Browsing by Author "Abikoye, O. C."
Now showing 1 - 6 of 6
Results Per Page
Sort Options
Item Conficker: An enviable threat to a Computer and internet system.(Fafakawa Centre, University of Cape Coast, Ghana., 2011) Adebayo, O.S.; Amit, Mishra; Mabayoje, M.A.; Abikoye, O. C.; Olagunju, MThe fear of computer worms and virus have became the beginning of wisdom for most computer users just as they both pose threats to the computer and its all activities, organs and usefulness of the computer system. Most of the computer and internet users cannot also differentiate between computer virus and worms and therefore risk a high damage to their system by performing various kinds of activities that are harmful to their system. The categories, damages, symptoms, preventions of a Conflicker worm among others is discussed in this paperItem Efficient Data Hiding System Using Cryptography and Steganography(International Journal of Applied Information Systems, 2012) Abikoye, O. C.; Adewole, K. S.; Oladipupo, A. J.Increase in the number of attack recorded during electronic exchange of information between the source and intended destination has indeed called for a more robust method for securing data transfer. Cryptography and steganography are well known and widely used techniques that manipulate information in order to cipher or hide their existence. These two techniques share the common goals and services of protecting the confidentiality, integrity and availability of information from unauthorized access. In this paper, a data hiding system that is based on audio steganography and cryptography is proposed to secure data transfer between the source and destination. Audio medium is used for the steganography and a LSB (Least Significant Bit) algorithm is employed to encode the message inside the audio file. The proposed system was evaluated for effectiveness and the result shows that, the encryption and decryption methods used for developing the system make the security of the proposed system more efficient in securing data from unauthorized access. The system is therefore, recommended to be used by the Internet users for establishing a more secure communication.Item Iris Feature Extraction for Personal Identification using Fast Wavelet Transform (FWT)(International Journal of Applied Information Systems, 2014) Abikoye, O. C.; Sadiku, J. S.; Adewole, K. S.; Jimoh, R. G.Iris is the annular region of the eye bounded by the pupil and the sclera(white of the eye) on either side. The iris has many interlacing features such as stripes, freckles, coronas, radial furrow, crypts, zigzag collarette, rings etc collectively referred to as texture of the iris. This texture is well known to provide a signature that is unique to each subject. All these features are extracted using different algorithms i.e features extraction is the process of extracting information from the iris image. Iris feature extraction is the crucial stage of the whole iris recognition process for personal identification. This is a key process where the two dimensional image is converted to a set of mathematical parameters. The significant features of the iris must be encoded so that comparisons between templates can be made. In this study the feature of the iris is extracted using Fast Wavelet Transform (FWT). The algorithm is fast and has a low complexity rate. The system encodes the features to generate its iris feature codes.Item Malicious Uniform Resource Locator Detection Using Wolf Optimization Algorithm and Random Forest Classifier(Machine Learning and Data Mining for Emerging Trend in Cyber Dynamics: Theories and Applications, 2021) Adewole, K. S.; Raheem, M. O.; Abikoye, O. C.; Ajiboye, A. R.; Oladele, Tinuke Omolewa; Jimoh, M. K.; Aremu, D. R.Within the multitude of security challenges facing the online community, malicious websites play a critical role in today’s cybersecurity threats. Malicious URLs can be delivered to users via emails, textmessages, pop-ups or advertisements. To recognize these malicious websites, blacklisting services have been created by the web security community. This method has been proven to be inefficient. This chapter proposed meta-heuristic optimization method for malicious URLs detection based on genetic algorithm (GA) and wolf optimization algorithm (WOA). Support vector machine (SVM) as well as random forest (RF) were used for classification of phishingweb pages. Experimental results showthatWOAreduced model complexity with comparable classification results without feature subset selection. RF classifier outperforms SVM based on the evaluation conducted. RF model without feature selection produced accuracy and ROC of 0.972 and 0.993, respectively, while RF model that is based onWOA optimization algorithm produced accuracy of 0.944 and ROC of 0.987. Hence, in view of the experiments conducted using two well-known phishing datasets, this research shows that WOA can produce promising results for phishing URLs detection task.Item A review of algorithm for fingerprint image acquisition, preprocessing and minutiae extraction(Ilorin Journal of Science, 2015) Adewole, K. S.; Jimoh, R. G.; Abikoye, O. C.Biometric recognition distinguishes between individuals using physical, chemical or behavioral attributes of the person. These attributes are called biometric identifiers or traits, and include fingerprint, palmprint, iris, face, voice, signature, gaint, and DNA among others. Fingerprint recognition is one of the oldest and most reliable biometric used for personal identification. Fingerprint has come a long way from tedious manual fingerprint matching. The ancient procedure of matching fingerprints manually was extremely cumbersome and time-consuming and required skilled personnel. In this paper, a review of algorithms for the various stages involved in fingerprint recognition such as fingerprint image acquisition, segmentation, normalization, ridge orientation estimation, ridge frequency, Gabor filtering, binarization, thinning, minutiae extraction, template generation, and template matching is presented. It was established that minutiae features of a person fingerprint truly make fingerprint of individual to be unique.Item Stepwise biometric procedures for managing student attendance in higher institution of learning(2015) Adewole, K. S.; Jimoh, R. G.; Abikoye, O. C.; Ajiboye, A. R.Data and information security are very important issues in computing environment. Security of data prevents unauthorized users from accessing individual personal information. Biometric is one of the authentication methods used in a wide range of application domains such as airline and banking environment to secure confidential data. This technique is more reliable and capable of distinguishing between an authorized person and an impostor than traditional methods such as passwords. Large numbers of higher academic institutions in the developing countries are still using the process of manual attendance for both lecture and examination for students' authentication and authorization, hence, the need for automated system that can assist in this area. In this paper, stepwise biometric procedures for managing students' attendance for both lectures and examinations are presented. The various stages involved in student attendance management are discussed and simulated. These include enrollment, fingerprint matching and attendance management. The results show that the proposed system is able to identify those students who are qualified to sit for an examination.