Search results for: political message
2853 Unsupervised Sentiment Analysis for Indonesian Political Message on Twitter
Authors: Omar Abdillah, Mirna Adriani
Abstract:
In this work, we perform new approach for analyzing public sentiment towards the presidential candidate in the 2014 Indonesian election that expressed in Twitter. In this study we propose such procedure for analyzing sentiment over Indonesian political message by understanding the behavior of Indonesian society in sending message on Twitter. We took different approach from previous works by utilizing punctuation mark and Indonesian sentiment lexicon that completed with the new procedure in determining sentiment towards the candidates. Our experiment shows the performance that yields up to 83.31% of average precision. In brief, this work makes two contributions: first, this work is the preliminary study of sentiment analysis in the domain of political message that has not been addressed yet before. Second, we propose such method to conduct sentiment analysis by creating decision making procedure in which it is in line with the characteristic of Indonesian message on Twitter.Keywords: unsupervised sentiment analysis, political message, lexicon based, user behavior understanding
Procedia PDF Downloads 4792852 Application of Modulo-2 Arithmetic in Securing Communicated Messages throughout the Globe
Authors: Ejd Garba, Okike Benjamin
Abstract:
Today, the word encryption has become very popular even among non-computer professionals. There is no doubt that some works have been carried out in this area, but more works need to be done. Presently, most of the works on encryption is concentrated on the sender of the message without paying any attention to the message recipient. However, it is a good practice if any message sent to someone is received by the particular person whom the message is sent to. This work seeks to ensure that at the receiving end of the message, there is a security to ensure that the recipient computes a key that would enable the encrypted message to be accessed. This key would be in form of password. This would make it possible for a given message to be sent to several people at the same time. When this happens, it is only those people who computes the key correctly that would be given the opportunity to access even the encrypted message, which can in turn be decrypted using the appropriate key.Keywords: arithmetic, cyber space, modulo-2, information security
Procedia PDF Downloads 3192851 Advertising Message Strategy on Ghana’s TV
Authors: Aisha Iddrisu, Ferruh Uztuğ
Abstract:
This study is a quantitative content analysis of advertising message strategies used in Ghana’s TV commercials (2020-2021) using the modified strategy of Wang and Praet (2016) with the objective of exploring the various advertising message strategies used in Ghana’s TV advertisement, its variation according to product category including the most widely used message strategy. The findings indicate that, out of the 220 commercials used in the study, the Affective message strategy (n=122, 55%) was the dominant message strategy used in Ghana’s TV commercials. The most advertised product category in Ghana’s TV commercials (2020-2021) was the food category, and a significant relationship was observed between message strategy and product category as well as message strategy and brand type.Keywords: advertising, message strategy, Ghana, television
Procedia PDF Downloads 1822850 Ethics in the Islamic Political System
Authors: Djehich Mohamed Yousri
Abstract:
This research deals with an important issue in Islamic political thought, which is the relationship of ethics to the Islamic political system. This is done by following the legal politics books and analyzing their texts in order to reach the moral values on which the political system in Islam is based, starting from the concept of politics to the political principles and conditions of the ruler and the reasons for his removal and the conditions of those authorized to choose him, and ending with the ruler’s relationship with his people, and the relationship of the Islamic state with other countries. The research concluded that moral values are the basis of the political system in Islam, and the reason for this is due to the fact that Islam is a religion and a global and realistic human system that embraces morals and higher values in order to preserve its lofty message and calls for brotherhood, love, and justice and does not harm human morals. And if the reality of politics in the Islamic world today is not related to the moral values and the lofty message of Islam, this research tries to show the origins of political theory in Islam, and the purpose of the Islamic political system, towards the morality of politics.Keywords: moral, politics, islam, political system, islamic political system
Procedia PDF Downloads 1032849 Mathematical Model That Using Scrambling and Message Integrity Methods in Audio Steganography
Authors: Mohammed Salem Atoum
Abstract:
