Development of prototype at data security through secret messages is needed for disguising the messages sent in smartphone chatting application, WhatsApp (WA) Chat. We propose a model to disguise a plaintext message which is first encrypted by cryptosystem to change the plaintext message to ciphertext. Plaintext or plainimage entering the smartphone system is changed into encrypted text; receiver then can read the message by using similar key with the sender. The weakness of this proposal is the message random system is not planted directly in the chatting application; therefore message removing process from cryptosystem to WA application is still needed. The strength of using this model is the messages sent will not be easily re-encrypted by hacker and can be used at client computing section.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
SECURITY ANALYSIS ON PASSWORD AUTHENTICATION SYSTEM OF WEB PORTALcscpconf
Portal site is not only providing search engine and e-mail service but also various services including blog, news, shopping, and others. The fact that average number of daily login for Korean portal site Naver is reaching 300 million suggests that many people are using portal sites. One of the most famous social network service, Facebook subscribers to reach 1.2 billion 30 million people at the time of the February 2014. With the increase in number of users
followed by the diversity in types of services provided by portal sites and SNS, the attack is also increasing. Therefore, the objective of this study lies in analysing whole procedure of password authentication system of portal sites, SNS and analysing the security threat that may occur accordingly. Also, the security requirement corresponding to analysed security threat was extracted and the analysis on implementation of security requirements by portal sites and SNS
was conducted.
Keystroke with Data Leakage Detection for Secure Email AuthenticationYogeshIJTSRD
The user authentication is the important factor which allows the user to use a particular software. The user authentication is also performed in various kinds of social media such as Gmail, Facebook, etc. The traditional password system is used for user authentication. But this technique has a lot of demerits in it. Some hackers also cracks the password and perform some unwanted actions in the user authentication. In order to remove the difficulties in this traditional password technique and to provide additional security in user authentication, the keystroke with data leakage detection for secure email authentication is designed. This system uses Keystroke Dynamics. This system consists of five different types of modules such as Email Framework Construction, User Enrolment, Keystroke Authentication, Data Sharing and Data Leakage Detection. This system gets the details of the user such as name and email. Then it allows to enter the password. This password is stored along with the keystroke dynamics data such as the typing speed of the password and the threshold value. Both the Keystroke dynamics data and the original password are stored in the database. When the user wants to log into the system, the user has to give the password according to the keystroke dynamics data. Then only, the user can log into the system. Hence this system can also be used in Cyber security and provide security and privacy for the user data. Mrs. V. Hemalatha | V. Boominathan | K. Harithas | P. Raj Kumar | S. Vijaya Bharathi "Keystroke with Data Leakage Detection for Secure Email Authentication" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd39969.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/39969/keystroke-with-data-leakage-detection-for-secure-email-authentication/mrs-v-hemalatha
Location Sharing System Using GPS Technology for Minimizing SMS DeliveryIJERA Editor
Enhanced Privacy in Mobile Online Social Networks to providing the location information to the User /server in the
online location server. MOSNs, more and more users‘ location information will be collected by the service providers
in mOSN. The users‘ privacy, including location privacy and social network privacy can be improved using the User
Registration & encryption of the data stored into the server. It should aiming at achieving enhanced privacy against
the insider attack launched by the service providers in mOSNs, we introduce a new architecture with multiple location
servers for the first time and propose a secure solution supporting location sharing among friends and strangers in
location-based applications. In our construction, the user‘s friend set in each friend‘s query submitted to the location
servers is divided into multiple subsets by the social network server randomly. Location-based services (LBSs) are
one of the most important components in mOSNs, which provides information and entertainment service based on the
geographical position of the mobile device. The entity of users, with mobile devices, is able to communicate with
other users and share their locations. Online social network Server manages users‘ identity-related information such as
users‘ profiles and friend lists. Location server stores users‘ location information and provides LBSs according to the
requests sent from users. Here we are going to improve the user location privacy, social network privacy.
Residential access control system using QR code and the IoT IJECEIAES
This paper presents a residential access control system (RACs) using QR codes and the internet of things (IoT) to improve security and help house owners. The contribution of this paper is that it proposes two mechanisms in the authentication phase and the verification phase, respectively, to enhance residential access control. The main idea is using cryptography between smartphones and access control devices. The cryptography compares secret codes on the key server via the internet. The RACs can notify a user of the residential access status through the LINE application and show the statuses of devices through the network platform for the internet of everything (NETPIE) in real-time. We compare this system’s performance with that of the current access control methods in terms of security and access speed. The results show that this system has more security and has an access speed of 5.63 seconds. Moreover, this system is safer and more flexible than the comparative methods and suitable for contactless authentication.
Dual method cryptography image by two force secure and steganography secret m...TELKOMNIKA JOURNAL
With the go on the evolution of both computer and internet technology, videos, sounds, and scripts are used more and more often. It can be used in sundry techniques in ciphering and data concealing. The objective of this paper is leading to the suggestion of a new method of the combination between encryption and concealment of information so as to make it difficult to identify the transmitted datavia networks. This study has used two force secure (2FS) to encrypt the images, in other words, the SF is frequent twice on the image, to obtain powerful encryption then the concealing of the secret message is done inside the cryptography of the image has been performed using a secret key (cosine curve), and this stego-encryption image has been transformed forthe Internet of things storage in the database in IoT (data flow), when the user needs any information can be access inviaof internet of things (IoTs). The outcome of the proposed system is obtained tobe evaluated through different measures, such aspeak signal noise ratio (PSNR), mean square error (MSE), entropy,correlation coefficient, and histogram. The proposed system is good, efficient, fast, has high security, robustness, and transparency.
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...IJERA Editor
Public subscribe systems are more attracted academic and industrial interest in last few years, including certain
experiences of development and deployment. The primary requirements of security mechanisms such as
authentication and confidentiality in content based publish subscribe system. This system consists of various
types of brokers or agents where these brokers are organize their roles. These brokers are information or events
are published by publishers and this information is received by subscribers and it depends on their subscription.
Publisher and subscriber system is loosely coupled and asynchronous communication and this system is based on
distributed system. Broker play vital role in business development and obtain by question mark over the
trustworthiness of broker. The used of security coupled system for Brokerless is huge demand. In addition to our
previous work [1], this paper contributes 1) Owner key generation 2) Time based key generation 3)Two tier key
generation i.e. merging of owner key and time based key 4) Securely encryption techniques using reverse circle
cipher encryption 5) Key management 6 ) Event distribution
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
SECURITY ANALYSIS ON PASSWORD AUTHENTICATION SYSTEM OF WEB PORTALcscpconf
Portal site is not only providing search engine and e-mail service but also various services including blog, news, shopping, and others. The fact that average number of daily login for Korean portal site Naver is reaching 300 million suggests that many people are using portal sites. One of the most famous social network service, Facebook subscribers to reach 1.2 billion 30 million people at the time of the February 2014. With the increase in number of users
followed by the diversity in types of services provided by portal sites and SNS, the attack is also increasing. Therefore, the objective of this study lies in analysing whole procedure of password authentication system of portal sites, SNS and analysing the security threat that may occur accordingly. Also, the security requirement corresponding to analysed security threat was extracted and the analysis on implementation of security requirements by portal sites and SNS
was conducted.
Keystroke with Data Leakage Detection for Secure Email AuthenticationYogeshIJTSRD
The user authentication is the important factor which allows the user to use a particular software. The user authentication is also performed in various kinds of social media such as Gmail, Facebook, etc. The traditional password system is used for user authentication. But this technique has a lot of demerits in it. Some hackers also cracks the password and perform some unwanted actions in the user authentication. In order to remove the difficulties in this traditional password technique and to provide additional security in user authentication, the keystroke with data leakage detection for secure email authentication is designed. This system uses Keystroke Dynamics. This system consists of five different types of modules such as Email Framework Construction, User Enrolment, Keystroke Authentication, Data Sharing and Data Leakage Detection. This system gets the details of the user such as name and email. Then it allows to enter the password. This password is stored along with the keystroke dynamics data such as the typing speed of the password and the threshold value. Both the Keystroke dynamics data and the original password are stored in the database. When the user wants to log into the system, the user has to give the password according to the keystroke dynamics data. Then only, the user can log into the system. Hence this system can also be used in Cyber security and provide security and privacy for the user data. Mrs. V. Hemalatha | V. Boominathan | K. Harithas | P. Raj Kumar | S. Vijaya Bharathi "Keystroke with Data Leakage Detection for Secure Email Authentication" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd39969.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/39969/keystroke-with-data-leakage-detection-for-secure-email-authentication/mrs-v-hemalatha
Location Sharing System Using GPS Technology for Minimizing SMS DeliveryIJERA Editor
Enhanced Privacy in Mobile Online Social Networks to providing the location information to the User /server in the
online location server. MOSNs, more and more users‘ location information will be collected by the service providers
in mOSN. The users‘ privacy, including location privacy and social network privacy can be improved using the User
Registration & encryption of the data stored into the server. It should aiming at achieving enhanced privacy against
the insider attack launched by the service providers in mOSNs, we introduce a new architecture with multiple location
servers for the first time and propose a secure solution supporting location sharing among friends and strangers in
location-based applications. In our construction, the user‘s friend set in each friend‘s query submitted to the location
servers is divided into multiple subsets by the social network server randomly. Location-based services (LBSs) are
one of the most important components in mOSNs, which provides information and entertainment service based on the
geographical position of the mobile device. The entity of users, with mobile devices, is able to communicate with
other users and share their locations. Online social network Server manages users‘ identity-related information such as
users‘ profiles and friend lists. Location server stores users‘ location information and provides LBSs according to the
requests sent from users. Here we are going to improve the user location privacy, social network privacy.
