan, A.A. Zaidan, Wajdi ALKhateeb, K.A.S. Al- Khateeb and M.A. Mahdi, 2011. A novel theoretical analysis of quadruple pass Erbium doped fiber amplifier. Int. J. Physc. Sci., 6: 2393-2398.
    Direct Link  |  
  19. Naji, A.W., B.A. Hamida, X.S. Cheng, M.A. Mahdi and S. Harun et al., 2011. Review of erbium-doped fiber amplifier. Int. J. Phys. Sci., 6: 4674-4689.
    Direct Link  |  
  20. Naji, A.W., A.S. Housain, B.B. Zaidan, A.A. Zaidan and S.A. Hameed, 2011. Security improvement of credit card online purchasing system. Scient. Res. Essays, 6: 3357-3370.
    Direct Link  |  
  21. Medani, A, A. Gani, O. Zakaria, A.A. Zaidan and B.B. Zaidan, 2011. Review of mobile SMS security issues and techniques towards the solution. Sci. Res. Essays, 6: 1147-1165.
    Direct Link  |  
  22. Kiah, M.L.M., B.B. Zaidan, A.A. Zaidan, A.M. Ahmed and S.H. Al-bakri, 2011. A review of audio based steganography and digital watermarking. Int. J. Phys. Sci., 6: 3837-3850.
    Direct Link  |  
  23. Jawad, M.M., S.T.A. Qader, A.A. Zaidan, B.B. Zaidan, A.W. Naji, I.T.A. Qader, 2011. An overview of laser principle, laser-tissue interaction mechanisms and laser safety precautions for medical laser users. Int. J. Pharmacol., 7: 149-160.
  24. Jawad, M.M., S.T. Abdul Qader, B.B. Zaidan, A.A. Zaidan, I.T. Abdul Qader and A.W. Naji, 2011. An Overview: Laser Applications in Dentistry Int. J. Pharmacol., 7: 189-197.
  25. Gani, A., M.K. Hassan, A.A. Zaidan and B.B. Zaidan, 2011. Intelligent routing information protocol using full triggered update mechanism. Int. J. Phys. Sci., 6: 2750-2761.
    Direct Link  |  
  26. Al-Bakri, S.H., M.L.M. Kiah, A.A. Zaidan, B.B. Zaidan and G.M. Alam, 2011. Securing peer-to-peer mobile communications using public key cryptography: New security strategy. Int. J. Phys. Sci., 6: 930-938.
    Direct Link  |  
  27. Zaidan, M.A., A.A. Zaidan, B.B. Zaidan, H.T. Madhloom, H.O. Alanazi and R. Alnaqeib, 2010. On the module of E-registration system. J. Comput. Sci. Eng., 2: 6-15.
  28. Zaidan, B.B., A.A. Zaidan, H.O. Alanazi and R. Alnaqeib, 2010. Towards corrosion detection system. Int. J. Comput. Sci. Issues, 7: 33-36.
    Direct Link  |  
  29. Zaidan, B.B., A.A. Zaidan, A.K. Al-Frajat and H.A. Jalab, 2010. On the differences between hiding information and cryptography techniques: An overview. J. Applied Sci., 10: 1650-1655.
    CrossRef  |  Direct Link  |  
  30. Zaidan, B.B., A.A. Zaidan, A. Taqa, G.M. Alam, M.L.M. Kiah and H.A. Jalab, 2010. StegoMos: A secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem. Int. J. Phys. Sci., 5: 1796-1806.
    Direct Link  |  
  31. Zaidan, A.A., N.N. Ahmed, H.A. Karim, G.M. Alam and B.B. Zaidan, 2010. Increase reliability for skin detector using backprobgation neural network and heuristic rules based on YCbCr. Sci. Res. Essays, 5: 2931-2946.
    Direct Link  |  
  32. Zaidan, A.A., N.N. Ahmad, H.A. Karim, G.M. Alam and B.B. Zaidan, 2010. A new hybrid module for skin detector using fuzzy inference system structure and explicit rules. Int. J. Phys. Sci., 5: 2084-2097.
    Direct Link  |  
  33. Zaidan, A.A., H.A. Karim, N.N. Ahmad, G.M. Ala and B.B. Zaidan, 2010. A novel hybrid module of skin detector using grouping histogram technique for bayesian method and segment adjacent-nested technique for neural network. Int. J. Phys. Sci., 5: 2471-2492.
