@unilorin.edu.ng
Computer Science/ Communication and Information Sciences
University of Ilorin
Computer Science, Artificial Intelligence, Computer Networks and Communications, Human-Computer Interaction
Scopus Publications
Scholar Citations
Scholar h-index
Scholar i10-index
Esau Taiwo Oladipupo, Oluwakemi Christiana Abikoye, and Joseph Bamidele Awotunde
MDPI AG
Cloud computing and the increasing popularity of 5G have greatly increased the application of images on Internet of Things (IoT) devices. The storage of images on an untrusted cloud has high security and privacy risks. Several lightweight cryptosystems have been proposed in the literature as appropriate for resource-constrained IoT devices. These existing lightweight cryptosystems are, however, not only at the risk of compromising the integrity and security of the data but also, due to the use of substitution boxes (S-boxes), require more memory space for their implementation. In this paper, a secure lightweight cryptography algorithm, that eliminates the use of an S-box, has been proposed. An algorithm termed Enc, that accepts a block of size n divides the block into L n R bits of equal length and outputs the encrypted block as follows: E=L⨂R⨁R, where ⨂ and ⨁ are exclusive-or and concatenation operators, respectively, was created. A hash result, hasR=SHA256P⨁K, was obtained, where SHA256, P, and K are the Secure Hash Algorithm (SHA−256), the encryption key, and plain image, respectively. A seed, S, generated from enchash=Enchashenc,K, where hashenc is the first n bits of hasR, was used to generate a random image, Rim. An intermediate image, intimage=Rim⨂P, and cipher image, C=Encintimage,K, were obtained. The proposed scheme was evaluated for encryption quality, decryption quality, system sensitivity, and statistical analyses using various security metrics. The results of the evaluation showed that the proposed scheme has excellent encryption and decryption qualities that are very sensitive to changes in both key and plain images, and resistance to various statistical attacks alongside other security attacks. Based on the result of the security evaluation of the proposed cryptosystem termed Hash XOR Permutation (HXP), the study concluded that the security of the cryptography algorithm can still be maintained without the use of a substitution box.
John Daugman, Cathryn Downing, Oluwatobi Noah Akande, and Oluwakemi Christiana Abikoye
Institute of Electrical and Electronics Engineers (IEEE)
We conducted more than 1.3 million comparisons of iris patterns encoded from images collected at two Nigerian universities, which constitute the newly available African Human Iris (AFHIRIS) database. The purpose was to discover whether ethnic differences in iris structure and appearance such as the textural feature size, as contrasted with an all-Chinese image database or an American database in which only 1.53% were of African-American heritage, made a material difference for iris discrimination. We measured a reduction in entropy for the AFHIRIS database due to the coarser iris features created by the thick anterior layer of melanocytes, and we found stochastic parameters that accurately model the relevant empirical distributions. Quantile-Quantile analysis revealed that a very small change in operational decision thresholds for the African database would compensate for the reduced entropy and generate the same performance in terms of resistance to False Matches. We conclude that despite demographic difference, individuality can be robustly discerned by comparison of iris patterns in this West African population.
Oluwatobi Noah Akande, Oluwadara Gbenle, Oluwakemi Christiana Abikoye, Rasheed Gbenga Jimoh, Hakeem Babalola Akande, Abdullateef O. Balogun, and Anuoluwapo Fatokun
Elsevier BV
Oluwakemi Christiana Abikoye, Esau Taiwo Oladipupo, Agbotiname Lucky Imoize, Joseph Bamidele Awotunde, Cheng-Chi Lee, and Chun-Ta Li
MDPI AG
The application of the Internet of Medical Things (IoMT) in medical systems has brought much ease in discharging healthcare services by medical practitioners. However, the security and privacy preservation of critical user data remain the reason the technology has not yet been fully maximized. Undoubtedly, a secure IoMT model that preserves individual users’ privacy will enhance the wide acceptability of IoMT technology. However, existing works that have attempted to solve these privacy and insecurity problems are not space-conservative, computationally intensive, and also vulnerable to security attacks. In this paper, an IoMT-based model that conserves the privacy of the data, is less computationally intensive, and is resistant to various cryptanalysis attacks is proposed. Specifically, an efficient privacy-preserving technique where an efficient searching algorithm through encrypted data was used and a hybrid cryptography algorithm that combines the modification of the Caesar cipher with the Elliptic Curve Diffie Hellman (ECDH) and Digital Signature Algorithm (DSA) were projected to achieve user data security and privacy preservation of the patient. Furthermore, the modified algorithm can secure messages during transmission, perform key exchanges between clients and healthcare centres, and guarantee user authentication by authorized healthcare centres. The proposed IoMT model, leveraging the hybrid cryptography algorithm, was analysed and compared against different security attacks. The analysis results revealed that the model is secure, preserves the privacy of critical user information, and shows robust resistance against different cryptanalysis attacks.
