• Title/Summary/Keyword: Sending Message

Search Result 162, Processing Time 0.032 seconds

Combining Encryption and Preservation in Information Security to Secure Sending a Message

  • Nooh, Sameer
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.285-291
    • /
    • 2022
  • With the growing exchange of data between individuals and institutions through various electronic communication, valuable data protection is in high demand to ensure that it is not hacked and that privacy is protected. Many security techniques, such as encryption and steganography, have emerged to prevent security breaches. The purpose of this research is to integrate cryptographic and steganography techniques to secure text message sending. The Rijndael algorithm was used to encrypt the text message, and the Least Significant Bit algorithm was also used to hide the encrypted message in a color image. Experiments on the suggested method have proven that it can improve the security of sent messages due to the human eye's inability to identify the original image from the image after it has been covered, as well as the encryption of the message using a password.

Cyber Attack Detection Using Message Authentication for Controller Area Networks (차량 내부 네트워크에서 메세지 인증을 이용한 사이버 공격 탐지)

  • Lee, Suyun;Park, Seo-Hee;Song, Ho-Jin;Beak, Youngmi
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.107-109
    • /
    • 2022
  • This paper proposes a new security system to detect cyber-attacks based on message authentication in a in-vehicle network. In the in-vehicle network, when a sending node transmits messages in a broadcast manner, it only uses a message identifier, rather than a node's identifier. It leads to a problem not identifying the source. In the proposed system, the sending node generates a message authentication code (MAC) using a cryptographic hash function to the control data and transmits it with the control data. When generating the MAC for each message, a multidimensional chaotic map is applied to increase the randomness of the result. The receiving node compares its MAC generated from the control data in the received message with the MAC of the received message to detect whether the message transmitted from the sending node is forged or not. We evaluate the performance of the proposed system by using CANoe and CAPL (Communication Access Programming Language). Our system shows a 100% of detection rate against cyber-attacks injected.

  • PDF

A Comparative Study on the Public Speech Spectrum between ROK and USA Politicians (한국과 미국 정치인 대중연설 음성의 스펙트럼 비교 연구)

  • Chung, Eun-Ee;Lee, Sang-Ho
    • Journal of Digital Contents Society
    • /
    • v.17 no.3
    • /
    • pp.143-155
    • /
    • 2016
  • In this study, we focused on the importance of politicians' voices in sending a message. Different factors for a voice may play different roles in sending a message and affect message recipients' responsiveness, understanding, and so on. For this reason, it can be said that an analytical study on voices in sending a diversity of messages is a meaningful attempt. We took interest in politicians' voices because we determined that a voice should be very important to politicians frequently sending a message through speech to the nation and others. This study aimed to investigate the voices of politicians, who represent their nation. We intended to select politicians representing ROK(Republic of Korea; South Korean) and USA(United States of America), choose representative speeches to the nation, make a comparative analysis of their voices in the speeches, and draw implications. We analyzed a total of eight voices - four ROK politicians and four USA ones, male and female - to characterize them and suggest guidelines for a voice with clearer message delivery. We analyzed the politicians' voices on the basis of such vocal properties as vocal pitch, accuracy of pronunciation, resonance, and intonation variation and found that the ROK politicians were somewhat poorer at utilizing their voice than the US ones. In particular, they were remarkably poorer at accurate pronunciation, which exerts a significant impact on message passing.

On the Heterogeneous Postal Delivery Model for Multicasting

  • Sekharan, Chandra N.;Banik, Shankar M.;Radhakrishnan, Sridhar
    • Journal of Communications and Networks
    • /
    • v.13 no.5
    • /
    • pp.536-543
    • /
    • 2011
  • The heterogeneous postal delivery model assumes that each intermediate node in the multicasting tree incurs a constant switching time for each message that is sent. We have proposed a new model where we assume a more generalized switching time at intermediate nodes. In our model, a child node v of a parent u has a switching delay vector, where the ith element of the vector indicates the switching delay incurred by u for sending the message to v after sending the message to i-1 other children of u. Given a multicast tree and switching delay vectors at each non-root node 5 in the tree, we provide an O(n$^{\frac{5}{2}}$) optimal algorithm that will decide the order in which the internal (non-leaf) nodes have to send the multicast message to its children in order to minimize the maximum end-to-end delay due to multicasting. We also show an important lower bound result that optimal multicast switching delay problem is as hard as min-max matching problem on weighted bipartite graphs and hence O(n$^{\frac{5}{2}}$) running time is tight.