Residential access control system using QR code and the IoT IJECEIAES
This paper presents a residential access control system (RACs) using QR codes and the internet of things (IoT) to improve security and help house owners. The contribution of this paper is that it proposes two mechanisms in the authentication phase and the verification phase, respectively, to enhance residential access control. The main idea is using cryptography between smartphones and access control devices. The cryptography compares secret codes on the key server via the internet. The RACs can notify a user of the residential access status through the LINE application and show the statuses of devices through the network platform for the internet of everything (NETPIE) in real-time. We compare this system’s performance with that of the current access control methods in terms of security and access speed. The results show that this system has more security and has an access speed of 5.63 seconds. Moreover, this system is safer and more flexible than the comparative methods and suitable for contactless authentication.
Dual method cryptography image by two force secure and steganography secret m...TELKOMNIKA JOURNAL
With the go on the evolution of both computer and internet technology, videos, sounds, and scripts are used more and more often. It can be used in sundry techniques in ciphering and data concealing. The objective of this paper is leading to the suggestion of a new method of the combination between encryption and concealment of information so as to make it difficult to identify the transmitted datavia networks. This study has used two force secure (2FS) to encrypt the images, in other words, the SF is frequent twice on the image, to obtain powerful encryption then the concealing of the secret message is done inside the cryptography of the image has been performed using a secret key (cosine curve), and this stego-encryption image has been transformed forthe Internet of things storage in the database in IoT (data flow), when the user needs any information can be access inviaof internet of things (IoTs). The outcome of the proposed system is obtained tobe evaluated through different measures, such aspeak signal noise ratio (PSNR), mean square error (MSE), entropy,correlation coefficient, and histogram. The proposed system is good, efficient, fast, has high security, robustness, and transparency.
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...IJERA Editor
Public subscribe systems are more attracted academic and industrial interest in last few years, including certain
experiences of development and deployment. The primary requirements of security mechanisms such as
authentication and confidentiality in content based publish subscribe system. This system consists of various
types of brokers or agents where these brokers are organize their roles. These brokers are information or events
are published by publishers and this information is received by subscribers and it depends on their subscription.
Publisher and subscriber system is loosely coupled and asynchronous communication and this system is based on
distributed system. Broker play vital role in business development and obtain by question mark over the
trustworthiness of broker. The used of security coupled system for Brokerless is huge demand. In addition to our
previous work [1], this paper contributes 1) Owner key generation 2) Time based key generation 3)Two tier key
generation i.e. merging of owner key and time based key 4) Securely encryption techniques using reverse circle
cipher encryption 5) Key management 6 ) Event distribution
Dear All, Future-tec technologies Pvt Ltd,
Offers IEEE & Non IEEE projects on all Platforms and Domains. We also support with your own titles.
Regards,
ASHA DAS.P.K
Mob:9566216611
www.future-tec.co.in
Old 52,New 62,Floor 3,Espee Complex
Brindavan Street,West Mambalam,Chennai 33
Information Leakage Prevention Using Public Key Encryption System and Fingerp...CSCJournals
The increase in the use of the internet around the world provided easier way of communication and information sharing that has led to the huge challenge of data leakage on the network. In an academic environment such as higher institutions of learning, the need to ensure that access to data and sensitive information are given to authorized users become imperative. However, this is not always the case as security bridges are often experienced. This study proposed a RSA public key encryption system and biometric fingerprint augmented with Apriori algorithm to prevent information leakages. The fingerprint verifies the identity of the owner of incoming message and the Apriori algorithm is used as the detection system instead of biometric that requires additional hardware for detecting fingerprint. This study developed a system based on the proposed algorithm. The developed system was tested on Federal Polytechnic, Ilaro local area network achieving a high level of security that prevents interception of valuable data by intruders or eavesdroppers. The system developed RSA public key encryption and fingerprint augmented with Apriori algorithm thus provided the required security mechanism that prevents information leakage in a public environment.
A NOVEL WAY OF PROVIDING CONFIDENTIALITY TO SHARED SECRET KEY AND AUTHENTICAT...cscpconf
If a secret key or a password is to be used in an application, where multi users are involved, then it
is better to share the key or the password to all the authorized users in such a way that a minimum
or all the shares of the users put together must result in the key or the password.
This method avoids the unauthorized access to the information by a single user with out the
knowledge of the other users.
So this can protect the important information and also protect the key by sharing. If the key is not
shared, then always there may be a threat of key being compromised intentionally or
unintentionally. If the key is shared among the authorized users, at the time of requirement to use the
information, few authorized users can use their shares to reconstruct the key and use it.
This avoids the drawbacks of the single user having the key. Also it is necessary to authenticate the
shares given by the users during reconstruction of the key. This facilitates the verification of the
modified shares or fake shares sent by the authorized or unauthorized users.
To achieve the confidentiality of the key we are using the threshold secret sharing method where the
key will be divided in to number of shares depending on the number of authorized users and
represent those shares in Braille format, and to provide authentication we are using SHA-1
algorithm. The key can be text data, image.
A Mobile Messaging Apps: Service Usage Classification to Internet Traffic and...dbpublications
The rapid adoption of mobile
messaging Apps has enabled us to collect massive
amount of encrypted Internet traffic of mobile
messaging. The classification of this traffic into
different types of in-App service usages can help for
intelligent network management, such as managing
network bandwidth budget and providing quality of
services. Traditional approaches for classification of
Internet traffic rely on packet inspection, such as
parsing HTTP headers. However, messaging Apps are
increasingly using secure protocols, such as HTTPS
and SSL, to transmit data. This imposes significant
challenges on the performances of service usage
classification by packet inspection. To this end, in this
paper, we investigate how to exploit encrypted Internet
traffic for classifying in-App usages. Specifically, we
develop a system, named CUMMA, for classifying
service usages of mobile messaging Apps by jointly
modeling user behavioral patterns, network traffic
characteristics, and temporal dependencies. Along this
line, we first segment Internet traffic from trafficflows
into sessions with a number of dialogs in a
hierarchical way. Also, we extract the discriminative
features of traffic data from two perspectives: (i)
packet length and (ii) time delay. Next, we teach a
service usage predictor to classify these segmented
dialogs into single-type usages or outliers. In addition,
we design a clustering Hidden Markov Model (HMM)
based method to detect mixed dialogs from outliers
and decompose mixed dialogs into sub-dialogs of
single-type usage. Indeed, CUMMA enables mobile
analysts to identify service usages and analyze enduser
in-App behaviors even for encrypted Internet
traffic.