Esau Taiwo Oladipupo, Oluwakemi Christiana Abikoye, Agbotiname Lucky Imoize, Joseph Bamidele Awotunde, Ting-Yi Chang, Cheng-Chi Lee, and Dinh-Thuan Do
Institute of Electrical and Electronics Engineers (IEEE)
The need to ensure the longevity of Wireless Sensor Networks (WSNs) and secure their communication has spurred various researchers to come up with various WSN models. Prime among the methods for extending the life span of WSNs is the clustering of Wireless Sensors (WS), which reduces the workload of WS and thereby reduces its power consumption. However, a drastic reduction in the power consumption of the sensors when multicore sensors are used in combination with sensors clustering has not been well explored. Therefore, this work proposes a WSN model that employs clustering of multicore WS. The existing Elliptic Curve Cryptographic (ECC) algorithm is optimized for parallel execution of the encryption/decryption processes and security against primitive attacks. The Elliptic Curve Diffie-Helman (ECDH) was used for the key exchange algorithm, and the Elliptic Curve Digital Signature Algorithm (ECDSA) was used to authenticate the communicating nodes. Security analysis of the model and comparative performance analysis with the existing ones were demonstrated. The security analysis results reveal that the proposed model meets the security requirements and resists various security attacks. Additionally, the projected model is scalable, energy-conservative, and supports data freshness. The results of comparative performance analysis show that the proposed WSN model can efficiently leverage multiprocessors and/or many cores for quicker execution and conserves power usage.
Hakeem Babalola Akande, Oluwakemi Christiana Abikoye, Oluwatobi Noah Akande, and Rasheed Gbenga Jimoh
IEEE
Metaheuristic algorithms such as Ant Colony Optimization (ACO) algorithm and Bat Optimization Algorithm (BOA) have been widely employed in solving different optimization problems in several fields. ACO is modelled based on the social behaviour of ants that look for appropriate answers to a given optimization issue by recasting it as the case of locating the least expensive path on a weighted graph. A set of parameters linked to graph components (either nodes or edges) whose values are changed by the ants during runtime constitute the pheromone model, which biases the stochastic solution generation process. However, the effectiveness of ACO declines as the quantity of packets rises, making them ineffective for reducing traffic congestion. As more packets are transmitted, their strength decreases, causing packet congestion, rendering them useless for reducing packet traffic congestion. On the contrary, BOA which was modelled after the behavior of bats has also been employed in fixing network routing issues by listening to every sound in a space and taking note of what is going on around it. In order to further improve ACO algorithm and decrease packet traffic congestion, packet loss, and the time it takes a packet to reach its destination in a network system, this study employs the strength of BOA. Results obtained revealed the prowess of BOA in improving the performance of ACO for network packet routing.
