10 research outputs found

    Triple-A: Secure RGB Image Steganography Based on Randomization

    Get PDF
    A new image-based steganography technique – called triple-A algorithm - is proposed in this paper. It uses the same principle of LSB, where the secret is hidden in the least significant bits of the pixels, with more randomization in selection of the number of bits used and the color channels that are used. This randomization is expected to increase the security of the system and also increase the capacity. This technique can be applied to RGB images where each pixel is represented by three bytes to indicate the intensity of red, green, and blue in that pixel

    Critical review of the e-loyalty literature: a purchase-centred framework

    Get PDF
    Over the last few years, the concept of online loyalty has been examined extensively in the literature, and it remains a topic of constant inquiry for both academics and marketing managers. The tremendous development of the Internet for both marketing and e-commerce settings, in conjunction with the growing desire of consumers to purchase online, has promoted two main outcomes: (a) increasing numbers of Business-to-Customer companies running businesses online and (b) the development of a variety of different e-loyalty research models. However, current research lacks a systematic review of the literature that provides a general conceptual framework on e-loyalty, which would help managers to understand their customers better, to take advantage of industry-related factors, and to improve their service quality. The present study is an attempt to critically synthesize results from multiple empirical studies on e-loyalty. Our findings illustrate that 62 instruments for measuring e-loyalty are currently in use, influenced predominantly by Zeithaml et al. (J Marketing. 1996;60(2):31-46) and Oliver (1997; Satisfaction: a behavioral perspective on the consumer. New York: McGraw Hill). Additionally, we propose a new general conceptual framework, which leads to antecedents dividing e-loyalty on the basis of the action of purchase into pre-purchase, during-purchase and after-purchase factors. To conclude, a number of managerial implementations are suggested in order to help marketing managers increase their customers’ e-loyalty by making crucial changes in each purchase stage

    Improving Security and Capacity for Arabic Text Steganography Using 'Kashida' Extensions

    Get PDF
    Steganography is a method of hiding data within a cover media so that other individuals fail to realize their existence. In this paper, a new approach for steganography in Arabic texts is proposed. The main idea is that each Arabic word may have some characters which can be extended by 'Kashida'. The ranks 'locations' of such characters and the inserted Kashida, construct a coding method to represent a block of secret bits. Different scenarios have been proposed based on the maximum number of Kashida possible to be inserted per word. The approach was compared to some existing Arabic text steganography approaches in terms of capacity and security. It is shown that this proposed approach outperforms the others with interesting promising results

    Improving Security and Capacity for Arabic Text Steganography Using 'Kashida' Extensions

    Get PDF
    Steganography is a method of hiding data within a cover media so that other individuals fail to realize their existence. In this paper, a new approach for steganography in Arabic texts is proposed. The main idea is that each Arabic word may have some characters which can be extended by 'Kashida'. The ranks 'locations' of such characters and the inserted Kashida, construct a coding method to represent a block of secret bits. Different scenarios have been proposed based on the maximum number of Kashida possible to be inserted per word. The approach was compared to some existing Arabic text steganography approaches in terms of capacity and security. It is shown that this proposed approach outperforms the others with interesting promising results

    Driving behaviour and usability: Should in-vehicle speed limit warnings be paired with overhead gantry?

    Get PDF
    Variable speed limits (VSL) aim at improving safety and traffic fluidity by increasing drivers’ awareness. In the present simulator study, VSL displayed on overhead gantries on a motorway were also displayed on a mobile phone, fixed on the vehicle’s centre console, with distance-based triggers (250 m vs. 500 m from the overhead gantry). Results showed drivers (N = 20) complied with the in-vehicle information, which was congruent with the upcoming gantry. The sooner the in-vehicle VSL, the faster the speed when speed limits increased. Similarly, the sooner the in-vehicle VSL, the slower the speed when speed limits decreased. Later in-vehicle VSL resulted in lower speed homogeneity, which is a safety concern. Speed homogeneity was greater when no in-vehicle VSL were displayed. Finally, the 70 mph VSL were affecting driving behaviour differently. These results suggested that there might be traffic disruption and more erratic longitudinal vehicle control on real roads