Secure system based on recombined fingerprints for sharing multimedia files i...eSAT Journals
Abstract In this paper the execution time is less when compared to previous algorithm. And also it provide security between the merchant and buyer The traitor tracing protocol is used to detect the illegal transaction. Here we used fingerprinting solution to avoid illegal redistribution of multimedia contents. Here we convert the multimedia video file into image then encrypting the image after the encrypted image will be transferred from merchant to buyer. The buyer receives the copyright protection from merchant, he decrypts the image then converts it into video. After that, the copyright protection of file is transferred to child buyer. Then tracing traitor protocol is used to checks the fingerprints for merchant to buyer and buyer to child buyer. Traitor tracing protocol is used to detect the illegal transaction of the content. The Blowfish algorithm is used to encrypt and decrypt the multimedia files. Finally we detect the performance of our work based on efficiency, accuracy and we achieve security. Keywords: Fingerprint, Multimedia files, Blowfish algorithm, Merchant, Buyer, Child Buyer, Copyright Protection
Distributed Digital Artifacts on the Semantic WebEditor IJCATR
Distributed digital artifacts incorporate cryptographic hash values to URI called trusty URIs in a distributed environment
building good in quality, verifiable and unchangeable web resources to prevent the rising man in the middle attack. The greatest
challenge of a centralized system is that it gives users no possibility to check whether data have been modified and the communication
is limited to a single server. As a solution for this, is the distributed digital artifact system, where resources are distributed among
different domains to enable inter-domain communication. Due to the emerging developments in web, attacks have increased rapidly,
among which man in the middle attack (MIMA) is a serious issue, where user security is at its threat. This work tries to prevent MIMA
to an extent, by providing self reference and trusty URIs even when presented in a distributed environment. Any manipulation to the
data is efficiently identified and any further access to that data is blocked by informing user that the uniform location has been
changed. System uses self-reference to contain trusty URI for each resource, lineage algorithm for generating seed and SHA-512 hash
generation algorithm to ensure security. It is implemented on the semantic web, which is an extension to the world wide web, using
RDF (Resource Description Framework) to identify the resource. Hence the framework was developed to overcome existing
challenges by making the digital artifacts on the semantic web distributed to enable communication between different domains across
the network securely and thereby preventing MIMA.
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)IJERA Editor
Websites such as email providers use Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA) which is a simple test easily solved by humans but not by computers and hence provides a way of distinguishing a legitimate human user from an attacker. Methods have been developed like the Optical Character Recognition (OCR) and the third party human attack which have made CAPTCHAs vulnerable. The third party human attack poses a real threat to the use of CAPTCHA which can be easily shown using the Instant Messenger CAPTCHA Attack (IMCA). A new defense system, the interactive CAPTCHA (iCAPTCHA) was developed to defend against third party human solver attacks. The iCAPTCHA is solved via user interactions and the back-and-forth traffic between the client and server amplifies the statistical timing difference between a third party human attacker and a legitimate human user. The aim of this research is to use iCAPTCHA in Smartphones which will be solved after a certain number of password trials. However iCAPTCHA alone cannot provide sufficient security, therefore to further provide security, the iCAPTCHA will be encrypted using RSA and Elliptic Curve Cryptography.
Instant Messenger (IM) becomes one of the most popular applications in mobile technology and
communication. A lot of users around the world installed it for daily activities. Current IM found security
lacks both in authentication and encryption matters. Various IM growing today still not apply an efficient
method in authentication and encryption process, conventional security methods and client-server
architecture system have to risk too many users for attacking server such as compromising, cracking
password or PINs by Unauthorized people. Common IM services lack native encryption to protect
information being transmitted over the public network and still used high computation in the mobile
environment, this problem needs efficient security methods. Then, in public IM also found various
messages with fake users, it occurs because public IM carry out the separate system in authentication and
encryption process, strong authentication need to solve this issue in messenger environment. The
tremendous growth of mobile IM user needs efficient and secure communication way. This paper proposes
a new efficient method for securing message both in encryption and authentication within the end-to-end
model. In this research, security method proposes new algorithms based on Elliptic Curve (EC) works in
Peer to Peer (P2P) architecture than a conventional client-server model. The result shows this method
produces efficient time in authentication and encryption process while applying in a mobile environment.
Besides, it is compatible with the mobile phone which has a limitation of computation capabilities and
resources.
Seps aka a secure evolved packet system authentication and key agreement sch...csandit
In this paper, we propose a secure authentication of the Evolved Packet System Authentication
and Key Agreement (EPS-AKA) for the LTE-A network. Our scheme is proposed to solve the
problem of sending the IMSI as a clear text, and hence prevents the mobility management entity
attack. We will use public key (PK) cryptography to protect the transmitted messages, the RSA
scheme computation to compute a temporary value to the IMSI, and nonce to generate
challenge messages toward the opposite side. Our scheme does not need to change the original
framework and the infrastructure of the LTE-A network, although a ciphered IMSI is
transmitted. The authentication procedure is performed by the HSS to authenticate the UEs and
the MME; therefore, the impersonating of the MME and UEs is not possible. Our evaluation
demonstrates that the proposed scheme is secure and achieves the security requirements of the
LTE-A subscribers such as privacy, authentication, confidentiality and integrity. In our scheme,
we try to maintain the problems defined in the previous related works.
SEPS-AKA: A SECURE EVOLVED PACKET SYSTEM AUTHENTICATION AND KEY AGREEMENT SCH...cscpconf
In this paper, we propose a secure authentication of the Evolved Packet System Authentication and Key Agreement (EPS-AKA) for the LTE-A network. Our scheme is proposed to solve the
problem of sending the IMSI as a clear text, and hence prevents the mobility management entity attack. We will use public key (PK) cryptography to protect the transmitted messages, the RSA scheme computation to compute a temporary value to the IMSI, and nonce to generate challenge messages toward the opposite side. Our scheme does not need to change the original
framework and the infrastructure of the LTE-A network, although a ciphered IMSI is transmitted. The authentication procedure is performed by the HSS to authenticate the UEs and
the MME; therefore, the impersonating of the MME and UEs is not possible. Our evaluation demonstrates that the proposed scheme is secure and achieves the security requirements of the
LTE-A subscribers such as privacy, authentication, confidentiality and integrity. In our scheme, we try to maintain the problems defined in the previous related works.
Identity theft through keyloggers has become very popular the last years. One of the most common ways to intercept and steal victim's data are to use a keylogger that transfers data back to the attacker. Covert keyloggers exist either as hardware or software. In the former case they are introduced as devices that can be attached to a computer (e.g. USB sticks), while in the latter case they try to stay invisible and undetectable as a software in the operating system. Writing a static keylogger which operates locally in victim's machine is not very complex. In contrast, the creation of covert communication between the attacker and the victim, and still remain undetectable is more sophisticated. In such a scenario we have to define how data can be delivered to the attacker and how we can make an efficient use of the channel that transfers the information over the network in order to stay undetectable. In this paper we propose a system based on Steganography that takes advantage of a seemingly innocuous Social Network (Tumblr) in order to avoid direct communication between the victim and the attacker. A core part of this study is the security analysis which is also discussed by presenting experimental results of the system and describing issues regarding surveillance resistance of the system as well as limitations.
Dear All, Future-tec technologies Pvt Ltd,
Offers IEEE & Non IEEE projects on all Platforms and Domains. We also support with your own titles.
Regards,
ASHA DAS.P.K
Mob:9566216611
www.future-tec.co.in
Old 52,New 62,Floor 3,Espee Complex
Brindavan Street,West Mambalam,Chennai 33
Information Leakage Prevention Using Public Key Encryption System and Fingerp...CSCJournals
The increase in the use of the internet around the world provided easier way of communication and information sharing that has led to the huge challenge of data leakage on the network. In an academic environment such as higher institutions of learning, the need to ensure that access to data and sensitive information are given to authorized users become imperative. However, this is not always the case as security bridges are often experienced. This study proposed a RSA public key encryption system and biometric fingerprint augmented with Apriori algorithm to prevent information leakages. The fingerprint verifies the identity of the owner of incoming message and the Apriori algorithm is used as the detection system instead of biometric that requires additional hardware for detecting fingerprint. This study developed a system based on the proposed algorithm. The developed system was tested on Federal Polytechnic, Ilaro local area network achieving a high level of security that prevents interception of valuable data by intruders or eavesdroppers. The system developed RSA public key encryption and fingerprint augmented with Apriori algorithm thus provided the required security mechanism that prevents information leakage in a public environment.
A NOVEL WAY OF PROVIDING CONFIDENTIALITY TO SHARED SECRET KEY AND AUTHENTICAT...cscpconf
If a secret key or a password is to be used in an application, where multi users are involved, then it
is better to share the key or the password to all the authorized users in such a way that a minimum
or all the shares of the users put together must result in the key or the password.
This method avoids the unauthorized access to the information by a single user with out the
knowledge of the other users.
So this can protect the important information and also protect the key by sharing. If the key is not
shared, then always there may be a threat of key being compromised intentionally or
unintentionally. If the key is shared among the authorized users, at the time of requirement to use the
information, few authorized users can use their shares to reconstruct the key and use it.
