32 research outputs found

    Teknik penyembunyian mesej dalam steganografi teks menggunakan pendekatan warna RGB dan penempatan rawak

    Get PDF
    Steganography is a technique that protects the confidentiality and integrity of data in a protective medium from suspicion of hidden data. The hiding of a message in a text medium can be performed on various text attributes such as type, style, size, and font color to generate a stego text. This study have identified two main problems that lead to the suspicion towards the stego text which is the obvious change of colors of the generated stego and the static representation of the secret message characters using sequential selection of hiding location. Therefore, the main objective of this study is to propose the use of specific value for each combination of Red, Green, Blue (RGB) color to reduce the generated stego text obvious color changes. This study also recommends a dynamic secret message representation method based on a randomly selected character location. A Homophonic Cipher Table was adapted as a method to generate the dynamic secret message characters. Besides, the Second Quotient Remainder Theorem was proposed to convert the secret message characters into a 3D representation by mapping (x,y,z) values to RGB color. The RGB color cube model values of RGB(0,0,0) to RGB(15,15,15) were used to format a selected cover text characters using the Pseudorandom Number Generator. The performance of stego text produced in this study was evaluated using three main measures namely capacity, imperceptibility, and robustness. The results revealed that the proposed method produces a better performance of secret message hiding by 41.31% increase in capacity and the Jaro Winkler's scale imperceptibility score of 1. The performance of stego text is proven to be robust as there is no difference compared to the cover text before and after the compression process. In conclusion, the proposed method has successfully reduced the generated stego text obviousness in the change of colors that lead to suspicion of existence of hidden message. Beside, this method also capable of producing dynamic secret messages using a single cover text

    Strategy to block traffic create by anti-cencorship software in LAN for small and medium organisation

    Get PDF
    Anti-censorship software originally develop to fight internet censorship in China.The anti censorship software such as Ultrasurf, Freegate, Gpass, GTunnel and FirePhoenixare become popular for the stubborn user who used the internet for thier own’s purpose and disobey the poilicies . Since it is widely use by users in organisation local area network to bypass firewall policies, it become a threat to LAN organization.Hence, it cause a problem for network administrator who manage the internet utilisation and enforcing internet policies.For an organisation, uncontrolled internet usage lead the opened system vulnerability to viruses, backdoor, non productivity activities and slow internet connection.Thus, this studies proposed strategies to filter and blocking traffic create by anti-censorship software in LAN. Method used in this project is “design computer security experiment”.Therefore, this project will guide the network administrator to control internet utilisation, protect organisation LAN and carried out implementation of the internal organization’s internet policies

    Access control list configuration to block anti-censorship software in higher education institutions in Malaysia

    Get PDF
    Anti-censorship software was originally developed to fight internet censorship in China.A anti-censorship software such as UltraSurf, Freegate, Gpass, GTunnel and FirePhoenix became popular with stubborn users who used the Internet for thier own purposes and disobeyed the organization’s policies.Statistics show that Facebook, and YouTube are ranked as the most popular websites used by college students in Malaysia.Since they are widely used by users in the local area network to bypass firewall policies, they have become a threat to the LAN organization.Hence, it causes a problem for network administrators who manage internet utilisation and enforce internet policies.For an organisation, uncontrolled internet usage leads the open system to be vulnerably to viruses, backdoor,non productivity activities and slow internet connections. Thus, this study proposes a strategy to filter and block traffic created by anti-censorship software in LAN.The method used in this project is the “design computer security experiment”.Therefore, this project will guide the network administrator to control internet utilisation, protect the organisation’s LAN and carry out the implementation of the internal organization’s internet policies.As a result, this paper has proposed a strategy to block the UltraSurf anti-censorship software.The proposed strategy was tested in several public and private higher education institutions