Oluwatobi Noah Akande, Enemuo Stephen Nnaemeka, Oluwakemi Christiana Abikoye, Hakeem Babalola Akande, Abdullateef Balogun, and Joyce Ayoola
Springer Nature Singapore
Joseph Bamidele Awotunde, Rasheed Gbenga Jimoh, Roseline Oluwaseun Ogundokun, Sanjay Misra, and Oluwakemi Christiana Abikoye
Springer International Publishing
Akinbowale Nathaniel Babatunde, Christiana Oluwakemi Abikoye, Abdulkarim Ayopo Oloyede, Roseline Oluwaseun Ogundokun, Afeez Adeshina Oke, and Hafsat Omolola Olawuyi
Springer Science and Business Media LLC
Oluwakemi Christiana Abikoye and Roseline Oluwaseun Ogundokun
Institute of Advanced Engineering and Science
The development of the medical field had led to the transformation of communication from paper information into the digital form. Medical information security had become a great concern as the medical field is moving towards the digital world and hence patient information, disease diagnosis and so on are all being stored in the digital image. Therefore, to improve the medical information security, securing of patient information and the increasing requirements for communication to be transferred between patients, client, medical practitioners, and sponsors is essential to be secured. The core aim of this research is to make available a complete knowledge about the research trends on LSB Steganography Technique, which are applied to securing medical information such as text, image, audio, video and graphics and also discuss the efficiency of the LSB technique. The survey findings show that LSB steganography technique is efficient in securing medical information from intruder.
Kayode S. Adewole, Muiz O. Raheem, Oluwakemi C. Abikoye, Adeleke R. Ajiboye, Tinuke O. Oladele, Muhammed K. Jimoh, and Dayo R. Aremu
Springer International Publishing
Roseline Oluwaseun Ogundokun, Joseph Bamidele Awotunde, Sanjay Misra, Oluwakemi Christiana Abikoye, and Oluwafemi Folarin
Springer International Publishing
Oluwakemi Christiana Abikoye, Amos Orenyi Bajeh, Joseph Bamidele Awotunde, Ahmed Oloduowo Ameen, Hammed Adeleye Mojeed, Muyideen Abdulraheem, Idowu Dauda Oladipo, and Shakirat Aderonke Salihu
Springer International Publishing
Amos Orenyi Bajeh, Hammed Adeleye Mojeed, Ahmed Oloduowo Ameen, Oluwakemi Christiana Abikoye, Shakirat Aderonke Salihu, Muyideen Abdulraheem, Idowu Dauda Oladipo, and Joseph Bamidele Awotunde
Springer International Publishing
Roseline Oluwaseun Ogundokun and Oluwakemi Christiana Abikoye
Hindawi Limited
Safe conveyance of medical data across unsecured networks nowadays is an essential issue in telemedicine. With the exponential growth of multimedia technologies and connected networks, modern healthcare is a huge step ahead. Authentication of a diagnostic image obtained from a specialist at a remote location which is from the sender is one of the most challenging tasks in an automated healthcare setup. Intruders were found to be able to efficiently exploit securely transmitted messages from previous literature since the algorithms were not efficient enough leading to distortion of information. Therefore, this study proposed a modified least significant bit (LSB) technique capable of protecting and hiding medical data to solve the crucial authentication issue. The application was executed and established by utilizing MATLAB 2018a, and it used a logical bit shift operation for execution. The investigational outcomes established that the proposed technique can entrench medical information without leaving a perceptible falsification in the stego image. The result of this implementation shows that the modified LSB image steganography outperformed the standard LSB technique with a higher PSNR value and lower MSE value when compared with previous research works. The number of shifts was added as a new performance metric for the proposed system. The study concluded that the proposed secured medical information system was evidenced to be proficient in secreting medical information and creating undetectable stego images with slight entrenching falsifications when likened to other prevailing approaches.