This avoids the drawbacks of the single user having the key. Also it is necessary to authenticate the
shares given by the users during reconstruction of the key. This facilitates the verification of the
modified shares or fake shares sent by the authorized or unauthorized users.
To achieve the confidentiality of the key we are using the threshold secret sharing method where the
key will be divided in to number of shares depending on the number of authorized users and
represent those shares in Braille format, and to provide authentication we are using SHA-1
algorithm. The key can be text data, image.
A Mobile Messaging Apps: Service Usage Classification to Internet Traffic and...dbpublications
The rapid adoption of mobile
messaging Apps has enabled us to collect massive
amount of encrypted Internet traffic of mobile
messaging. The classification of this traffic into
different types of in-App service usages can help for
intelligent network management, such as managing
network bandwidth budget and providing quality of
services. Traditional approaches for classification of
Internet traffic rely on packet inspection, such as
parsing HTTP headers. However, messaging Apps are
increasingly using secure protocols, such as HTTPS
and SSL, to transmit data. This imposes significant
challenges on the performances of service usage
classification by packet inspection. To this end, in this
paper, we investigate how to exploit encrypted Internet
traffic for classifying in-App usages. Specifically, we
develop a system, named CUMMA, for classifying
service usages of mobile messaging Apps by jointly
modeling user behavioral patterns, network traffic
characteristics, and temporal dependencies. Along this
line, we first segment Internet traffic from trafficflows
into sessions with a number of dialogs in a
hierarchical way. Also, we extract the discriminative
features of traffic data from two perspectives: (i)
packet length and (ii) time delay. Next, we teach a
service usage predictor to classify these segmented
dialogs into single-type usages or outliers. In addition,
we design a clustering Hidden Markov Model (HMM)
based method to detect mixed dialogs from outliers
and decompose mixed dialogs into sub-dialogs of
single-type usage. Indeed, CUMMA enables mobile
analysts to identify service usages and analyze enduser
in-App behaviors even for encrypted Internet
traffic.
Secure system based on recombined fingerprints for sharing multimedia files i...eSAT Journals
Abstract In this paper the execution time is less when compared to previous algorithm. And also it provide security between the merchant and buyer The traitor tracing protocol is used to detect the illegal transaction. Here we used fingerprinting solution to avoid illegal redistribution of multimedia contents. Here we convert the multimedia video file into image then encrypting the image after the encrypted image will be transferred from merchant to buyer. The buyer receives the copyright protection from merchant, he decrypts the image then converts it into video. After that, the copyright protection of file is transferred to child buyer. Then tracing traitor protocol is used to checks the fingerprints for merchant to buyer and buyer to child buyer. Traitor tracing protocol is used to detect the illegal transaction of the content. The Blowfish algorithm is used to encrypt and decrypt the multimedia files. Finally we detect the performance of our work based on efficiency, accuracy and we achieve security. Keywords: Fingerprint, Multimedia files, Blowfish algorithm, Merchant, Buyer, Child Buyer, Copyright Protection
Distributed Digital Artifacts on the Semantic WebEditor IJCATR
Distributed digital artifacts incorporate cryptographic hash values to URI called trusty URIs in a distributed environment
building good in quality, verifiable and unchangeable web resources to prevent the rising man in the middle attack. The greatest
challenge of a centralized system is that it gives users no possibility to check whether data have been modified and the communication
is limited to a single server. As a solution for this, is the distributed digital artifact system, where resources are distributed among
different domains to enable inter-domain communication. Due to the emerging developments in web, attacks have increased rapidly,
among which man in the middle attack (MIMA) is a serious issue, where user security is at its threat. This work tries to prevent MIMA
to an extent, by providing self reference and trusty URIs even when presented in a distributed environment. Any manipulation to the
data is efficiently identified and any further access to that data is blocked by informing user that the uniform location has been
changed. System uses self-reference to contain trusty URI for each resource, lineage algorithm for generating seed and SHA-512 hash
generation algorithm to ensure security. It is implemented on the semantic web, which is an extension to the world wide web, using
RDF (Resource Description Framework) to identify the resource. Hence the framework was developed to overcome existing
challenges by making the digital artifacts on the semantic web distributed to enable communication between different domains across
the network securely and thereby preventing MIMA.
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)IJERA Editor
Websites such as email providers use Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA) which is a simple test easily solved by humans but not by computers and hence provides a way of distinguishing a legitimate human user from an attacker. Methods have been developed like the Optical Character Recognition (OCR) and the third party human attack which have made CAPTCHAs vulnerable. The third party human attack poses a real threat to the use of CAPTCHA which can be easily shown using the Instant Messenger CAPTCHA Attack (IMCA). A new defense system, the interactive CAPTCHA (iCAPTCHA) was developed to defend against third party human solver attacks. The iCAPTCHA is solved via user interactions and the back-and-forth traffic between the client and server amplifies the statistical timing difference between a third party human attacker and a legitimate human user. The aim of this research is to use iCAPTCHA in Smartphones which will be solved after a certain number of password trials. However iCAPTCHA alone cannot provide sufficient security, therefore to further provide security, the iCAPTCHA will be encrypted using RSA and Elliptic Curve Cryptography.
Instant Messenger (IM) becomes one of the most popular applications in mobile technology and
communication. A lot of users around the world installed it for daily activities. Current IM found security
lacks both in authentication and encryption matters. Various IM growing today still not apply an efficient
method in authentication and encryption process, conventional security methods and client-server
architecture system have to risk too many users for attacking server such as compromising, cracking
password or PINs by Unauthorized people. Common IM services lack native encryption to protect
information being transmitted over the public network and still used high computation in the mobile
environment, this problem needs efficient security methods. Then, in public IM also found various
messages with fake users, it occurs because public IM carry out the separate system in authentication and
encryption process, strong authentication need to solve this issue in messenger environment. The
tremendous growth of mobile IM user needs efficient and secure communication way. This paper proposes
a new efficient method for securing message both in encryption and authentication within the end-to-end
model. In this research, security method proposes new algorithms based on Elliptic Curve (EC) works in
Peer to Peer (P2P) architecture than a conventional client-server model. The result shows this method
produces efficient time in authentication and encryption process while applying in a mobile environment.
Besides, it is compatible with the mobile phone which has a limitation of computation capabilities and
resources.
Seps aka a secure evolved packet system authentication and key agreement sch...csandit
In this paper, we propose a secure authentication of the Evolved Packet System Authentication
and Key Agreement (EPS-AKA) for the LTE-A network. Our scheme is proposed to solve the
problem of sending the IMSI as a clear text, and hence prevents the mobility management entity
attack. We will use public key (PK) cryptography to protect the transmitted messages, the RSA
scheme computation to compute a temporary value to the IMSI, and nonce to generate
challenge messages toward the opposite side. Our scheme does not need to change the original
framework and the infrastructure of the LTE-A network, although a ciphered IMSI is
transmitted. The authentication procedure is performed by the HSS to authenticate the UEs and
the MME; therefore, the impersonating of the MME and UEs is not possible. Our evaluation
demonstrates that the proposed scheme is secure and achieves the security requirements of the
LTE-A subscribers such as privacy, authentication, confidentiality and integrity. In our scheme,
we try to maintain the problems defined in the previous related works.
SEPS-AKA: A SECURE EVOLVED PACKET SYSTEM AUTHENTICATION AND KEY AGREEMENT SCH...cscpconf
In this paper, we propose a secure authentication of the Evolved Packet System Authentication and Key Agreement (EPS-AKA) for the LTE-A network. Our scheme is proposed to solve the
problem of sending the IMSI as a clear text, and hence prevents the mobility management entity attack. We will use public key (PK) cryptography to protect the transmitted messages, the RSA scheme computation to compute a temporary value to the IMSI, and nonce to generate challenge messages toward the opposite side. Our scheme does not need to change the original
framework and the infrastructure of the LTE-A network, although a ciphered IMSI is transmitted. The authentication procedure is performed by the HSS to authenticate the UEs and
the MME; therefore, the impersonating of the MME and UEs is not possible. Our evaluation demonstrates that the proposed scheme is secure and achieves the security requirements of the
LTE-A subscribers such as privacy, authentication, confidentiality and integrity. In our scheme, we try to maintain the problems defined in the previous related works.