    Direct Link  |  
  34. Zaidan, A.A., B.B. Zaidan, R. Alnaqeib and H.O. Alanazi, 2010. New search for video compression. Int. J. Comput. Intell. Inf. Secur., 1: 67-73.
  35. Zaidan, A.A., B.B. Zaidan, H.O. Alanazi, A. Gani, O. Zakaria and G.M. Alam, 2010. Novel approach for high (Secure and rate) data hidden within triplex space for executable file. Sci. Res. Essays, 5: 1965-1977.
    Direct Link  |  
  36. Zaidan, A.A., B.B. Zaidan, H.A. Jalab, H.O. Alanazi and R. Alnaqeib, 2010. Offline arabic handwriting recognition using artificial neural network. J. Comput. Sci. Eng., 1: 55-58.
    Direct Link  |  
  37. Zaidan, A.A., B.B. Zaidan, A.Y. Taqa, M.A. Sami, G.M. Alam and A.H. Jalab, 2010. Novel multi-cover steganography using remote sensing image and general recursion neural cryptosystem. Int. J. Phys. Sci., 5: 1776-1786.
    Direct Link  |  
  38. Zaidan, A.A., B.B. Zaidan, A.K. Al-Frajat and H.A. Jalab, 2010. An overview: Theoretical and mathematical perspectives for advance encryption standard/rijndael. J. Applied Sci., 10: 2161-2167.
    CrossRef  |  Direct Link  |  
  39. Zaidan, A.A., B.B. Zaidan, A.K. Al-Fraja and H.A. Jalab, 2010. Investigate the capability of applying hidden data in text file: An overview. J. Applied Sci., 10: 1916-1922.
    CrossRef  |  Direct Link  |  
  40. Zaidan, A.A., B.B. Zaidan and A.H. Jalab, 2010. A new system for hiding data within (Unused Area Two + Image Page) of portable executable file using statistical technique and advance encryption standard. Int. J. Comput. Theory Eng., 2: 220-227.
    Direct Link  |  
  41. Raad, M., N.M. Yeassen, G.M. Alam, B.B. Zaidan and A.A. Zaidan, 2010. Impact of spam advertisement through e-mail: A study to assess the influence of the anti-spam on the e-mail marketing. Afr. J. Bus. Manage., 4: 2362-2367.
    Direct Link  |  
  42. Nabi, M.S.A., M.L.M. Kiah, B.B. Zaidan, A.A. Zaidan and G.M. Alam, 2010. Suitability of SOAP protocol in securing transmissions of EMR database. Int. J. Pharmacol., 6: 959-964.
  43. Madhloom, H.T., S.A. Kareem, H. Ariffin, A.A. Zaidan, H.O. Alanazi and B.B. Zaidan, 2010. An automated white blood cell nucleus localization and segmentation using image arithmetic and automatic threshold. J. Applied Sci., 10: 959-966.
    CrossRef  |  Direct Link  |  
  44. Jalab, H.A., A.A. Zaidan and B.B. Zaidan, 2010. New design for information hiding with in steganography using distortion techniques. Int. J. Eng. Technol., 2: 72-77.
    Direct Link  |  
  45. Islam, M.R., A.W. Naji, A.A. Zaidan and B.B. Zaidan, 2010. New system for secure cover file of hidden data in the image page within executable file using statistical steganography techniques. Int. J. Comput. Sci. Inform. Secur., 7: 273-279.
    Direct Link  |  
  46. Hmood, A.K., Z.M. Kasirun, H.A. Jalab, G.M. Alam, A.A. Zaidan and B.B. Zaidan, 2010. On the accuracy of hiding information metrics: Counterfeit protection for education and important certificates. Int. J. Phys. Sci., 5: 1054-1062.
    Direct Link  |  
  47. Hmood, A.K., H.A. Jalab, Z.M. Kasirun, B.B. Zaidan and A.A. Zaidan, 2010. On the capacity and security of steganography approaches: An overview. J. Applied Sci., 10: 1825-1833.
    CrossRef  |  Direct Link  |  
  48. Hmood, A.K., B.B. Zaidan, A.A. Zaidan and H.A.Jalab, 2010. A novel approach for corrosion detection using texture analysis. Int. J. Computat. Intell. Inform. Security, 1: 70-75.
  49. Hmood, A.K., B.B. Zaidan, A.A. Zaidan and H.A. Jalab, 2010. An overview on hiding information technique in images. J. Applied Sci., 10: 2094-2100.