Benjamin A. Gyunka, Oluwakemi C. Abikoye, and Adekeye S. Adekunle
Springer International Publishing
Oluwakemi Christiana Abikoye, Abdullahi Abubakar, Ahmed Haruna Dokoro, Oluwatobi Noah Akande, and Aderonke Anthonia Kayode
Springer Science and Business Media LLC
AbstractStructured Query Language (SQL) injection and cross-site scripting remain a major threat to data-driven web applications. Instances where hackers obtain unrestricted access to back-end database of web applications so as to steal, edit, and destroy confidential data are increasing. Therefore, measures must be put in place to curtail the growing threats of SQL injection and XSS attacks. This study presents a technique for detecting and preventing these threats using Knuth-Morris-Pratt (KMP) string matching algorithm. The algorithm was used to match user’s input string with the stored pattern of the injection string in order to detect any malicious code. The implementation was carried out using PHP scripting language and Apache XAMPP Server. The security level of the technique was measured using different test cases of SQL injection, cross-site scripting (XSS), and encoded injection attacks. Results obtained revealed that the proposed technique was able to successfully detect and prevent the attacks, log the attack entry in the database, block the system using its mac address, and also generate a warning message. Therefore, the proposed technique proved to be more effective in detecting and preventing SQL injection and XSS attacks
Oluwakemi Christiana Abikoye, Umar Abdulraheem Ojo, Joseph Bamidele Awotunde, and Roseline Oluwaseun Ogundokun
Springer Science and Business Media LLC
Amos Orenyi Bajeh, Oluwakemi Christiana Abikoye, Hammed Adeleye Mojeed, Shakirat Aderonke Salihu, Idowu Dauda Oladipo, Muyideen Abdulraheem, Joseph Bamidele Awotunde, Arun Kumar Sangaiah, and Kayode S. Adewole
Elsevier
Roseline Oluwaseun Ogundokun, Oluwakemi Christiana Abikoye, Sanjay Misra, and Joseph Bamidele Awotunde
Springer International Publishing
Oluwatobi Noah Akande, Oluwakemi Christiana Abikoye, Aderonke Anthonia Kayode, Oladele Taye Aro, and Oluwaseun Roseline Ogundokun
Springer International Publishing
Abikoye Oluwakemi Christianah, Benjamin Aruwa Gyunka, and Akande Noah Oluwatobi
International Association of Online Engineering (IAOE)
<p>Android operating system has become very popular, with the highest market share, amongst all other mobile operating systems due to its open source nature and users friendliness. This has brought about an uncontrolled rise in malicious applications targeting the Android platform. Emerging trends of Android malware are employing highly sophisticated detection and analysis avoidance techniques such that the traditional signature-based detection methods have become less potent in their ability to detect new and unknown malware. Alternative approaches, such as the Machine learning techniques have taken the lead for timely zero-day anomaly detections. The study aimed at developing an optimized Android malware detection model using ensemble learning technique. Random Forest, Support Vector Machine, and k-Nearest Neighbours were used to develop three distinct base models and their predictive results were further combined using Majority Vote combination function to produce an ensemble model. Reverse engineering procedure was employed to extract static features from large repository of malware samples and benign applications. WEKA 3.8.2 data mining suite was used to perform all the learning experiments. The results showed that Random Forest had a true positive rate of 97.9%, a false positive rate of 1.9% and was able to correctly classify instances with 98%, making it a strong base model. The ensemble model had a true positive rate of 98.1%, false positive rate of 1.8% and was able to correctly classify instances with 98.16%. The finding shows that, although the base learners had good detection results, the ensemble learner produced a better optimized detection model compared with the performances of those of the base learners.</p>
Oladipupo Esau Taiwo, Abikoye Oluwakemi Christianah, Akande Noah Oluwatobi, Kayode Anthonia Aderonke, and Adeniyi Jide kehinde
Elsevier BV
Oluwatobi Noah Akande, Oluwakemi Christiana Abikoye, Aderonke Anthonia Kayode, and Yema Lamari
Hindawi Limited
The feature extraction stage remains a major component of every biometric recognition system. In most instances, the eventual accuracy of a recognition system is dependent on the features extracted from the biometric trait and the feature extraction technique adopted. The widely adopted technique employs features extracted from healthy retinal images in training retina recognition system. However, literature has shown that certain eye diseases such as diabetic retinopathy (DR), hypertensive retinopathy, glaucoma, and cataract could alter the recognition accuracy of the retina recognition system. This connotes that a robust retina recognition system should be designed to accommodate healthy and diseased retinal images. A framework with two different approaches for retina image recognition is presented in this study. The first approach employed structural features for healthy retinal image recognition while the second employed vascular and lesion-based features for DR retinal image recognition. Any input retinal image was first examined for the presence of DR symptoms before the appropriate feature extraction technique was adopted. Recognition rates of 100% and 97.23% were achieved for the healthy and DR retinal images, respectively, and a false acceptance rate of 0.0444 and a false rejection rate of 0.0133 were also achieved.