• Title/Summary/Keyword: Security Test

Search Result 1,256, Processing Time 0.023 seconds

Secure Steganographic Algorithm against Statistical analyses (통계분석에 강인한 심층 암호)

  • 유정재;오승철;이광수;이상진;박일환
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.1
    • /
    • pp.15-23
    • /
    • 2004
  • Westfeld analyzed a sequential LSB embedding steganography effectively through the $\chi$$^2$statistical test which measures the frequencies of PoVs(pairs of values). Fridrich also proposed another statistical analysis, so-called RS steganalysis by which the embedding message rate can be estimated. This method is based on the partition of pixels as three groups; Regular, Singular, Unusable groups. In this paper, we propose a new steganographic scheme which preserves the above two statistics. The proposed scheme embeds the secret message in the innocent image by randomly adding one to real pixel value or subtracting one from it, then adjusts the statistical measures to equal those of the original image.

Effectiveness of using Cognitive Virtual Tours based on Marzano Model to Develop the Achievement and Historical Research Skills for Secondary School Students

  • Abdalla, Atef Mohamed Saied
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.292-298
    • /
    • 2022
  • The study aimed to measure the effectiveness of using Cognitive virtual tours based on Marzano model to develop the achievement and some of historical research Skills for secondary school students. To achieve the objectives of the study, the experimental method was used and two study groups consisted of (60) students were divided into two groups, one is Control (30) students and the other is in experimental (30) students at Alsalam secondary in Ismailia Governorate. The study used several tools: The experimental processing tool of Cognitive Virtual tours based on Marzano model, Cognitive achievement test for the first unit of Secondary first grade history Course. Historical research skills. The finding of the study showed the effectiveness of using cognitive virtual tours based on Marzano model in developing the achievement and some of historical research skills for first grade secondary students which there are Statistically differences at level (0.01) between the average scores of the students in (experimental and Control) groups in post application for Cognitive achievement test. Practical application of the study can contribute to clarify how to use Cognitive virtual tours based on Marzano model in teaching history, and Draw the attention of history developers to the development of historical research skills.

The Impact of Using Some Participatory E-learning Strategies in Developing Skills of Designing and Producing Electronic Courses for A sample of Umm Al-Qura University Students and their Innovative Thinking

  • Emad Mohammed Samra
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.17-30
    • /
    • 2023
  • The current research aims to reveal the impact of using some participatory e-learning strategies (participatory product - classroom web simulation) in developing cognitive achievement, electronic course design skills, and - skills list - Torrance test of innovative thinking). The tools of innovative thinking among a sample of Information Science students. To achieve the objectives of current research, the researcher designed an educational website to train students to produce electronic courses via the web, according to the two participatory e-learning strategies. The researcher used a set of tools represented in (achievement test research and experimental treatment were applied to a sample of the Faculty of Computer students at Umm Al-Qura University. The results found that both participatory product strategy and web simulation have an imact on developing learning aspects discussed in the research. As for which of the two strategies had a greater impact than the other, it turned out that the web simulation strategy had a greater impact than the participatory product strategy in developing these aspects.

Understanding Driver Compliance Behaviour at Signalised Intersection for Developing Conceptual Model of Driving Simulation

  • Aznoora Osman;Nadia Abdul Wahab;Haryati Ahmad Fauzi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.142-150
    • /
    • 2024
  • A conceptual model represents an understanding of a system that is going to be developed, which in this research, a driving simulation software to study driver behavior at signalised intersections. Therefore, video observation was conducted to study driver compliance behaviour within the dilemma zone at signalised intersection, with regards to driver's distance from the stop line during yellow light interval. The video was analysed using Thematic Analysis and the data extracted from it was analysed using Chi-Square Independent Test. The Thematic Analysis revealed two major themes which were traffic situation and driver compliance behaviour. Traffic situation is defined as traffic surrounding the driver, such as no car in front and behind, car in front, and car behind. Meanwhile, the Chi-Square Test result indicates that within the dilemma zone, there was a significant relationship between driver compliance behaviour and driver's distance from the stop line during yellow light interval. The closer the drivers were to the stop line, the more likely they were going to comply. In contrast, drivers showed higher non-compliant behavior when further away from stop line. This finding could help in the development of conceptual model of driving simulation with purpose in studying driver behavior.

The Effect of Using WhatsApp on EFL Students' Medical English Vocabulary Learning During the Covid-19 Pandemic

  • Saud Alenezi;Elias Bensalem
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.143-149
    • /
    • 2024
  • The role of social networking mobile applications such as WhatsApp in enhancing second language vocabulary learning among English language learners continues to be a subject of interest for many scholars. The current study aimed at examining medical English vocabulary learning among undergraduate students using WhatsApp compared to learning vocabulary via the Blackboard platform during the Covid-19 pandemic. To this end, 108 medical students (51 males, 57 females) enrolled in a first semester English for a specific English course participated in the study. A quasi-experimental design was adopted for two groups. Fifty-three students participated in the WhatsApp group and 55 students formed the Blackboard group. A pretest-posttest design was employed to collect data. Results of t-test scores did not show a significant difference between the WhatsApp and Blackboard groups on a vocabulary test. Results of a survey that measured students' opinion of the use of WhatsApp as a platform for learning new vocabulary showed positive perceptions since participants thought that WhatsApp enhanced their learning experience.