    CrossRef  |  Direct Link  |  
  50. Hameed, S.A., B.B. Zaidan, A.A. Zaidan, A.W. Naji and O.F. Tawfiq, 2010. An accurate method to obtain bio-metric measurements for three dimensional skull. J. Applied Sci., 10: 145-150.
    CrossRef  |  Direct Link  |  
  51. Elnajjar, M., A.A. Zaidan, B.B. Zaidan, M.E.M.Sharif and H.O.Alanazi, 2010. Optimization digital image watermarking technique for patent protection. J. Comput., 2: 142-148.
    Direct Link  |  
  52. Alshammari, F.H., R. Alnaqeib, M.A. Zaidan, A.K. Hmood, B.B. Zaidan and A.A. Zaidan, 2010. New quantitative study for dissertations repository system. J. Comput., 2: 85-93.
    Direct Link  |  
  53. Alnaqeib, R., H.O. Alanazi, M.A. Zaidan, A.A. Zaidan, B.B. Zaidan and Z.M. Hazza, 2010. New quantitative study for E-registration system. J. Comput. Sci. Eng., 2: 26-31.
  54. Alnaqeib, R., F.H. Alshammari, M.A. Zaidan, A.A. Zaidan and B.B. Zaidan et al., 2010. An overview: Extensible markup language technology. J. Comput., 2: 177-181.
    Direct Link  |  
  55. Aljudi, H.H., B.B. Zaidan, A.A. Zaidan, Z.M. Hamad, R. Alnaqeib and H.T. Madhloom, 2010. The roll of knowledge shearing and Web-based applications on learning language. Int. J. Comput. Intell. Inform. Secur., 1: 77-82.
  56. Aljudi, H.H., B.B. Zaidan, A.A. Zaidan and Z.M. Hamad, 2010. Arabic syntax impact on the English-Arabic, Arabic-English-E-translation. Int. J. Comput. Intell. Inf. Secur., 1: 13-20.
  57. Alanizi, H.O., M.L.M. Kiah, A.A. Zaidan, B.B. Zaidan and G.M. Alam, 2010. Secure topology for electronic medical record transmissions. Int. J. Pharmacol., 6: 954-958.
    CrossRef  |  Direct Link  |  
  58. Alanazi, H.O., R.M. Noor, B.B. Zaidan and A.A. Zaidan, 2010. Intrusion detection system: overview. J. Comput., 2: 130-133.
    Direct Link  |  
  59. Alanazi, H.O., R. Alnaqeib, M.A. Zaidan, A.A. Zaidan, B.B. Zaidan and O. Noori, 2010. Towards improving E-registration system using email technology and knowledge management. Int. J. Comput. Intell. Inf. Secur., 1: 10-16.
  60. Alanazi, H.O., H.A. Jalab, G.M. Alam, B.B. Zaidan and A.A. Zaidan, 2010. Securing electronic medical records transmissions over unsecured communications: An overview for better medical governance. J. Med. Plants Res., 4: 2059-2074.
    Direct Link  |  
  61. Alanazi, H.O., B.B. Zaidan and A.A. Zaidan, 2010. 3D skull recognition using 3D matching technique. J. Comput., 2: 121-126.
    Direct Link  |  
  62. Alanazi, H.O., B.B Zaidan, A.A. Zaidan, A.H. Jalab, M. Shabbir and Y. Al-Nabhani, 2010. New comparative study between DES, 3DES and AES within nine factors. J. Comput., 2: 152-157.
    Direct Link  |  
  63. Alanazi, H.O., A.A. Zaidan, B.B. Zaidan, H.A. Jalab and Z.K. AL-Ani, 2010. New classification methods for hiding information into two parts: multimedia files and non multimedia files. J. Comput., 2: 144-151.
    Direct Link  |  
  64. Alanazi, H.O., A.H. Jalab, A.A. Zaidan and B.B. Zaidan, 2010. New frame work of hidden data with in non multimedia file. Int. J. Comput. Network Security, 2: 46-54.
    Direct Link  |  
  65. Alam, G.M., M.L.M. Kiah, B.B. Zaidan, A.A. Zaidan and H.O. Alanazi, 2010. Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: Analytical study. Sci. Res. Essays, 5: 3254-3260.
    Direct Link  |  
  66. Al-Frajat, A.K., H.A. Jalab, Z.M. Kasirun, A.A. Zaidan and B.B. Zaidan, 2010. Hiding data in video file: An overview. J. Applied Sci., 10: 1644-1649.