The success of audio steganography is to ensure imperceptibility of the embedded message in stego file and withstand any form of intentional or un-intentional degradation of message (robustness). Audio steganographic that utilized LSB of audio stream to embed message gain a lot of popularity over the years in meeting the perceptual transparency, robustness and capacity. This research proposes an XLSB technique in order to circumvent the weakness observed in LSB technique. Scrambling technique is introduce in two steps; partitioning the message into blocks followed by permutation each blocks in order to confuse the contents of the message. The message is embedded in the MP3 audio sample. After extracting the message, the permutation codebook is used to re-order it into its original form. Md5sum and SHA-256 are used to verify whether the message is altered or not during transmission. Experimental result shows that the XLSB performs better than LSB.Keywords: XLSB, scrambling, audio steganography, security
Procedia PDF Downloads 3622848 Exploring Framing Effect and Repetition Effect of the Persuasive Message on Moral Decision Making in Conflict of Interests
Authors: Sae-Yeon Seong, EunSun Chung, Dongjoo Chin
Abstract:
Conflict of interest (COI) is one of the dominant circumstantial factors of moral corruption across various fields. Several management strategies have been proposed to prevent self-interested decision making in COIs. Among these strategies, message persuasion has been considered as a practical and effective approach. Framing and repetition are two of the major factors in the persuasion effect of message. Therefore, their effect on moral decision making in COI should be explored systematically. The purpose of this study was to compare the differential effects of positively framed message and negatively framed message, and secondly, to investigate how the effectiveness of persuasive message changes through repetitive exposures. A total of 63 participants were randomly assigned to one of 3 framing conditions: positive framing, negative framing, and no-message condition. Prior to the online experiment involving a consultation task, the differently framed persuasive message was presented to the participants. This process was repeated four times in a row. The results showed that participants with positive-framing message were less likely to provide self-interested consultation than participants in the no-message condition. Also, a U-shaped quadric relation between repetition and self-interest consultation was found. Implications and limitations are further discussed.Keywords: conflicts of interest, persuasive message, framing effect, repetition effect, self-interested behavior
Procedia PDF Downloads 1742847 Pattern in Splitting Sequence in Okike’s Merged Irregular Transposition Cipher for Encrypting Cyberspace Messages
Authors: Okike Benjamin, E. J. D. Garba
Abstract:
The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. The researchers in this work propose a new encryption technique to be known as Merged Irregular Transposition Cipher. In this proposed encryption technique, a message to be encrypted will first of all be split into multiple parts depending on the length of the message. After the split, different keywords are chosen to encrypt different parts of the message. After encrypting all parts of the message, the positions of the encrypted message could be swapped to other position thereby making it very difficult to decrypt by any unauthorized user.Keywords: information security, message splitting, pattern, sequence
Procedia PDF Downloads 2862846 When Messages Cause Distraction from Advertising: An Eye-Tracking Study
Authors: Nilamadhab Mohanty
Abstract:
It is essential to use message formats that make communication understandable and correct. It is because; the information format can influence consumer decision on the purchase of a product. This study combines information from qualitative inquiry, media trend analysis, eye tracking experiment, and questionnaire data to examine the impact of specific message format and consumer perceived risk on attention to the information and risk retention. We investigated the influence of message framing (goal framing, attribute framing, and mix framing) on consumer memory, study time, and decisional uncertainty while deciding on the purchase of drugs. Furthermore, we explored the impact of consumer perceived risk (associated with the use of the drug, i.e., RISK-AB and perceived risk associated with the non-use of the drug, i.e., RISK-EB) on message format preference. The study used eye-tracking methods to understand the differences in message processing. Findings of the study suggest that the message format influences information processing, and participants' risk perception impacts message format preference. Eye tracking can be used to understand the format differences and design effective advertisements.Keywords: message framing, consumer perceived risk, advertising, eye tracking
Procedia PDF Downloads 1212845 Use of Personal Rhythm to Authenticate Encrypted Messages
Authors: Carlos Gonzalez
Abstract:
When communicating using private and secure keys, there is always the doubt as to the identity of the message creator. We introduce an algorithm that uses the personal typing rhythm (keystroke dynamics) of the message originator to increase the trust of the authenticity of the message originator by the message recipient. The methodology proposes the use of a Rhythm Certificate Authority (RCA) to validate rhythm information. An illustrative example of the communication between Bob and Alice and the RCA is included. An algorithm of how to communicate with the RCA is presented. This RCA can be an independent authority or an enhanced Certificate Authority like the one used in public key infrastructure (PKI).Keywords: authentication, digital signature, keystroke dynamics, personal rhythm, public-key encryption