Identity theft through keyloggers has become very popular the last years. One of the most common ways to intercept and steal victim's data are to use a keylogger that transfers data back to the attacker. Covert keyloggers exist either as hardware or software. In the former case they are introduced as devices that can be attached to a computer (e.g. USB sticks), while in the latter case they try to stay invisible and undetectable as a software in the operating system. Writing a static keylogger which operates locally in victim's machine is not very complex. In contrast, the creation of covert communication between the attacker and the victim, and still remain undetectable is more sophisticated. In such a scenario we have to define how data can be delivered to the attacker and how we can make an efficient use of the channel that transfers the information over the network in order to stay undetectable. In this paper we propose a system based on Steganography that takes advantage of a seemingly innocuous Social Network (Tumblr) in order to avoid direct communication between the victim and the attacker. A core part of this study is the security analysis which is also discussed by presenting experimental results of the system and describing issues regarding surveillance resistance of the system as well as limitations.
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmEditor IJMTER
As per the recent studies, the volatile growth has been seen in the use of mobile devices as
the supporting technology for accessing Internet based services, as well as for personal
communication needs in networking. Various studies indicate that it is impossible to utilize strong
cryptographic functions for implementing security protocols on mobile devices. Our research negates
this. Explicitly, a performance analysis focused on the most commonly used cryptographic protocols
based on the location address (latitude & longitude) of the user for mobile applications and projected
provably secure authentication protocol that is more efficient than any of the prevailing
authentication protocol is being used by the network security methods. Understanding the use of
public key cryptography which makes potential use of discrete logarithms problem. The security of
ECC depends on the difficulty of Elliptic Curve Discrete Logarithm. To provide secure
communication for mobile devices, authenticated protocol is an important primitive for establishing
trusted connection. In this paper, it has been shown that the location based system using improved
Rabin Algorithm provides a better security and acquires much less energy consumption than the
existing authentication protocols.
Cryptography System for Online Communication Using Polyalphabetic Substitutio...Eswar Publications
Online communication is one of the common means of communication in this era of globe village. As the number of people being connected to online communication system through their mobile phone, computer or any other e-communication tools increases, there is need to secure the communication networks from adversaries (third parties) between the sender and receivers. There are many aspects to security approach in online communication environment. One essential aspect for secure communications is that of cryptography, which is the focus of this research. This research work aims at designing and implementing cryptosystem using a simple polyalphabetic cipher algorithm. The algorithm was coded with Java programming language. It was discovered that cryptography system with polyalphabetic cipher algorithm is better compared to Atbash cipher, Scytale cipher, Ceasar cipher etc, because it is very difficult for adversaries to decrypt an encrypted data without the key.
DNA computing based stream cipher for internet of things using MQTT protocol IJECEIAES
Internet of Things (IoT) is a rapidly developing technology that enables “devices” to communicate and share information amongst them without human control. The devices have the features of internet connectivity and networking. Due to the increasing demands of a secure environment in IoT application, security has become a crucial aspect on which researchers have been increasingly focused. Connecting devices to the internet can facilitate intruders to attack devices as they can access the data from anywhere in the globe. In this work, an encryption–decryption process-based stream cipher has been used. The messages between IoT nodes were encrypted using One Time Pad (OTP) and DNA computing. Furthermore, the required key sequence was generated using a linear feedback shift register (LFSR) as a pseudo number key generator. This key sequence was combined to generate a unique key for each message. The algorithm was implemented using source python and tested on a Raspberry pi under Linux open operation system.
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORKijmnct
Nowadays security is an evident matter in designing networks and much research has been done in this
field. The main purpose of the research is to provide an appropriate instruction for data transmission in a
reliable platform. One of the instructions of transferring information is to use public networks like internet.
The main purpose of the present paper is to introduce that enables the users to enter to a new security level.
In this paper, VPN as one of the different instructions for establishing the security proposed to be
examined. In this type, tunneling method of internet protocol security (IPsec) is used. Furthermore, the
advanced method of scanning fingerprint is applied to establish authentication and Diffie-Hellman
algorithm for coding and decoding data, of course with conversion in this algorithm.
Authentication and password storing improvement using SXR algorithm with a ha...IJECEIAES
Secure password storing is essential in systems working based on password authentication. In this paper, SXR algorithm (Split, Exclusive OR, and Replace) was proposed to improve secure password storing and could also be applied to current authentication systems. SXR algorithm consisted of four steps. First, the received password from users was hashed through a general hash function. Second, the ratio and the number of iterations from the secret key (username and password) were calculated. Third, the hashed password and ratio were computed, and the hashed password was divided based on the ratio (Split) into two values. Both the values were applied to XOR equation according to the number of iterations, resulting in two new values. Last, the obtained values were concatenated and stored in the database (Replace). On evaluating, complexity analyses and comparisons has shown that SXR algorithm could provide attack resistance with a stronger hashed password against the aforementioned attacks. Consequently, even if the hackers hacked the hashed password, it would be challenging and would consume more time to decrypt the actual one, because the pattern of the stored password is the same as the one that has been hashed through the general hash function.
A comprehensive study of distributed Denial-of-Service attack with the detect...IJECEIAES
With the dramatic evolution in networks nowadays, an equivalent growth of challenges has been depicted toward implementing and deployment of such networks. One of the serious challenges is the security where wide range of attacks would threat these networks. Denial-of-Service (DoS) is one of the common attacks that targets several types of networks in which a huge amount of information is being flooded into a specific server for the purpose of turning of such server. Many research studies have examined the simulation of networks in order to observe the behavior of DoS. However, the variety of its types hinders the process of configuring the DoS attacks. In particular, the Distributed DoS (DDoS) is considered to be the most challenging threat to various networks. Hence, this paper aims to accommodate a comprehensive simulation in order to figure out and detect DDoS attacks. Using the well-known simulator technique of NS-2, the experiments showed that different types of DDoS have been characterized, examined and detected. This implies the efficacy of the comprehensive simulation proposed by this study.
Secure and efficient handover authentication and detection of spoofing attackeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
An authenticated key management scheme for securing big data environmentIJECEIAES
If data security issues in a big data environment are considered, then the distribution of keys, their management, and the ability to transfer them between server users in a public channel will be one of the most critical issues that must consider on. In which the importance of keys management may outweigh the importance of the encryption algorithm strength. Therefore, this paper raised a new proposed scheme called authenticated key management scheme (AKMS) that works through two levels of security. First, to concerns how the user communicates with the server with preventing any attempt to penetrate senders/receivers. Second, to make the data sent vague by encrypting it, and unreadable by others except for the concerned receiver, thus the server function be limited only as a passageway for communication between the sender and receiver. In the presented work some concepts discussed related to analysis and evaluation as keys security, data security, public channel transmission, and security isolation inquiry which demonstrated the rich value that AKMS scheme carried. As well, AKMS scheme achieved very satisfactory results about computation cost, communication cost, and storage overhead which proved that AKMS scheme is appropriate, secure, and practical to use and protect the user's private data in big data environments.
A Self –Destructing Secure Messaging System Using Multi Key Management Schemeijiert bestjournal
We propose the Pandora Messaging, an enhanced secure instant messaging architecture which is
equipped with a self-message-destructing feature for sensitive personal information applications
in a mobile environment along with Multi Key Security Management using Shamirs algorithm.
The proposed system will be beneficial for Government officers for communicating very
sensitive and confidential messages. We design the Pandora Message Encryption and Exchange
Scheme and the format of a self-destructible message to show how to exchange these messages
atop the existing instant messaging service architecture. The Pandora Messaging-based system
enables senders to set time, frequency, and location constraints. These conditions determine
when the transmitted messages should be destructed and thus become unreadable for receivers.
The Pandora Messaging-based system securely sends self destructible messages to receivers in a
way that it uses ephemeral keys to encrypt the messages and transmits the encrypted messages to
the designated receiver‟s instant messaging service in real time. When the transmitted messages‟
constraints are satisfied, the ephemeral key used for encryption will be deleted .Thus, the
encrypted messages become unrecoverable. The most important part is that the Key are managed
by the system. The system generates a pool of key and any group of the same pool can be used to
encrypt and decrypt the message.
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
2. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 5, October 2018 : 3843 – 3851
3844
on need and encryption method they know, so the message sent and received will be limited by encrypted
text personally [12].
Chatting model done individually or in the group does not have any security guarantee to the
receiver, yet the plaintext sent through operator server is fragile of hacker attack [10], [11]. Plaintext and
plainimage saved in the operator server can be a weakness of the application users who feel secure but in fact
there are many hacker attacks achieving textual information saved in the server [13]-[15], so an additional
network control software is needed [16].