    CrossRef  |  Direct Link  |  
  67. Al Abdullah, F.S., F.H. Alshammari, R. Alnaqeib, H.A. Jalab and A.A. Zaidan et al., 2010. Analytical study on internet banking system. J. Comput., 2: 140-146.
    Direct Link  |  
  68. Ahmed, M.A., M.L.M. Kiah, B.B. Zaidan and A.A. Zaidan, 2010. A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm. J. Applied Sci., 10: 59-64.
    CrossRef  |  Direct Link  |  
  69. Abomhara, M., O.O. Khalifa, O. Zakaria, A.A. Zaidan, B.B. Zaidan and H.O. Alanazi, 2010. Suitability of using symmetric key to secure multimedia data: An overview. J. Applied Sci., 10: 1656-1661.
    CrossRef  |  Direct Link  |  
  70. Abomhara, M., O.O. Khalifa, O. Zakaria, A.A. Zaidan, B.B. Zaidan and A. Rame, 2010. Video compression techniques: An overview. J. Applied Sci., 10: 1834-1840.
    CrossRef  |  Direct Link  |  
  71. Abomhara, M., O. Zakaria, O.O. Khalifa, A.A. Zaidan and B.B. Zaidan, 2010. Enhancing selective encryption for H.264/AVC using advanced encryption standard. Int. J. Comput. Theory Eng., 2: 223-229.
  72. AL-Ani, Z.K., A.A. Zaidan, B.B. Zaidan and H.O. Alanazi, 2010. Overview: main fundamentals for steganography. J. Comput., 2: 158-165.
    Direct Link  |  
  73. Zaidan, B.B., A.A. Zaidan, F. Othman and A. Rahem, 2009. Novel approach of hidden data in the unused area 1 within exe files using computation between cryptography and steganography. Proceedings of the International Conference on Cryptography Coding and Information Security, June 24-26, Academic and Scientific Research Organizations, Paris, France, pp: 1-22.
    Direct Link  |  
  74. Zaidan, B.B., A.A. Zaidan, A. Taqa and F. Othman, 2009. Stego-image vs stego-analysis system. Int. J. Comput. Electr. Eng., 1: 572-578.
    CrossRef  |  Direct Link  |  
  75. Zaidan, B.B., A.A. Zaidan and H. Mwafak, 2009. New comprehensive study to assess comparatively the QKD, XKMS, KDM in the PKI encryption algorithms. Int. J. Comput. Sci. Eng., 1: 263-268.
    Direct Link  |  
  76. Zaidan, B., A.A. Zaidan, F. Othman, R.Z. Raji, S. Mohammed and M. Abdulrazzaq, 2009. Quality of image vs. quantity of data hidden in the image. Proceedings of the 2009 International Conference on Image Processing, Computer Vision and Pattern Recognition, (ICIPCVPR`09), CSREA Press, Las Vegas Nevada, USA., pp: 343-350.
  77. Zaidan, A.A., F. Othman, B.B. Zaidan, R.Z. Raji, H.K. Ahmed and A.W. Naji, 2009. Securing cover-file without limitation of hidden data size using computation between cryptography and steganography. Proc. World Cong. Eng., 1: 259-265.
    Direct Link  |  
  78. Zaidan, A.A., F. Othman, B.B. Zaidan, R.Z. Raji, A.K. Hasan and A.W. Naji, 2009. Securing Cover-file without limitation of hidden data size using computation between cryptography and steganography. Proceedings of the World Congress on Engineering, July 1-3, 2009, London, UK., pp: 259-265.
  79. Zaidan, A.A., B.B. Zaidan and F. Othman, 2009. New technique of hidden data in pe-file with in unused area one. Int. J. Comput. Electr. Eng., 1: 642-650.
    Direct Link  |  
  80. Zaidan, A.A., B.B. Zaidan and A. Majeed, 2009. High securing cover-file of hidden data using statistical technique and AES encryption algorithm. World Acad. Sci. Eng. Technol., 54: 468-479.
    Direct Link  |  
  81. Zaidan, A.A., A.W. Naji, S.A. Hameed, F. Othman and B.B. Zaidan, 2009. Approved undetectable-antivirus steganography for multimedia information in PE-file. Proceedings of the International Association of Computer Science and Information Technology-Spring Conference, April 17-20, 2009, Singapore, pp: 425-429.
  82. Zaidan, A.A. and B.B. Zaidan, 2009. Novel approach for high secure data hidden in MPEG video using public key infrastructure. Int. J. Comput. Network Secur., 1: 71-76.