Procedia PDF Downloads 3032844 Carrier Communication through Power Lines
Authors: Pavuluri Gopikrishna, B. Neelima
Abstract:
Power line carrier communication means audio power transmission via power line and reception of the amplified audio power at the receiver as in the form of speaker output signal using power line as the channel medium. The main objective of this suggested work is to transmit our message signal after frequency modulation by the help of FM modulator IC LM565 which gives output proportional to the input voltage of the input message signal. And this audio power is received from the power line by the help of isolation circuit and demodulated from IC LM565 which uses the concept of the PLL and produces FM demodulated signal to the listener. Message signal will be transmitted over the carrier signal that will be generated from the FM modulator IC LM565. Using this message signal will not damage because of no direct contact of message signal from the power line, but noise can disturb our information.Keywords: amplification, fm demodulator ic 565, fm modulator ic 565, phase locked loop, power isolation
Procedia PDF Downloads 5492843 Political Manipulation in Global Discourse
Authors: Gohar Madoyan, Kristine Harutyunyan, Gevorg Barseghyan
Abstract:
It is common knowledge that linguistic manipulation is and has always been a powerful instrument of political discourse. Politicians from different countries and through centuries have successfully used linguistic means to persuade the public. Yet, this persuasion should be linguistically unobtrusive. Small changes in wording may result in a huge difference in perception by the audience. Thus, manipulation is a strategy that is mostly used to convey a certain message to the manipulators, who should be aware of the vulnerabilities of their audience and who must use them to achieve control. Political manipulation, though commonly observed in the 21st century, can easily be traced back to ancient rhetoric, which warns us to choose words carefully while addressing the audience. On the other hand, modern manipulative techniques have become more sophisticated, making use of all scientific advances.Keywords: manipulators, politics, persuasion, political discourse, linguo-stylistic analysis, rhetoric
Procedia PDF Downloads 842842 The Effect of ‘Love Accounting’ on Gift Budgeting
Authors: Yanan Wang
Abstract:
It is proposed that when people give a gift they engage in 'love accounting', so that they will spend less on it if they include a written expression of love with it. This hypothesis was tested with college students (N = 308). It was found that participants who wrote a love message to accompany a Mother's Day gift budgeted less for the gift itself than control participants (Experiment 1), and this effect was replicated for a Christmas gift (Experiment 2). The amount of effort expended by the giver on preparing the love message did not account for the effect (Experiment 3). It is concluded that a gift and its accompanying love message are mentally computed as belonging to the same love account, implying that consumers’ excessive splurging on gifts might be controlled by writing a love message before gift shopping.Keywords: expression of love, gift-giving, gift-budgeting, mental accounting
Procedia PDF Downloads 3272841 A New Method for Fault Detection
Authors: Mehmet Hakan Karaata, Ali Hamdan, Omer Yusuf Adam Mohamed
Abstract:
Consider a distributed system that delivers messages from a process to another. Such a system is often required to deliver each message to its destination regardless of whether or not the system components experience arbitrary forms of faults. In addition, each message received by the destination must be a message sent by a system process. In this paper, we first identify the necessary and sufficient conditions to detect some restricted form of Byzantine faults referred to as modifying Byzantine faults. An observable form of a Byzantine fault whose effect is limited to the modification of a message metadata or content, timing and omission faults, and message replay is referred to as a modifying Byzantine fault. We then present a distributed protocol to detect modifying Byzantine faults using optimal number of messages over node-disjoint paths.Keywords: Byzantine faults, distributed systems, fault detection, network protocols, node-disjoint paths
Procedia PDF Downloads 4452840 Trump’s COVID-19 Discourse: Downgrading the Fundamentals of the Political Fair Play
Authors: Gustavo Naranjo Maroto, Dolores Fernandez Martinez
Abstract:
