• Title/Summary/Keyword: MESSAGE model

Search Result 652, Processing Time 0.031 seconds

FPGA-based Hardware Implementation of Cryptography Algorithm ARIA (암호화 알고리즘 ARIA의 FPGA기반 하드웨어 구현)

  • Kim Young-Soo;Cho Sun-Gu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.7
    • /
    • pp.1229-1236
    • /
    • 2006
  • Group oriented multicast service is a prerequisite for the current application system for remote lecture and customer service. IP multicast is used to be generally accepted as an internet standard. IP multicast which is designed to support network based replication model can efficiently use host and network resource, however it has some weak points that it has to support IP multicast in the internet by adding multicast-capable internet infrastructure such as router and is vulnerable to security by using public IP address for group identifier. Therefore we propose the trigger based application level multicast model that can enhance both scalability and security by separating the functions, which send and receive message to solve these problems. Our suggested model is expected to ensure the promotion of quality of service and reliability.

Text Steganography Based on Ci-poetry Generation Using Markov Chain Model

  • Luo, Yubo;Huang, Yongfeng;Li, Fufang;Chang, Chinchen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4568-4584
    • /
    • 2016
  • Steganography based on text generation has become a hot research topic in recent years. However, current text-generation methods which generate texts of normal style have either semantic or syntactic flaws. Note that texts of special genre, such as poem, have much simpler language model, less grammar rules, and lower demand for naturalness. Motivated by this observation, in this paper, we propose a text steganography that utilizes Markov chain model to generate Ci-poetry, a classic Chinese poem style. Since all Ci poems have fixed tone patterns, the generation process is to select proper words based on a chosen tone pattern. Markov chain model can obtain a state transfer matrix which simulates the language model of Ci-poetry by learning from a given corpus. To begin with an initial word, we can hide secret message when we use the state transfer matrix to choose a next word, and iterating until the end of the whole Ci poem. Extensive experiments are conducted and both machine and human evaluation results show that our method can generate Ci-poetry with higher naturalness than former researches and achieve competitive embedding rate.

Digital Signature Model of Sensor Network Using Hash Chain (해쉬체인을 이용한 센서네트워크의 디지털서명 모델)

  • Kim, Young-Soo;Cho, Seon-Goo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.11
    • /
    • pp.2459-2464
    • /
    • 2009
  • In sensor network there are no nodes or servers that are exclusively responsible for packet forwarding and routing. Instead, sensor nodes participating in network communications perform these activities. Thus, they are vulnerable to the alteration and forgery of message in the process of packet forwarding and routing. To solve this problem, a security to ensure authentication and integrity of routing and forwarding messages should be required. To do this, we propose the hash chain-based digital signature model where it takes less time to compute in generating and verifying the digital signature model, unlike he public key-based digital signature model, and verify if this model is proper by comparing computation times between tow models.

The Moderating Effects of Internet Shopping Involvement on the Relationship between Usability, Trust of Internet Shopping Sites and Customer Loyalty (인터넷 쇼핑 사이트의 사용성 및 신뢰성과 고객 충성도간의 관계에서 인터넷 쇼핑 관여도의 조절효과)

  • Suh, Kun-Soo
    • Journal of Information Technology Services
    • /
    • v.7 no.3
    • /
    • pp.1-30
    • /
    • 2008
  • This paper proposes an integrated model of customer loyalty in the context of Internet shopping based on a review of two competing perspectives - transactional and relational views. The research model suggests that the usability and trust associated with an Internet shopping site are key determinants of customer loyalty. In this paper, factors such as promotion, ease of use/navigation, and purchase facilitation are posited as major determinants of usability. Trust, on the other hand, is assumed to be influenced by the quality of communication, social shopping service, and safety level associated with an Internet shopping site. This paper also asserts that the lack of consideration for individual differences is one of the key reasons for the inconsistent and mixed research findings in user acceptance literature. In this regard, the elaboration likelihood model (ELM) is considered to be appropriate referent theory as it may theoretically explain why a particular information technology (IT) related message has varying influences on different adopters. The research model comprising 11 hypotheses was derived from and validated through a survey involving 271 university students. The partial least square(PLS) method was used to test the suitability of the research model and its hypotheses. Overall, the results suggest that the usability and trust associated with an Internet shopping site play an important role in acquiring loyal customers. In particular, the user's Internet shopping involvement is found to moderate the relationship between trust and customer loyalty.

Modeling Differential Global Positioning System Pseudorange Correction

  • Mohasseb, M.;El-Rabbany, A.;El-Alim, O. Abd;Rashad, R.
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.1
    • /
    • pp.21-26
    • /
    • 2006
  • This paper focuses on modeling and predicting differential GPS corrections transmitted by marine radio-beacon systems using artificial neural networks. Various neural network structures with various training algorithms were examined, including Linear, Radial Biases, and Feedforward. Matlab Neural Network toolbox is used for this purpose. Data sets used in building the model are the transmitted pseudorange corrections and broadcast navigation message. Model design is passed through several stages, namely data collection, preprocessing, model building, and finally model validation. It is found that feedforward neural network with automated regularization is the most suitable for our data. In training the neural network, different approaches are used to take advantage of the pseudorange corrections history while taking into account the required time for prediction and storage limitations. Three data structures are considered in training the neural network, namely all round, compound, and average. Of the various data structures examined, it is found that the average data structure is the most suitable. It is shown that the developed model is capable of predicting the differential correction with an accuracy level comparable to that of beacon-transmitted real-time DGPS correction.