  83. Zaidan, A., B. Zaidan and F. Othman, 2009. New technique of hidden data in pe-file with in unused area one. Int. J. Comput. Electrical Eng., 1: 1793-8198.
    Direct Link  |  
  84. Zaidan, A. and B. Zaidan, 2009. Novel approach for high secure data hidden in MPEG video using public key infrastructure. Int. J. Comput. Network Security, 1: 1985-1993.
  85. Othman, F., L. Maktom, A.Y. Taqa, B.B. Zaidan and A.A. Zaidan, 2009. An extensive empirical study for the impact of increasing data hidden on the images texture. Proceedings of the International Conference on Future Computer and Communication, April 3-5, IEEE Computer Society, Kuala Lumpur, Malysia, pp: 477-481.
    Direct Link  |  
  86. Naji, A.W., T.S. Gunawan, S.A. Hameed, B.B. Zaidan and A.A Zaidan, 2009. Stego-analysis chain, session one" investigations on steganography weakness vs stego-analysis system for multimedia file. Proceedings of International Association of Computer Science and Information Technology, April 17-20, 2009, Singapore, pp: 405-409.
    CrossRef  |  
  87. Naji, A.W., T.S. Gunawan, A.A. Zaidan, O.O. Khalifa, B.B. Zaidan, W.F. Al-Khateeb and S.A. Hameed, 2009. New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique. Int. J. Comput. Sci. Network Secur., 9: 218-224.
    Direct Link  |  
  88. Naji, A.W., S.A. Hameed, M.R. Islam, B.B. Zaidan, T.S. Gunawan and A.A. Zaidan, 2009. Stego-analysis chain, session two novel approach of stego-analysis system for image file. Proceedings of the International Conference on IACSIT Spring Conference, April 17-20, Singapore, pp: 398-401.
    Direct Link  |  
  89. Naji, A.W., H.A. Shihab, B.B. Zaidan, F. Al-Khateeb Wajdi, O.O. Khalifa, A.A. Zaidan and S.T. Gunawan, 2009. Novel framework for hidden data in the image page within executable file using computation between advanced encryption standard and distortion techniques. Int. J. Comput. Sci. Inform. Secur., 3: 73-78.
    Direct Link  |  
  90. Naji, A.W., A.A. Zaidan, B.B.A. Shihab and O.O. Khalifa, 2009. Novel approach of hidden data in the (Unused area 2 within EXE file) using computation between cryptography and steganography. Int. J. Comput. Sci. Network Secur., 9: 294-300.
  91. Naji, A.W., A.A. Zaidan, B.B. Zaidan and I.A.S. Muhamadi, 2009. Novel approach for cover file of hidden data in the unused area two within EXE file using distortion techniques and advance encryption standard. Proceeding of the World Academy of Science Engineering and Technology Conference, August 26-28, 2009, Singapore, pp: 498-502.
  92. Naji, A.W., A.A. Zaidan, B.B. Zaidan and I.A.S. Muhamadi, 2009. New approach of hidden data in the portable executable file without change the size of carrier file using distortion techniques. Proceeding of the World Academy of Science Engineering and Technology Conference, August 26-28, 2009, Singapore, pp: 493-497.
  93. Naji, A.W., A.A. Zaidan and B.B. Zaidan, 2009. Challenges of hidden data in the unused area two within executable files. J. Comput. Sci., 5: 890-897.
    CrossRef  |  Direct Link  |  
  94. Naji, A., A. Zaidan, B. Zaidan and I.A.S. Muhamadi, 2009. Novel approach for cover file of hidden data in the unused area two within EXE file using distortion techniques and advance encryption standard. Proceedings of the International Conference on Computer, Electrical, and Systems Science and Engineering, May 4-6, 2009, Ottawa, Canada, pp: 26-28.
  95. Muhamadi, I.A.S., S.Raviraja, B.B. Zaidan, A.A. Zaidan and M.A. Zaidan et al., 2009. New quantitative study for the student record retrieval system. Int. J. Comput. Sci. Network Secur., 9: 304-311.
    Direct Link  |  
  96. Muhamadi, I.A.S., S.Raviraja, A.A. Zaidan, M.A. Zaidan and B.B. Zaidan et al., 2009. Enhanced admin role of the student record retrieval system using knowledge-sharing and rationale method. Int. J. Comput. Sci. Network Secur., 9: 269-276.