Feature Selection and Hyper-Parameter Tuning for Optimizing Decision Tree Algorithm on Heart Disease Classification

  • Tsehay Admassu Assegie;Sushma S.J;Bhavya B.G;Padmashree S
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.150-154
    • /
    • 2024
  • In recent years, there are extensive researches on the applications of machine learning to the automation and decision support for medical experts during disease detection. However, the performance of machine learning still needs improvement so that machine learning model produces result that is more accurate and reliable for disease detection. Selecting the hyper-parameter that could produce the possible maximum classification accuracy on medical dataset is the most challenging task in developing decision support systems with machine learning algorithms for medical dataset classification. Moreover, selecting the features that best characterizes a disease is another challenge in developing machine-learning model with better classification accuracy. In this study, we have proposed an optimized decision tree model for heart disease classification by using heart disease dataset collected from kaggle data repository. The proposed model is evaluated and experimental test reveals that the performance of decision tree improves when an optimal number of features are used for training. Overall, the accuracy of the proposed decision tree model is 98.2% for heart disease classification.

Semantics-Preserving Mutation-Based Fuzzing on JavaScript Interpreters (자바스크립트 엔진에 대한 시맨틱 보존적 변이기반 퍼징)

  • Oh, DongHyeon;Choi, JaeSeung;Cha, SangKil
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.573-582
    • /
    • 2020
  • Fuzzing is a method of testing software by randomly generating test cases. Since its introduction, a variety of fuzzing techniques have been studied. Among them, mutation-based fuzzing is an efficient method that finds real-world bugs even though it uses a simple approach such as probabilistic bit-flipping and character substitution. However, the interpreter fuzzing has difficulty in applying general mutation techniques because the interpreter requires grammar and semantic correctness input values. In this paper, we present a novel mutation-based fuzzing on JavaScript interpreters with a dynamic data flow analysis. To this end, we implement JMFuzzer that can generate various types of mutated test cases that operate normally without runtime errors in JavaScript interpreter considering syntax and semantics. As a result, we found numerous unknown vulnerabilities in the latest JavaScript interpreters. We reported all of them to the vendors.

A Study on Expanding Participation in and Raising Awareness of the Green Parking Project for Improvement of Parking Conditions in Urban Residential Areas (도시주거지 주차환경개선을 위한 녹색주차사업 참여확대 및 인식제고 방안)

  • Kim, Myo-Jung
    • Journal of the Korean housing association
    • /
    • v.26 no.1
    • /
    • pp.61-70
    • /
    • 2015
  • The purpose of this study was to provide information on how to expend participation in and raise awareness of the Green Parking Project. A survey was conducted for this study among two groups. One group consisted of 38 residents of the Green Parking Zone in Nam-gu, Ulsan, and the other group consised 129 residents with no experience with the Green Parking Project. For analysis, the frequency and means were calculated, and t-test, analysis of variance, and chi-square test were performed. The results showed, first, that general residents tended to think that parking on the street in front of one's house is a divine right, while residents living the Green Parking Zone thought that the street is a public space. Second, general residents regarded fences as means of security to protect their private property, while people living in the Green Parking Zone tended to think of their yards as semi-private spaces and allowed access to neighbors. Third, general residents had concerns about maintenance and administration fees, noise and dust, security of houses, and privacy. However, residents of the Green Parking Zone evaluated those conditions positively. Fourth, people who were well-informed about the Green Parking Project had low anxiety about security and invasion of privacy, results from the project. Therefore, effective public relations are very important for expanding participation and raising awareness.

Implementation of CCSDS Telecommand Decryptor in Geostationary Communications Satellite (정지궤도 통신위성의 CCSDS 원격명령 암호복호기 구현)

  • Kim,Jung-Pyo;Gu,Cheol-Hoe;Choe,Jae-Dong
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.31 no.10
    • /
    • pp.89-96
    • /
    • 2003
  • In this paper, a CCSDS(Consultative Committee for Space Data Systems) telecommand(TC) decryptor for the security of geostationary communications satellite was implemented. For the confidentiality of CCSDS TC datalink security, Option-A which implements the security services below the transfer sublayer was selected. Also CFB(Cipher Feedback) operation mode of DES(Data Encryption Standard) was used for the encryption of 56-bit data bits in 64-bit codeblock. To verify Decryptor function, the DES CFB logic implemented on A54SX32 FPGA(Field Programmable Gate Array) was integrated with interface and control logics in a PCB(Printed Circuit Board). Using a function test PC, the encrypted codeblocks were generated, transferred into the decryptor, decrypted, and the decrypted codeblocks were transmitted to the function test PC, and then compared with the source codeblocks. Through LED(Light Emitting Diode) ON operation by driving the relay related to Op-code decoded and the comparison between the codeblock output waveforms measured and those simulated, the telecommand decryptor function was verified.

A Study of Information Leakage Prevention through Certified Authentication in Phishing, Vishing, SMiShing Attacks (Phishing, Vishing, SMiShing 공격에서 공인인증을 통한 정보침해 방지 연구)

  • Park, Dea-Woo;Seo, Jeong-Man
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.2 s.46
    • /
    • pp.171-180
    • /
    • 2007
  • The financial crime that used morale anger Phishing, Pharming, Vishing, SMiSing etc. will gain during recent cyber crimes. We are study systematically whether or not leakage of information and infringement can how easily occur to Phishing, Vishing, SMiSing using a social engineering technique and VoIP at these papers through experiment. A hacker makes Phishing, Vishing site, and test an information infringement process of a user through PiSing mail and a virus, a nasty code, Vishing, a SMiSing character, disarmament of Keylogger prevention S/W etc. as establish server. Information by Phishing, Vishing, SMiSing is infringed with leakage in the experiment results, and confirm, and test certified certificate and White List and a certified authentication mark, plug-in program installation etc. to prevention, and security becomes, and demonstrate. Technical experiment and prevention regarding Phishing of this paper and Vishing attack reduce the damage of information infringement, and be education for Ubiquitous information security will contribute in technical development.

  • PDF