  • PDF

A Distributed Communication Model and Performance Evaluation for Information Transfer in a Security Policy-based Intrusion Detection System (보안정책 기반 침입탐지시스템에서 정보 전달을 위한 분산 통신 모델과 성능 평가)

  • Jang Jung Sook;Jeon Yong Hee;Jang Jong Soo;Sohn Seung Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.12C
    • /
    • pp.1707-1721
    • /
    • 2004
  • In this paper, we propose a distributed communication model of intrusion detection system(IDS) in which integrated security management at networks level is possible, model it at a security node and distributed system levels, design and implement a simulator. At the node level, we evaluate the transfer capability of alert message based on the analysis of giga-bit security node architecture which performs hardware-based intrusion detection. At the distributed system level, we perform the evaluation of transfer capability of detection and alert informations between components of distributed IDS. In the proposed model, we carry out the performance evaluation considering decision factors of communication mechanism and present the results in order to gain some quantitative understanding of the system.

Randomized Block Size (RBS) Model for Secure Data Storage in Distributed Server

  • Sinha, Keshav;Paul, Partha;Amritanjali, Amritanjali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4508-4530
    • /
    • 2021
  • Today distributed data storage service are being widely used. However lack of proper means of security makes the user data vulnerable. In this work, we propose a Randomized Block Size (RBS) model for secure data storage in distributed environments. The model work with multifold block sizes encrypted with the Chinese Remainder Theorem-based RSA (C-RSA) technique for end-to-end security of multimedia data. The proposed RBS model has a key generation phase (KGP) for constructing asymmetric keys, and a rand generation phase (RGP) for applying optimal asymmetric encryption padding (OAEP) to the original message. The experimental results obtained with text and image files show that the post encryption file size is not much affected, and data is efficiently encrypted while storing at the distributed storage server (DSS). The parameters such as ciphertext size, encryption time, and throughput have been considered for performance evaluation, whereas statistical analysis like similarity measurement, correlation coefficient, histogram, and entropy analysis uses to check image pixels deviation. The number of pixels change rate (NPCR) and unified averaged changed intensity (UACI) were used to check the strength of the proposed encryption technique. The proposed model is robust with high resilience against eavesdropping, insider attack, and chosen-plaintext attack.

Simulation Performance Evaluation of KNX and LnCP network (Konnex 와 LnCP 네트워크의 시뮬레이션 성능 평가)

  • 최병훈;하경남;김현희;이경창;이석
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2004.10a
    • /
    • pp.203-206
    • /
    • 2004
  • Recently home network has been developed in the field of Information Technology. And there are many protocols for smart home, such as Lonworks, Echonet, KNX, LnCP etc. However, the performance evaluation has not been nearly known between the protocols. Hence, this paper evaluates the performance of KNX by Konnex Association and LnCP(Living network Control Protocol) by LG Electronics. We developed simulation model using flowchart of KNX and LnCP and simulation scenario through analysis of message to be generated in the home network. Furthermore, we evaluate simulation performance, such as mean transmission delay, maximum transmission delay, and collision rate of both protocols.

  • PDF

Design and Implementation of DHCP with Minimized Broadcasting Traffic (브로드캐스팅 트래픽을 최소화한 DHCP의 설계 및 구현)

  • An, Seong-Jin;Jeong, Jin-Uk;Lee, Sang-Hun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.4
    • /
    • pp.709-719
    • /
    • 1996
  • DHCP(Dynamic Host Configuration Protocol)is a protocol which dynamically allocates an IP address and/or host configuration parameters to a host. But because this protocol uses broadcasting for message exchange, it causes heavy traffic and overload on the network. By avoiding unnecessary broadcasting and using a simple and efficient implementation model, we can reduce such heavy traffic and overload. We have studied on characteristics of the broadcasting the traffic caused by DHCP, and implement the model which can reduce traffic by improving algorithm and unicasting messages.

  • PDF

Design of MD Authentication and Privacy for Mobile Micro-payment based on NFC (NFC 기반 모바일 소액 결제를 위한 MD 인증과 프라이버시 설계)

  • Kim, Yong-Il;Kim, Dae-Gue;Cha, Byung-Rae
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.1
    • /
    • pp.47-55
    • /
    • 2013
  • In this paper, we propose the micropayment model based on NFC, authentication, and privacy technique to support micro-payment in aspect of information technology to reinvigorate the traditional market. The micropayment model supports facilities of payment using smart phone based on NFC, and the encryption and tokenization support the functions of MD authentication, indirection authentication, and privacy of user's payment.