Comparison of following distance between young and old driver according to operation of navigation and sending text message during driving (운전 중 문자메시지 전송 및 내비게이션 조작에 따른 청.장년층 운전자의 차간거리 비교)

  • Yeon, Hong-Won;Lee, Ji-Na;Yun, Hui-Jeong;Kim, Hyeon-Ju;Lee, In-Hwa;Choe, Mi-Hyeon;Kim, Hyeong-Sik;Choe, Jin-Seung;Ji, Du-Hwan;Min, Byeong-Chan;Tak, Gye-Rae;Jeong, Sun-Cheol
    • Proceedings of the Korean Society for Emotion and Sensibility Conference
    • /
    • 2012.05a
    • /
    • pp.121-122
    • /
    • 2012
  • PDF

Factors influencing Cell Phone Addiction in Middle School Students by Gender (성별에 따른 중학생의 휴대전화 중독의 영향 요인)

  • Koo, Hyun Young
    • Korean Parent-Child Health Journal
    • /
    • v.15 no.2
    • /
    • pp.60-70
    • /
    • 2012
  • Purpose: This study was done to examine factors influencing cell phone addiction for middle school students by gender. Methods: The participants were 228 male students and 228 female students in two middle schools. Data were collected through self-report questionnaires, and analyzed using the SPSS/WIN 19.0 program. Results: Cell phone addictions of female students are higher than those of male students. Factors influencing cell phone addiction for male students were mimicry, sending text message on weekdays, immediate self-control, grade, syntony, and monthly call charge, explaining 42.2% of variance in cell phone addiction. Factors influencing cell phone addiction for female students were internet addiction, sending and receiving text message on weekends, immediate self-control, long-term self-control, use time, main use, syntony, and monthly call charge, explaining 46.8% of variance in cell phone addiction. Conclusion: The results indicated that cell phone addiction and its influencing factors differed by gender. Therefore the approach to effective cell phone addiction management program for middle school students should consider gender differences.

  • PDF

Can Coupon Holding Duration and Message Framing Increase the Effect of Push Notifications on Mobile Coupon Redemption? Evidence from A Randomized Field Experiment

  • Soonki Hwang;Jai-Yeol Son;Sunju Park;Kil-Soo Suh
    • Asia pacific journal of information systems
    • /
    • v.33 no.3
    • /
    • pp.812-830
    • /
    • 2023
  • We propose a mobile coupon strategy designed to increase the effect of push notifications on redemption. The proposed strategy recommends that firms deliver mobile coupons with distant expiration dates and remind them through push notifications framed negatively once these expiration dates become imminent, rather than frequently sending coupons with near expiration dates. We test the effectiveness of the proposed strategy using data collected through a randomized field experiment. The findings indicate that push notifications enhance coupon redemption rates for coupons that are held longer by customers than those that are recently received. Additionally, we found that sending negatively framed push notification messages to remind customers of imminent coupon expiration dates further resulted in higher coupon redemption rates. The findings can be employed to offer useful guidance on how to effectively design mobile coupons for achieving higher redemption rates.

The Design and Implementation of Internet Messaging System(XML/EDI System) with based on Java (Java를 기반으로 하는 Internet Messaging System (XML/EDI System) 설계 및 구현)

  • 이영교;안경림;안정희
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.2
    • /
    • pp.78-83
    • /
    • 2001
  • In this paper. I design and implement The Internet Messaging System(XML/EDI System), that is able to transform to user requested format as registering mapping script even though it was transferred any formatted message. Also, This system is able to easily migrate the existed Legacy System(ERP, MIS. etc). As basic service. I implement message sending message receiving, message retrieval, and mapping in Client system. And I support EDI, XML. DB. HTML that is selected among various message format.

Variable Length CAN Message Compression Using Bit Rearrangement (비트 재배열을 이용한 가변길이 CAN 메시지 압축)

  • Cho, Kyung-Ju
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.48 no.4
    • /
    • pp.51-56
    • /
    • 2011
  • In this paper, we propose a CAN message compression method using bit rearrangement to reduce the CAN bus load and the error probability during the transmission of CAN messages. In conventional CAN message compression methods, message compression is accomplished by sending only the differences between the previous data and the current data. In the proposed method, the difference bits are rearranged to further increase the compression efficiency. By simulations in car applications, it is shown that the CAN transmission data is further reduced up to 26% by the proposed method, compared with the conventional method.