The steps of sending message through mobile is based on message demand and authentication from
mobile A to mobile B [8]. This technique can use secret sharing technique using mobile SMS confirmation
method as shown in Figure 1. Model shown in Figure 1 is less effective to be applied in smartphone
application system because the message sent through smartphone is a long text, images and multi-participant.
The example of multi-participant text sending in a chat room is shown by Figure 2.
Figure 1. The authentication flowchart [8] Figure 2. Abstracted chat client user interface, including
examples of user, system, and action messages [5]
Figure 2 shows a chatting process in a group in a textual application. This plaintext is likely
dangerous to be attacked by outsider trying to achieve those information through smartphone. In WA is
already using end-to-end encryption, but we need to provide additional system outside the WA system, so
users feel confident that the messages sent are not be tapped by the attackers. Next, our research focuses on
how to disguise messages sent through chatting application in smartphone system used by many users
nowadays. The plaintext sent will be encrypted, thus the text saved in the operator server will not be easily
re-encrypted by the attackers. The text saved can be textual [17] or images [18]. Development of a model of
secret messages through WA voice as in the crypt analysis of two pads in case of compressed speech [19].
2. RELATED WORK
In the development of the proposed model there are several related studies directly or indirectly, so
some prior research is needed to produce a prototype suitable for the security needs of the next secret
message. In [20] developing message authentication with a correlated setup for sending messages as done by
Bob and Alice. Meanwhile, [21] analyzed the recently-proposed block cipher using cellular automata (CA)
and the self-invertible function. This paper performs insecurity analysis of the cipher, because of its
conjugate nature.
The results of this study also build the decryption process without knowledge of the secret key so it
needs to be fixed. In [8] developing a secret-key cipher based on a non-linear structured code with the
distinguishing feature that its error generator is implemented by a non-linear combination of code words of
two linear complementary codes. In [2] developing a practical reputation system for pervasive social chatting
with Mobile Ad Hoc Network (MANET) on smartphone. In this study [22], a general attack scenario was
given in order to conduct security analyses of chaos based crypto systems with proposed cryptanalysis of a
new images so it can be used in the MANET.
In the proposed algorithm, the secret key detected between sender and receiver was used in the
calculation of system parameters of chaotic map group. In [1] perform a social graph based text mining
framework for chat log investigation for presents a unified social graph based text mining framework.
Further, it needs to be made for secure group-based mobile chat protocol [23]. For example, huge mobile
3. Int J Elec & Comp Eng ISSN: 2088-8708
The Proposed Development of Prototype with Secret Messages Model in Whatsapp … (Hamdani Hamdani)
3845
applications (M-APPs) created for the mobile communication services which are not only for voice services,
but also for social networking services. Meanwhile, [24] worked on for visual cryptography can do
unscrambled by Human Visual System (HVS).
The effect of coaching and feedback on online chats in this case also found in the study [25].
Coaching occurred before each chat, and feedback was provided immediately afterwards. The findings
suggest that over time, the frequency of higher-order thinking will increase more in a group that receives
coaching and feedback than in a group that does not receive coaching and feedback. In addition, the findings
suggest that the Community of Inquiry framework has benefits beyond its use in course design, facilitation,
and assessment to include serving as a guide to coaching [25]. New steganography algorithm to conceal a
large amount of secret message using hybrid adaptive neural networks with modified adaptive genetic
algorithm [26]. Meanwhile, a high capacity text steganography scheme based on LZW compression and color
coding [27].
The steganographic system thus embeds secret content in cover media (like text, image, audio, and
video) so that its existence is not detected to an eavesdropper. Impostor Detection Through Chat Analysis
also done by [3] for verify the identity of the person on the basis of his writing style. In this case we also need
a model that can integrate the system in sending text. Some other research results such as in [14] and [23].
In [28] an encryption algorithm with an error detection technique and technique has been
successfully verified and synthesized using Xilinx by Spartan-3E FPGA. [14] present a scheme which allows
an arbitrary 2-qubit quantum state teleportation between two remote parties with control of many agents in a
network, while on [23] using Mobile Chat (MC) and Mobile Chat System (MCS) for services plays a very
important role in current social networking. Thus, both the Secure End-to-End Secure Mobile Chat (SE2E-
MC) scheme and Secure Group-based Mobile Chat (SG-MC) scheme are provided the suitable solutions. The
design and implementation of secure chatting application with end to end encryption [29] and combining
steganography and cryptography on android platform to achive a high-level security [30].
3. PROPOSED METHOD
Data security model is needed to encrypt client message before sending through the provider
service, thus the message has been encrypted when it is received by the server. Plaintext and plainimage sent
to the other users will not be easily read with application such as WA before decrypted to plaintext. In this
method, we prepare some material consisting of cryptography model such as vigenere cipher and
transposition to encrypt the message sent and to smartphone as sender and receiver.
In this case, we try to do encryption by using vigenere model, transposition and web service for
testing whether the messages we sent can be encrypted in the smartphone system. Meanwhile, we use web
service for integrating data from client in the smartphone so that the message written in the client application
can be accepted by WA chat system. This method is proposed to secure textual message and images sent
through chatting system hence the users of chatting application feel more secured. The steps of proposed
model in developing prototype with secret message model as shown in Figure 3 we are working on is used
for message sending process written by sender and then received by others.
Figure 3. Proposed method of chat messages security in (a) private area to (b) public area
4. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 5, October 2018 : 3843 – 3851
3846
In Figure 3 we can see the process in (a) private area and (b) public area in a proposed method
consisting of sender (1) as the secret message sender. Sender (1) fill in the textual data or images as plaintext
which is then encrypted before sending so that the message sent to the smartphone is in the form of
ciphertext. The message is then sent to the providers (2) plaintext as the origin, (3) step for message
encryption process (MEP) then sent to the chatting system in the smart phone (4) receive encrypted message
to send to receivers through providers. (5) ISP only receive message than cannot be read the originality and
then sent to the receivers as the destination (6).
The receiver (6) of encrypted message then input the encrypted message into cryptosystem in the
smartphone to be encrypted (7) by message decryption process (MDP) based on private key of the sender
key, thus the origin text as the plaintext (8) will be returned in the receiver system (9). Receiver (9) receives
the message in the form of ciphertext which is next will be decrypted to see the original message. It can be
seen that the message sent from the sender to the receiver through provider is a cryptography method
encrypted message. In the proposed method we are working on, there are some methods in building prototype
of secret message in chatting. They are:
3.1. Message encryption and decryption with vigenere cipher model
Vigenere Cipher is a polyalphabetic substitution cipher algorithm. It means, for every similar letter
in a plaintext is not substituted by a letter but another letter based on the key used to encrypt. Vigenere
Cipher is the simple form of polyalphabetic substitution code [31]. Vigenere Cipher is very well-known
because it is very easy to understand and implement [32]. Vigenere Cipher can be seen on Figure 4.
Figure 4. Vigenere cipher square method [32]
To perform Vigenere cipher encryption, draw a downward vertical line from the plaintext in the
vigenere square. Then draw an across line from the key letter to the right. The letter at the intersection shows
the ciphertext letter with addition [31]. Mathematically, the encryption process is expressed as follow (1):
𝐶𝑖 = (𝑃𝑖 + 𝐾𝑟) 𝑚𝑜𝑑 26 𝐶 (1)
Decryption is done oppositely by drawing across line from key letter to the chipertext letter, then
draw a vertical line from ciphertext letter to the plaintext letter with subtraction [31]. The decryption process
can be written mathematically as follow (2):
𝐶𝑖 = (𝑃𝑖 − 𝐾𝑟) 𝑚𝑜𝑑 26 𝐶 (2)
where,
𝐶𝑖 = ciphertext (encryption text)
𝑃𝑖 = plaintext
𝐾𝑟 = key
5. Int J Elec & Comp Eng ISSN: 2088-8708
The Proposed Development of Prototype with Secret Messages Model in Whatsapp … (Hamdani Hamdani)
3847
3.2. Message encryption and decryption with transposition model
Transposition model is basically making ciphertext by changing plaintext object-object position
without shifting the plaintext object, thus in this technique another character is not needed [33]. Reading the
matrix value column by column based on the key used is done to get the ciphertext by using this transposition
technique [34]. Chiper example of character transposition technique from “Universitas Mulawarman
Samarinda” plaintext and using of frame 9x4 is shown by Figure 5.
(a) (b)
Figure 5. (a) Transposition model and (b) example of frame with 9x4
Plaintext is arranged to the right then downward by “4 3 1 5 2 6” key, so the cipher result will follow
the key downward as “ITANI ESAAD NILAR USUMA VAWSN RMRMA”. Encryption for data disguising
by using key is known as encryption process. The key used is alphanumerical (a-z, A-Z, 0-9). Figure 6 shows
the encryption and decryption process as shown in Figure 7 at frame 9x4 pixel.