    Direct Link  |  
  97. Muhamadi, I.A.S., M.A. Zaidan, A.A. Zaidan and B.B. Zaidan, 2009. Student record retrieval system using knowledge sharing. Int. J. Comput. Sci. Network Secur., 9: 97-106.
    Direct Link  |  
  98. Muhamadi, I.A.S., A.A. Zaidan, S. Raviraja, M.A. Zaidan and B.B. Zaidan et al., 2009. Auto notification service for the student record retrieval system using electronic mail message (EMM). Int. J. Comput. Sci. Network Secur., 9: 295-303.
    Direct Link  |  
  99. Muhamadi, I.A., A.A. Zaidan, S. Raviraja, M.A. Zaidan, B.B. Zaidan and C. Mapundu, 2009. Auto notification service for the student record retrieval system using Short Message Service (SMS). Int. J. Comput. Sci. Network Secur., 9: 200-208.
    Direct Link  |  
  100. Majeed, A., M.L.M. Kiah, H.T. Madhloom, B.B. Zaidan and A.A. Zaidan, 2009. Novel approach for high secure and high rate data hidden in the image using image texture analysis. Int. J. Eng. Technol., 1: 63-69.
    Direct Link  |  
  101. Majeed, A., A.A. Zaidan, B.B. Zaidan, S.M. Mohammed and R.Z. Raji, 2009. Employ the Ad-hoc admission control on WIMAX relay station to give the coverage for the mobile stations out of coverage. Proceedings of the International Multi Conference of Engineers and Computer Scientists, July 1-3, 2009, London, UK., pp: 875-879.
  102. Majeed, A., A.A. Zaidan, B.B. Zaidan and L.M. Kiah, 2009. Towards for admission control in WIMAX relay station mesh network for mobile stations out of coverage using Ad-Hoc‖. World Acad. Sci. Eng. Technol., 54: 463-467.
  103. Jalab, H., A. Zaidan and B.B. Zaidan, 2009. Frame selected approach for hiding data within MPEG video using bit plane complexity segmentation. J. Comput., 1: 108-113.
    Direct Link  |  
  104. Hasan, A.K., A.A. Zaidan, B.B. Zaidan, R. Salleh, O. Zakaria and S.M. Mohammed, 2009. Throughput optimization of unplanned wireless mesh networks deployment using Partitioning Hierarchical Cluster (PHC). Proceedings of the International Multi Conference of Engineers and Computer Scientists, July 1-3, 2009, London, UK., pp: 907-911.
  105. Hasan, A.K., A.A. Zaidan, B.B. Zaidan, A. Majeed, R. Salleh, O. Zakaria and A. Zuheir, 2009. Enhancement throughput of unplanned wireless mesh networks deployment using Partitioning Hierarchical Cluster (PHC). World Acad. Sci. Eng. Technol., 54: 480-484.
    Direct Link  |  
  106. Hameed, S.A., B.B. Zaidan, A.A. Zaidan, A.W. Naji and O. Faroq, 2009. Novel simulation framework of three-dimensional skull bio-metric measurement. Int. J. Comput. Sci. Eng., 1: 270-275.
    Direct Link  |  
  107. Eltahir, M.E., M.L.M. Kiah, B.B. Zaidan and A.A. Zaidan, 2009. High rate video streaming steganography. Proceedings of the 2009 International Conference on Future Computer and Communication, April 03-05, IEEE Computer Society, Kuala Lumpur, Malaysia, pp: 550-553.
    Direct Link  |  
  108. Aos, A.Z., A.W. Naji, S.A. Hameed, F. Othman and B.B. Zaidan, 2009. Approved Undetectable-antivirus steganography for multimedia information in PE-File. Proceedings of the International Association of Computer Science and Information Technology-Spring Conference, April 17-20, 2009, Singapore, pp: 437-441.
    CrossRef  |  
  109. Alaa, T., A.A. Zaidan and B.B. Zaidan, 2009. New framework for high secure data hidden in the MPEG using AES encryption algorithm. Int. J. Comput. Electr. Eng., 1: 566-571.
  110. Abdul-Talib, Y.Y., B.B. Zaidan, A.A. Zaidan and A.W. Naji, 2009. Optimizing security and flexibility by designing a high security system for e-government servers. ICOCI09, University Utara Malaysia, pp: 355-358..
  111. Zaidan, B.B., A.A. Zaidan and F. Othman, 2008. Enhancement of the amount of hidden data and the quality of image. Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia..