93 research outputs found

    "The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography

    Full text link
    In this paper we propose a new method for the evaluation of network steganography algorithms based on the new concept of "the moving observer". We considered three levels of undetectability named: "good", "bad", and "ugly". To illustrate this method we chose Wi-Fi steganography as a solid family of information hiding protocols. We present the state of the art in this area covering well-known hiding techniques for 802.11 networks. "The moving observer" approach could help not only in the evaluation of steganographic algorithms, but also might be a starting point for a new detection system of network steganography. The concept of a new detection system, called MoveSteg, is explained in detail.Comment: 6 pages, 6 figures, to appear in Proc. of: ICNIT 2015 - 6th International Conference on Networking and Information Technology, Tokyo, Japan, November 5-6, 201

    Web Service Deployment for Selecting a Right Steganography Scheme for Optimizing Both the Capacity and the Detectable Distortion

    Get PDF
    The principal objective of this effort is to organize a network facility to hide the secret information in an image folder without disturbing its originality. In the literature lot of algorithms are there to hide the information in an image file but most of it consumes high resource for completing the task which is not suitable for light weight mobile devices. Few basic algorithms like 1LSB, 2LSB and 3LSB methods in the literature are suitable for mobile devices since the computational complexity is very low. But, these methods either lack in maintaining the originality of the source image or in increasing the number of bits to be fixed. Furthermore, every algorithm in the literature has its own merits and demerits and we cannot predict which algorithm is best or worst since, based on the parameters such as size of the safety duplicate and encryption algorithm used to generate the cipher text the steganography schemes may produce best or worst result with respect to computational complexity, capacity, and detectable distortion. In our proposed work, we have developed a web service that takes cover image and plain text as the input from the clients and returns the steganoimage to the clients. The steganoimage will be generated by our proposed work by analyzing the above said parameters and by applying the right steganography scheme. The proposed work helps in reducing the detectable distortion, computational complexity of the client device, and in increasing the capacity. The experimental result says that, the proposed system performs better than the legacy schemes with respect to capacity, computational complexity, and detectable distortion. This proposed work is more useful to the client devices with very low computational resource since all the computational tasks are deployed in the server side

    Efficient Data Transfer Over Wireless Networks

    Get PDF
    In the present day, efficiency in the field of communication is of utmost importance. In this study, data is transmitted over a wireless network supported by helical antennas. The efficiency is obtained by encoding the data by the Reed Solomon (RS) encoding scheme. The added advantage of this encoding scheme is its error detection and correction scheme in addition to the productive bandwidth usage. The data is encoded from the source and will be modulated using Quadrature Amplitude Modulation (QAM) scheme. The modulated data is then transmitted over a wireless network supported by the helical antenna. In the receiving end, the received signal is demodulated and then decoded. In this study, errors are introduced by the user to demonstrate the error detecting and correcting capabilities. The entire set up is simulated on the MATLAB version 9.5b 2018 software

    Examine online learning: The influence of cost readiness on Modern Education

    Get PDF
    The primary goal of this research is to examine and analyse the cost readiness factor as it relates to e-learning deployment. The study will look at the cost efficiency and cost readiness factors that influence the successful adoption of an e-learning system, and propose prospective and long-term solutions that would go a long way toward overcoming cost obstacles in the future. The researchers used a quantitative research method to determine the cost readiness of e-learning implementation. The participants in this study were 219 participants from several private universities. The results demonstrated that cost preparedness has a large predictive value for e-learning and will have a direct positive relationship with it. The survey questions may not necessarily generalize to the greater community of instructors and administrative personnel at private colleges, which is one of the study\u27s limitations