Context has always been essential to understand any reaction from every human being, and words, whether written or spoken, are definitely a powerful representative sample of human reaction. This study starts with an accurate breakdown of the context in which the current president of the US, Mr. Donald J. Trump is conveying his discourses in order to be able to judge them from a critical discourse analysis point of view. The present world’s scenario with a pandemic disease in form of Covid-19 that is threatening the world and certainly putting at risk the so called 'Welfare State', the role of the United States as the first superpower on earth nowadays, the very peculiar profile of President Trump not only as a politician but as a persona, and the fact of being on the verge of a very controversial presidential elections are without doubt a great and undeniable opportunity for the implementation of the critical discourse analysis methodology. Hence, this research will primarily analyze in detail some of the most interesting discourses delivered by Trump in different media since the very beginning of the outbreak of the coronavirus pandemic in the United States of America (February, 2020), sadly very often downplayed by President Trump, until the final result of the upcoming presidential election scheduled for Tuesday, November 3, 2020, where the political discourse has been dramatically downgraded to a very dangerous state, putting in jeopardy the fundamentals of the political fair play in terms of speech. Finally, the study will hopefully conclude with the final outcome of the data analyzed, allowing to picture how significant the context can be concerning linguistics on the one hand, in terms of shaping or altering the message that the issuer thought to convey in the first place, and on the other hand, generously assessing to what extend the recipients of the message are influenced by the message in terms of receptiveness.Keywords: Covid-19, critical discourse analysis, Donald J. Trump, political discourse
Procedia PDF Downloads 1302839 Modifying Byzantine Fault Detection Using Disjoint Paths
Authors: Mehmet Hakan Karaata, Ali Hamdan, Omer Yusuf Adam Mohamed
Abstract:
Consider a distributed system that delivers messages from a process to another. Such a system is often required to deliver each message to its destination regardless of whether or not the system components experience arbitrary forms of faults. In addition, each message received by the destination must be a message sent by a system process. In this paper, we first identify the necessary and sufficient conditions to detect some restricted form of Byzantine faults referred to as modifying Byzantine faults. An observable form of a Byzantine fault whose effect is limited to the modification of a message metadata or content, timing and omission faults, and message replay is referred to as a modifying Byzantine fault. We then present a distributed protocol to detect modifying Byzantine faults using optimal number of messages over node-disjoint paths.Keywords: Byzantine faults, distributed systems, fault detection, network pro- tocols, node-disjoint paths
Procedia PDF Downloads 5642838 Secure Content Centric Network
Authors: Syed Umair Aziz, Muhammad Faheem, Sameer Hussain, Faraz Idris
Abstract:
Content centric network is the network based on the mechanism of sending and receiving the data based on the interest and data request to the specified node (which has cached data). In this network, the security is bind with the content not with the host hence making it host independent and secure. In this network security is applied by taking content’s MAC (message authentication code) and encrypting it with the public key of the receiver. On the receiver end, the message is first verified and after verification message is saved and decrypted using the receiver's private key.Keywords: content centric network, client-server, host security threats, message authentication code, named data network, network caching, peer-to-peer
Procedia PDF Downloads 6422837 RSU Aggregated Message Delivery for VANET
Authors: Auxeeliya Jesudoss, Ashraph Sulaiman, Ratnakar Kotnana
Abstract:
V2V communication brings up several questions of scalability issues although message sharing in vehicular ad-hoc networks comprises of both Vehicle-to-Vehicle communications (V2V) and Vehicle to Infrastructure communication (V2I). It is not an easy task for a vehicle to verify all signatures of the messages sent by its neighboring vehicles in a timely manner, without resulting in message loss. Moreover, the communication overhead of a vehicle to authenticate another vehicle would increase together with the security of the system. Another issue to be addressed is the continuous mobility of vehicles which requires at least some information on the node’s own position to be revealed to the neighboring vehicles. This may facilitate the attacker to congregate information on a node’s position or its mobility patterns. In order to tackle these issues, this paper introduces a RSU aggregated message deliverance scheme called RAMeD. With RAMeD, roadside units (RSUs) are responsible for verifying the identity of the vehicles entering in its range, collect messages from genuine vehicles and to aggregate similar messages into groups before sending them to all the vehicles in its communication range. This aggregation will tremendously improve the rate of message delivery and reduce the message lose ratio by avoiding similar messages being sent to the vehicles redundantly. The proposed protocol is analyzed extensively to evaluate its merits and efficiency for vehicular communication.Keywords: vehicular ad-hoc networks, V2V, V2I, VANET communication, scalability, message aggregation
Procedia PDF Downloads 4072836 Model Estimation and Error Level for Okike’s Merged Irregular Transposition Cipher
Authors: Okike Benjamin, Garba E. J. D.