    An interaction between SCTP and on demand MANET routing protocols

    Get PDF
    Mobile Ad hoc Network (MANET) is a wireless network of mobile nodes that has no fixed routers.In MANET, mobile nodes can communicate via the wireless interface while nodes are moving freely without using the network infrastructure.Nowadays the performance of a new existence Internet protocol technology, that is Stream Control Transportation Protocol ( SCTP) in a MANET Routing Protocol still unknown.The general objective of this research is to analyze and make the comparative performance of SCTP with Ad-hoc On-demand Distance Vector (AODV) and Dynamic Source Routing protocol (DSR) using Network Simulator (NS-2).Specifically, this research is to measure the behavior of SCTP in terms of throughput and smoothness and; to determine routing protocol in Mobile Ad-hoc Network (MANET) either it has significant effect in SCTP.This research used Network Simulator 2 (NS-2), type of the traffic is Constant Bit Rate ( CBR) and packet size is 1000.The data sent consists of five speeds at 5 m/s, 10 m/s, 15 m/s, 20 m/s, 25 m/s, and then these speeds are used in AODV and DSR simulation.The result, of our study suggested that the SCTP throughput over AODV is higher than DSR and the smoothness of SCTP over DSR was higher than AODV for the five types of speed.In addition, there was no significant impact on throughput between AODV and DSR as the percentage difference was small (i.e., 0 to 2.4%).Furthermore, the speed of node movement does not significant affect the smoothness

    Network response time : Case study UUM ISLAN

    Get PDF
    This research was done descriptively in order to collect data about bandwidths, errors, traffics and ping latencies inside Integrated Sintok Local Area Network (ISLAN).The samples of study are restricted to the applications in University Information System (SMU).The data obtained through interview sessions with inter-varsity and distributed questionnaires were referred to as guidelines for network monitoring process using Cacti application.The data, which were recorded every five minutes by Cacti application, were analyzed.The data monitored by Cacti were packet inputs, packet outputs, errors in, errors out and total time connected in seconds.At the end of this study, few suggestions were presented in order to improve the SMU usage

    The usefulness of online questionnaire system among students in higher learning institution

    Get PDF
    Questionnaires are used in a wide range of settings to gather information about the views and behavior of individuals to inform people about the specific issues. Feedbacks of the questionnaires are used by the researcher to find an accurate result with supporting of statistical analysis functionalities. However, the resulting from the questionnaire is lack supported by the analyzing functionality.In addition, the overall trends and the performance of each question are analyzed by using the offline equations of the statistics analysis.This research focuses on the development of the questionnaire system by focusing on the ‘built-in' statistical analysis functionalities to facilitate as a test bed. The Online Questionnaire System (OQS) is developed in order to reduce loss of papers, time and effort.The general design methodology is represented by using Unified Model Language (UML). 29 students from higher learning institutions has been selected as a respondents to evaluated this system based on the usability and flexibility of the system.Mostly 44.8% persons very agree that the statistical analysis functions in Online Questionnaire website need to be implemented

    An analysis of alphabet-based techniques in text steganography

    Get PDF
    Steganography and cryptography are methods in information hiding.Cryptography scrambles the secret message, whereas steganography conceals a secret message in a carrier medium.An audio, video, image, and text can be used as a cover medium for hiding messages in steganography. The final output of steganography is a stego object that is sent to a receiver using a stego key. Suspiciousness of a generated stego text will encourage eavesdroppers to reveal the hidden message from stego text. Having reviewed substitution, injection, and propagation techniques for steganography, this paper discovers that there is a suspicion in the generated stego text. It is also discovered that text steganography using Genetic Algorithm (GA) is less focused by researchers compared to image and audio.Accordingly, this paper proposes that the adoption of GA should be focused in future works to protect stego text from suspiciousness due to the effectiveness and efficiency used in other media.Suspiciousness against stego text is very important in steganography to avoid third parties detecting the existence of secret message

    Capacity performance of steganography method in text based domain

    Get PDF
    Capacity is one of the performance factors in embedding process of any text steganography methods.A better embedding ratio and saving space ratio offers more text can be hidden inside cover text.This paper tries to evaluate several format based techniques of text steganography based on their embedding ratio and saving space capacity factors.This paper analysed the performance of text steganography methods which are changing in Alphabet Letter Patterns (CALP), Vertical Straight Line (VERT) and Quadruple Categorization (QUAD) methods based on these two factors.Embedding Ratio (ER) and Saving Space Ratio (SSR) is used to measure the performance.It has been identified that VERT method give a good effort performance compared to CALP and QUAD based method.In future, a robustness of text steganography methods should be considered as a next effort in order to find a strength capability on text steganography

    A web presence analysis of Malaysian government agency websites

    Get PDF
    The focus of this research is to identify the Malaysian government web presence stage,quality factors based on the last update period and downloading time and the website upadating problem from webmaster view the study employed a multi-method approach such as inspection method on selected websites. URL analyse using web diagnoslic tools and e-mail survey. An analysis of 74 government agencies website shows that the majority of Malaysian government website did not achieves the expected quality with only 31 percent which has been updated less than once a month and 76 percent are poor in downloading times (more than 10 seconds)
    corecore