    Incident Prioritisation for Intrusion Response Systems

    Get PDF
    The landscape of security threats continues to evolve, with attacks becoming more serious and the number of vulnerabilities rising. To manage these threats, many security studies have been undertaken in recent years, mainly focusing on improving detection, prevention and response efficiency. Although there are security tools such as antivirus software and firewalls available to counter them, Intrusion Detection Systems and similar tools such as Intrusion Prevention Systems are still one of the most popular approaches. There are hundreds of published works related to intrusion detection that aim to increase the efficiency and reliability of detection, prevention and response systems. Whilst intrusion detection system technologies have advanced, there are still areas available to explore, particularly with respect to the process of selecting appropriate responses. Supporting a variety of response options, such as proactive, reactive and passive responses, enables security analysts to select the most appropriate response in different contexts. In view of that, a methodical approach that identifies important incidents as opposed to trivial ones is first needed. However, with thousands of incidents identified every day, relying upon manual processes to identify their importance and urgency is complicated, difficult, error-prone and time-consuming, and so prioritising them automatically would help security analysts to focus only on the most critical ones. The existing approaches to incident prioritisation provide various ways to prioritise incidents, but less attention has been given to adopting them into an automated response system. Although some studies have realised the advantages of prioritisation, they released no further studies showing they had continued to investigate the effectiveness of the process. This study concerns enhancing the incident prioritisation scheme to identify critical incidents based upon their criticality and urgency, in order to facilitate an autonomous mode for the response selection process in Intrusion Response Systems. To achieve this aim, this study proposed a novel framework which combines models and strategies identified from the comprehensive literature review. A model to estimate the level of risks of incidents is established, named the Risk Index Model (RIM). With different levels of risk, the Response Strategy Model (RSM) dynamically maps incidents into different types of response, with serious incidents being mapped to active responses in order to minimise their impact, while incidents with less impact have passive responses. The combination of these models provides a seamless way to map incidents automatically; however, it needs to be evaluated in terms of its effectiveness and performances. To demonstrate the results, an evaluation study with four stages was undertaken; these stages were a feasibility study of the RIM, comparison studies with industrial standards such as Common Vulnerabilities Scoring System (CVSS) and Snort, an examination of the effect of different strategies in the rating and ranking process, and a test of the effectiveness and performance of the Response Strategy Model (RSM). With promising results being gathered, a proof-of-concept study was conducted to demonstrate the framework using a live traffic network simulation with online assessment mode via the Security Incident Prioritisation Module (SIPM); this study was used to investigate its effectiveness and practicality. Through the results gathered, this study has demonstrated that the prioritisation process can feasibly be used to facilitate the response selection process in Intrusion Response Systems. The main contribution of this study is to have proposed, designed, evaluated and simulated a framework to support the incident prioritisation process for Intrusion Response Systems.Ministry of Higher Education in Malaysia and University of Malay

    Multimedia

    Get PDF
    The nowadays ubiquitous and effortless digital data capture and processing capabilities offered by the majority of devices, lead to an unprecedented penetration of multimedia content in our everyday life. To make the most of this phenomenon, the rapidly increasing volume and usage of digitised content requires constant re-evaluation and adaptation of multimedia methodologies, in order to meet the relentless change of requirements from both the user and system perspectives. Advances in Multimedia provides readers with an overview of the ever-growing field of multimedia by bringing together various research studies and surveys from different subfields that point out such important aspects. Some of the main topics that this book deals with include: multimedia management in peer-to-peer structures & wireless networks, security characteristics in multimedia, semantic gap bridging for multimedia content and novel multimedia applications

    The usability of knowledge based authentication methods on mobile devices

    Get PDF
    Mobile devices are providing ever increasing functionality to users, and the risks associated with applications storing personal details are high. Graphical authentication methods have been shown to provide better security in terms of password space than traditional approaches, as well as being more memorable. The usability of any system is important since an unusable system will often be avoided. This thesis aims to investigate graphical authentication methods based on recall, cued recall and recognition memory in terms of their usability and security

    Dual-method usability evaluation of e-commerce websites : in quest of better user experience

    Get PDF
    E-commerce has increased substantially, as e-retailers engage with consumers online. Users require more than products and quality service; they also expect a good user experience. User experience is affected by branding, functionality, navigation, content, aesthetics and usability. This study investigates the attainment of better user experience on e-commerce websites. A dual-method usability evaluation approach – usability testing with end-users and heuristic evaluation by experts – was employed to obtain a holistic picture of how usability aspects support or hinder the user experience. Usability testing provided insights into detailed interface issues and the type of content and journey that users prefer when making a purchasing decision, while heuristic evaluation was mainly directed at overall user interface and interaction factors. In a complementary way, each method identified a high number of usability problems. Key findings are summarized, and design guidelines are identified that can facilitate the development of e-commerce websites to promote user experience.E-handel het aansienlik toegeneem, soos e-kleinhandelaars by verbruikers aanlyn betrokke raak. Gebruikers verlang meer as produkte en kwaliteit diens; hulle verwag ook 'n goeie gebruikerservaring. Gebruikerservaring word deur ‘branding’, funksies, navigasie, inhoud, estetika en bruikbaarheid beinvloed. Hierdie studie ondersoek die bereiking van beter gebruikerservaring op e-handel webwerwe. 'n Dubbelemetode bruikbaarheidsevaluering benadering – bruikbaarheidstoetsing met eindgebruikers en heuristiese evaluering deur kundiges – is gebruik om ‘n holistiese beeld te verkry van hoe bruikbaarheidsaspekte gebruikerservaring ondersteun of verhinder. Bruikbaarheidstoetsing lewer insigte in gedetailleerde koppelvlak kwessies en die tipe inhoud en roete wat gebruikers verkies wanneer hulle 'n aankoop maak, terwyl heuristiese evaluering hoofsaaklik gerig is op algehele gebruikerskoppelvlak en interaksie faktore. Op 'n komplementêre manier, het elke metode' n groot aantal bruikbaarheidsprobleme geïdentifiseer. Belangrike bevindings word saamgevat, en ontwerp riglyne is voorgestel wat die ontwikkeling van e-handel webwerwe fasiliteer wat gebruikerservaring bevorder.ComputingM. Tech. (Information Technology
    corecore