(a) (b)
Figure 6. Process of vertical in frame (a) horizontal encryption (b) horizontal decryption
(a) (b)
Figure 7. Process of vertical in frame (a) vertical encryption and (b) vertical decryption
6. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 5, October 2018 : 3843 – 3851
3848
Figure 6 shows a process of encryption and decryption horizontally, meanwhile Figure 7 shows the
process vertically. This model is used to jumble the number of pixel in the images so it cannot be easily
recognized when it is encrypted and can be recognized when it is decrypted.
3.3. Integration with web service model
In this step we carry out data integration by using web service to achieve secret message through
sender and receiver in which architecture is oriented in doing service producing different solution in business
logic with various application [15].Web service technology combines the message sent through WhatsApp
(WA) web to be disguised. The model of architecture in the web service is shown in Figure 8:
Web Services
SOAP UDDI WSDL
XML and XML Related Standards
HTTP SMTP FTP
Internet Protocols
Figure 8. Web services building blocks [15]
3.4. Autentification model
An authentication system with a correlated setup is a pair of algorithms (MAC, VER) for a source
space Ѕ, a message space M and a distribution 𝑃𝑥𝑦𝑧
𝑛
over 𝑋 𝑛
× 𝑌 𝑛
× 𝑍 𝑛
, specified as follows [20].
a. Setup (1 𝑛
). Initially, 𝐶 is taken from 𝑋 𝑛
× 𝑌 𝑛
× 𝑍 𝑛
according to 𝑃𝑥𝑦𝑧
𝑛
Alice receives 𝑋 𝑛
, Bob receives
𝑌 𝑛
and Oscar receives 𝑍 𝑛
.
b. Authentication MAC(𝑋 𝑛
, Ѕ). Upon S ∈ S, Alice uses her secret key 𝑋 𝑛
to run algorithm MAC to generate a
message M= MAC (𝑋 𝑛
, S).
c. Verification VER(𝑌 𝑛
, M). Upon M ∈ M, Bob uses his secret key 𝑌 𝑛
to run algorithm VER to compute
𝑆−
=VER(Yn, M) ∈ S ∪{⊥}, where 𝑆−
=⊥ means that Bob accepts 𝑆−
as an authenticated source state
while 𝑆−
=⊥ means a reject.
3.5. Security model
An authentication system (MAC, VER) with a correlated setup for source space S. distribution 𝑃𝑥𝑦𝑧
𝑛
𝑋 𝑛
× 𝑌 𝑛
× 𝑍 𝑛
is t-order secure if the following holds. If user attack doesn’t attack, then Pr(𝑆−
=S|S=S) is
𝑋 𝑛
× 𝑌 𝑛
× 𝑍 𝑛
is t-order secure if the following holds [20].
a. Authentication attack has only a negligible success probability in nin the following attack:
b. After seeing messages M1, ···, M (≤t) from sender to receiver, attacker constructs a new message M∗such
that VER (Yn, M∗) is distinct from ⊥, S1, ···, S, where Siis the source state in 𝑀𝑖.
4. RESULTS AND DISCUSSION
4.1. Implementation result
We recognize that the WA system already has end to end encryption. However, we need to propose
other systems outside the system to give the WA users more confidence in the messages they send. Our
research focuses on encrypting and decrypting text and images in the secret message through chatting to be
applied in WA application and has successfully tested in android system application, thus the text will be first
encrypted before sending to the WA application. The implementation of the secret message is shown in
Figure 9.
Figure 9 shows our test results for sending secret messages into private and group chats. The result
of encryption process of sentence THIS PLAINTEXT is done by using key sony sonysonys, i.e. Text for T is
encrypted to key S and so on, as the result the step of encryption can be seen as follows:
7. Int J Elec & Comp Eng ISSN: 2088-8708
The Proposed Development of Prototype with Secret Messages Model in Whatsapp … (Hamdani Hamdani)
3849
(T + S) mod 26 = (19 + 18) mod 26 = 11 = L (applied to all text)
This step is applied to all letters in encryption. Ciphertext is resulted as follows:
Plaintext : THIS PLAINTEXT
Key : sony sonysonys
Ciphertext : LVVQ HZNGFHRVL
To find plaintext result in decryption, this step is applied:
(L - S) mod 26 = (11 - 18) mod 26 = 19 = T (applied to all text)
The result of message decryption can be seen as follows:
Ciphertext : LVVQ HZNGFHRVL
Key : sony sonysonys
Plaintext : THIS PLAINTEXT
Encryption SendDecryption Receiver
THIS PLAINTEXT
Private chat
Group chat
(a) (b) (c)
Figure 9. (a) Implementation of plain text and picture to WhatsApp in (b) private and (c) group secret chat
4.2. Discussion result
There are some weaknesses we need to improve in the model we are working on. For instance, how
to not separate secret message system and WA so that the model developed does not need to carry out two
steps of the process; message sent encryption and message received decryption in the system and sending a
message to the WA system. We assume it is more practical and safe to have the model separately with the
WA so that users do not need to encrypt the message they do not intend to if it does not require a secret thing.
5. CONCLUSION
The model developed has produced a new prototype in chatting application to add secret message as
text security. The model can be used by users of the application in their smartphone. As the result, users will
be more secure in using social chatting application than before. In the next research, we are trying to integrate
the prototype into social chatting application in web so that the model can be used immediately and
embedded in WA system.
REFERENCES
[1] T. Anwar and M. Abulaish, “A Social Graph based Text Mining Framework for Chat Log Investigation”, Digit.
Investig., vol. 11, no. 4, pp. 349-362, Dec. 2014.
[2] Z. Yan, et al., “A Practical Reputation System for Pervasive Social Chatting”, J. Comput. Syst. Sci., vol. 79, no. 5,
pp. 556-572, Aug. 2013.
[3] S. Shrivastava and P. Singh, “Impostor Detection through Chat Analysis”, Procedia Comput. Sci., vol. 89,
pp. 540-548, 2016.
8. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 5, October 2018 : 3843 – 3851
3850
[4] F. A. B. H. Ali and S. M. Aydah, “Development of Prototype Chat System Using Mobile Platform for Disable
People”, Procedia - Soc. Behav. Sci., vol. 57, pp. 33-39, Oct. 2012.
[5] D. C. Uthus and D. W. Aha, “Multiparticipant Chat Analysis: A Survey”, Artif. Intell., vol. 199-200, pp. 106-121,
June 2013.
[6] E. Hatfield and R. L. Rapson, “From Pen Pals to Chat Rooms: The Impact of Social Media on Middle Eastern
Society”, Springerplus, vol. 4, p. 254, January 2015.
[7] T. Sutikno, et al., “WhatsApp , Viber and Telegram : Which is the Best for Instant Messaging ?,” Int. J. Electr.
Comput. Eng., vol. 6, no. 3, pp. 909-914, 2016.
[8] V. C. da Rocha and D. L. de Macedo, “A Secret-Key Cipher based on a Non-Linear Structured Code”, Comput.
Commun., vol. 22, pp. 758-761, 1999.
[9] M. Caboara, et al., “Lattice Polly Cracker cryptosystems”, J. Symb. Comput., vol. 46, no. 5, pp. 534-549,
May 2011.
[10] B. Purnama and a. H. H. Rohayani, “A New Modified Caesar Cipher Cryptography Method with LegibleCiphertext
From a Message to Be Encrypted”, Procedia Comput. Sci., vol. 59, no. Iccsci, pp. 195-204, 2015.
[11] A. M. Youssef, “Cryptanalysis of a Quadratic Knapsack cryptosystem", Comput. Math. with Appl., vol. 61, no. 4,
pp. 1261-1265, Feb. 2011.
[12] S. Oukili and S. Bri, “High Throughput FPGA Implementation of Data Encryption Standard with Time Variable
Sub-Keys”, Int. J. Electr. Comput. Eng., vol. 6, no. 1, pp. 298-306, 2016.
[13] X. Sun, “A Scheme of Concealment and Transmission of Secret Information in Text Files”, Phys. Procedia,
vol. 25, pp. 1365-1368, 2012.
[14] Z. Zhang, “Controlled Teleportation of an Arbitrary n-qubit Quantum Information using Quantum Secret Sharing
of Classical Message”, Phys. Lett. A, vol. 352, no. 1-2, pp. 55-58, Mar. 2006.