    Wavelet based multicarrier CDMA system

    Get PDF
    Emerging demands for high data rate services, high user capacity and low power consumption systems are the key driving forces behind the continued technology evolution in wireless communications. Multicarrier Modulation techniques support variety of services requiring different data rates and different QoS (quality of service) levels. Multicarrier CDMA is a wireless communication system that can be seen as a combination of direct sequence CDMA and Orthogonal Frequency Division Multiplexing techniques. The main benefits of this system are its robustness to inter symbol interference and multipath propagation in fading channels. This paper studies and simulates the Discrete Wavelet Transform based Multicarrier CDMA and compares it with the  Discrete Fourier Transform based one using different number of sub carriers, and different modulation techniques. The results shows that the Wavelet based system outperforms the Fourier based one since it has lower bit error rate BER performance, lower peak to verage power ratio PAPR and higher user capacity

    Academic Quality Dimensions and its influence on Students’ Satisfaction

    Get PDF
    Today in many industries service quality is widely used in different sectors. Every sector whether services sector or manufacturing can apply and implement five dimensions of service quality. The purpose of this study is to reveal the impact of service quality on student’s satisfaction in education sectors. The findings of the study will show impact of different service quality dimensions on students’ satisfaction in a private university. This study is useful to see the significance of service quality to satisfy students. SERVQUAL model of service quality provided by (Parasuraman, et al., 1988) is implemented. It includes five dimensions tangible, reliability, responsiveness, assurance and empathy.  Findings of this study showed that four of service quality dimensions (tangible, responsiveness, assurance and empathy) have positive association with student satisfaction, except reliability have negative association with student satisfaction

    The use of convolutional code for narrowband interference suppression in OFDM-DVBT system

    Get PDF
    The problem of mitigating narrowband interference (NBI) due to coexistence between Digital Video Broadcasting-Terrestrial (DVB-T) and International Mobile Telecommunication-Advanced (IMT-A) system is considered. It is assumed that a spectrum of IMT-A system between 790-862 MHz interfere the spectrum of the OFDM signal in DVB-T band. Two types of convolutional code (CC) which are non-systematic convolutional code (NSCC) and recursive systematic convolutional code (RSCC) are proposed to mitigate NBI. The performance of the two techniques is compared under additive white Gaussian noise (AWGN) channel. It is observed that NSCC has a better bit error rate (BER) performance than RSCC. The result showed good performance for low SNR (≤ 5dB)

    The modified Adomian decomposition method for solving Chaotic LĂĽ system

    Get PDF
    In this paper, a numerical scheme based on adaption of standard adomian decomposition method (ADM) is applied to thechaotic LĂĽ system. Then, the standard ADM is converted into a hybrid numeric-analytic method called the modified ADM (MADM). Numerical comparisons with the standard ADM and the fourth-order Runge-Kutta method (RK4) is made in order to prove that MADM is the reliable method for nonlinear problems

    Proposed system for data security in distributed computing in using ‎triple data encryption standard and ‎Rivest Shamir ‎Adlemen

    Get PDF
    Cloud computing is considered a distributed computing paradigm in which resources ‎are ‎provided as services. In cloud computing, the ‎applications do not run ‎from a user’s personal computer but are run and stored on distributed ‎servers on the Internet. The ‎resources of the cloud infrastructures are shared on cloud ‎computing on the Internet in the open ‎environment. This increases the security problems in ‎security such as data confidentiality, data ‎integrity and data availability, so the solution of such ‎problems are conducted by adopting data ‎encryption is very important for securing users data. ‎In this paper, a comparative ‎study is done between the two security algorithms on a cloud ‎platform called eyeOS. From the ‎comparative study it was found that the Rivest Shamir ‎Adlemen ‎(3kRSA) algorithm ‎outperforms that triple data encryption standard (3DES) algorithm with ‎respect to the complexity, and output bytes. The main ‎drawback of the 3kRSA algorithm is its ‎computation time, while 3DES is faster than that ‎‎3kRSA. This is useful for storing large amounts of ‎data used in the cloud computing, the key ‎distribution and authentication of the asymmetric ‎encryption, speed, data integrity and data ‎confidentiality of the symmetric encryption are also ‎important also it enables to execute ‎required computations on this encrypted data.
    • …
    corecore