[15] E. Moradian, “Integrating Web Services and Intelligent Agents in Supply Chain for Securing Sensitive Messages”,
in International Conference on Knowledge-Based and Intelligent Information and Engineering Systems,
pp. 771-778, 2008.
[16] I. Alsmadi and D. Xu, “Security of Software Defined Networks: A Survey”, Comput. Secur., vol. 53, pp. 79-108,
September 2015.
[17] L. D. Singh and K. M. Singh, “Implementation of Text Encryption using Elliptic Curve Cryptography”, Procedia
Comput. Sci., vol. 54, no. 1, pp. 73-82, 2015.
[18] J. Zarepour-Ahmadabadi, et al., “An Adaptive Secret Image sharing with a new Bitwise Steganographic Property”,
Inf. Sci. (Ny)., vol. 369, pp. 467-480, November 2016.
[19] L. A. Khan, et al., “Crypt Analysis of Two Time Pads in Case of Compressed Speech”, Comput. Electr. Eng.,
vol. 37, no. 4, pp. 559-569, July 2011.
[20] S. Jiang, “On message authentication with a correlated setup”, Inf. Process. Lett., vol. 116, no. 4, pp. 289-293,
April 2016.
[21] J. Sung, et al., “Cryptanalysis of an Involutional Block Cipher using Cellular Automata”, Inf. Process. Lett.,
vol. 104, no. 5, pp. 183-185, Nov. 2007.
[22] F. Özkaynak and A. B. Özer, “Cryptanalysis of a new Image Encryption Algorithm based on Chaos”, Opt. - Int. J.
Light Electron Opt., vol. 127, no. 13, pp. 5190-5192, July 2016.
[23] H.-C. Chen, et al., “A Secure group-based Mobile Chat Protocol”, J. Ambient Intell. Humaniz. Comput., vol. 7,
no. 5, pp. 693-703, Maret 2016.
[24] A. V. Dahat and P. V. Chavan, “Secret Sharing based Visual Cryptography Scheme Using CMY Color Space”,
Procedia Comput. Sci., vol. 78, pp. 563-570, 2016.
[25] D. S. Stein, et al., “From ‘Hello’ to Higher-Order Thinking: The Effect of Coaching and Feedback on Online
Chats”, Internet High. Educ., vol. 16, pp. 78-84, January 2013.
[26] N. N. El-Emam and R. A. S. AL-Zubidy, “New steganography algorithm to conceal a large amount of secret
message using hybrid adaptive neural networks with modified adaptive genetic algorithm,” J. Syst. Softw., vol. 86,
no. 6, pp. 1465-1481, June 2013.
[27] A. Malik, et al., “A high Capacity Text Steganography Scheme based on LZW Compression and Color Coding”,
Eng. Sci. Technol. an Int. J., pp. 4-11, August 2016.
[28] T. Narendra Babu, et al., “Implementation of High Security Cryptographic System with Improved Error
Correction and Detection Rate using FPGA”, Int. J. Electr. Comput. Eng., vol. 6, no. 2, pp. 602-610, 2016.
[29] A. H. Ali and A. M. Sagheer, “Design and Implementation of Secure Chatting Application with end to end
Encryption”, J. Eng. Appl. Sci., vol. 12, no. 1, pp. 156-160, 2017.
[30] S. H. Ahmed, et al., “Combining Steganography and Cryptography on Android Platform to Achive a High-Level
Security”, J. Eng. Appl. Sci., vol. 12, no. 17, pp. 4448-4452, 2017.
[31] A. Bhateja and S. Kumar, “Genetic Algorithm with Elitism for Cryptanalysis of Vigen ere Cipher”, in Issues and
Challenges in Intelligent Computing Techniques (ICICT), 2014 International Conference on, 2014, pp. 373-377.
[32] A. Saraswat, et al., “An Extended Hybridization of Vigenere and Caesar Cipher Techniques for Secure
Communication”, Procedia - Procedia Comput. Sci., vol. 92, pp. 355-360, 2016.
[33] B. H. Krishna, et al., “Multiple Text Encryption, Key Entrenched, Distributed Cipher using Pairing Functions and
Transposition Ciphers”, in This full-text paper was peer-reviewed and accepted to be presented at the IEEE
WiSPNET 2016 conference, 2016, pp. 1059-1061.
[34] M. Jain and S. K. Lenka, “Secret Data Transmission using Vital Image Steganography over Transposition Cipher”,
in Green Computing and Internet of Things (ICGCIoT), 2015 International Conference on, 2016, pp. 1026-1029.
9. Int J Elec & Comp Eng ISSN: 2088-8708
The Proposed Development of Prototype with Secret Messages Model in Whatsapp … (Hamdani Hamdani)
3851
BIOGRAPHIES OF AUTHORS
Dr. Hamdani is a lecturer and a researchers at Department of Computer Science in Universitas
Mulawarman, Indonesia. He obtained his bachelor degree of Informatics in Universitas Ahmad
Dahlan, Indonesia (2002). He obtained his Master of Computer Science in Universitas Gadjah Mada,
Indonesia (2009) and Ph.D in Computer Science at Department of Computer Science & Electronics
in Universitas Gadjah Mada, Yogyakarta, Indonesia (2018). His research interests include decision
support systems (DSS), group decision support systems (GDSS), social networks analysis, intelligent
system, information security and web engineering. E-mail : hamdani@fkti.unmul.ac.id;
dani@ieee.org / Web : http://odahetam.com
Heru Ismanto received his bachelor’s of Informatics, and Master of Computer Science from
Universitas Padjadjaran (1996) and Universitas Gadjah Mada (2009) respectively. Currently he is a
lecturer at Department of Informatics Engineering, Universitas Musamus, Merauke, Papua and his a
Ph.D student at Department of Computer Science and Electronics, Universitas Gadjah Mada since
2014. He was interesting in Decision Support System, GIS, e-Government System. Email:
heru@unmus.ac.id
Agus Qomaruddin Munir received his bachelor’s of Informatics, and Master of Computer Science
from Universitas Islam Indonesia (2001) and Universitas Gadjah Mada (2009) respectively.
Currently he is a lecturer at Department of Informatics Engineering, Universitas Respati Yogyaarta
and his a PhD student at Department of Computer Science and Electronics, Universitas Gadjah Mada
since 2014. He was interesting in Decision Support System, GIS, e-Government System.
Email: agusqmnr@yahoo.com
Budi Rahmani received his bachelor’s of Electrical Engineering, and Master of Informatics from
Yogyakarta State University and Dian Nuswantoro University in 2003 and 2010 respectively.
Currently he is a PhD student at Department of Computer Science and Electronics, Universitas
Gadjah Mada since 2014. He was interesting in Embedded System and Robotics. Currently his
research focused is computer vision and control system for robot. His other research interests include
decision support system using artificial neural network. He can be contacted by email:
budirahmani@gmail.com http://budirahmani.wordpress.com
Andri Syafrianto is a lecturer and a researches at Department of Informatics Engineering in STMIK
El Rahma, Yogyakarta and Born April 9th
, 1983 in Palembang, Indonesia. He obtained his bachelor
degree of Informatics Engineering in Universitas Bina Darma Palembang, Indonesia (2005). He
obtained his Master of Computer Science in Universitas Gadjah Mada, Indonesia (2010). His
research interests include decision support systems (DSS), intelligent system, Information system
and Cryptanalysis. Email: andrisyafrianto@gmail.com
Didit Suprihanto Currently he is a PhD Student at Department of Computer Science and Electronics
Gadjah Mada University and lecturer at Department of Electrical Engineering, Universitas
Mulawarman, Samarinda, Indonesia. His research interests include computer networks security,
e-Government related issues and security assessment. Email: didit.suprihanto@ft.unmul.ac.id
Dr. Anindita Septiarini was born in Nganjuk, East Java, Indonesia in September 1st
1982. She
received her Bachelor degree in Informatic Engineering of Universitas Surabaya, Indonesia in 2005.
She received her Master of Computer Scince degree at Universitas Gadjah Mada, Yogyakarta,
Indonesia in 2009 and Ph.D in Computer Science at Department of Computer Science & Electronics
in Universitas Gadjah Mada, Yogyakarta, Indonesia (2018). She is working as a lecture in the
department of Computer Science Universitas Mulawarman, Samarinda, Indonesia since 2009. Her
research interest are image processing, pattern recognition and neural network.
Email: anindita.septiarini@gmail.com