Abstract:
The researcher has developed a new encryption technique known as Merged Irregular Transposition Cipher. In this cipher method of encryption, a message to be encrypted is split into parts and each part encrypted separately. Before the encrypted message is transmitted to the recipient(s), the positions of the split in the encrypted messages could be swapped to ensure more security. This work seeks to develop a model by considering the split number, S and the average number of characters per split, L as the message under consideration is split from 2 through 10. Again, after developing the model, the error level in the model would be determined.Keywords: merged irregular transposition, error level, model estimation, message splitting
Procedia PDF Downloads 3122835 How Message Framing and Temporal Distance Affect Word of Mouth
Authors: Camille Lacan, Pierre Desmet
Abstract:
In the crowdfunding model, a campaign succeeds by collecting the funds required over a predefined duration. The success of a CF campaign depends both on the capacity to attract members of the online communities concerned, and on the community members’ involvement in online word-of-mouth recommendations. To maximize the campaign's success probability, project creators (i.e., an organization appealing for financial resources) send messages to contributors to ask them to issue word of mouth. Internet users relay information about projects through Word of Mouth which is defined as “a critical tool for facilitating information diffusion throughout online communities”. The effectiveness of these messages depends on the message framing and the time at which they are sent to contributors (i.e., at the start of the campaign or close to the deadline). This article addresses the following question: What are the effect of message framing and temporal distance on the willingness to share word of mouth? Drawing on Perspectives Theory and Construal Level Theory, this study examines the interplay between message framing (Gains vs. Losses) and temporal distance (message while the deadline is coming vs. far) on intention to share word of mouth. A between-subject experimental design is conducted to test the research model. Results show significant differences between a loss-framed message (lack of benefits if the campaign fails) associated with a short deadline (ending tomorrow) compared to a gain-framed message (benefits if the campaign succeeds) associated with a distant deadline (ending in three months). However, this effect is moderated by the anticipated regret of a campaign failure and the temporal orientation. These moderating effects contribute to specifying the boundary condition of the framing effect. Handling the message framing and the temporal distance are thus the key decisions to influence the willingness to share word of mouth.Keywords: construal levels, crowdfunding, message framing, word of mouth
Procedia PDF Downloads 2512834 The Impact of Political Satire on the Balance of Political Powers in Egypt: The Case of El-Bernameg in Egypt
Authors: Sally Barsoum
Abstract:
This paper is providing a significant insight into the role of satire in Egyptian politics and how it has been received from the government and viewer’s point of view. It mainly sets out to test whether Bassem Youssef’s satirical program has played a significant role in Egypt recent politics and to investigate what is the nature and extent of this role. In order to test this hypothesis, the researcher chose to critically analyze one episode of Bassem Youssef’s satirical show, El Bernameg. This paper goes further to highlight that the aims of satire is to invite citizens to analyze, criticize and question people in power and the realm of politics rather than remain as untouched subjects by combining humor with critique in order to enhance citizens’ political awareness and perhaps even political engagement. Moreover it identifies that Bassem Youssef’s satire is to use laughter as a medium to communicate his political message. By first informing the public and secondly engaging them through laughter, satire plays a very constructive political role, which have been argued finally that Bassem Youssef has indeed played an important part in the Egyptian political scene of today and this can be measured by the degree of censorship that he has been subject to and the level of international and domestic reaction towards his satirical show. At the end, this paper is suggesting that the measure of a strong government is its ability not only to accommodate satire but also to learn from it.Keywords: political satirist, Bassem Youssef, capital broadcasting center, TV channel, muslims brotherhood regime, ONTV Egyptian TV channel
Procedia PDF Downloads 3212833 Propagation of the Effects of Certain Types of Military Psychological Operations in a Networked Population
Authors: Colette Faucher
Abstract:
In modern asymmetric conflicts, the Armed Forces generally have to intervene in countries where the internal peace is in danger. They must make the local population an ally in order to be able to deploy the necessary military actions with its support. For this purpose, psychological operations (PSYOPs) are used to shape people’s behaviors and emotions by the modification of their attitudes in acting on their perceptions. PSYOPs aim at elaborating and spreading a message that must be read, listened to and/or looked at, then understood by the info-targets in order to get from them the desired behavior. A message can generate in the info-targets, reasoned thoughts, spontaneous emotions or reflex behaviors, this effect partly depending on the means of conveyance used to spread this message. In this paper, we focus on psychological operations that generate emotions. We present a method based on the Intergroup Emotion Theory, that determines, from the characteristics of the conveyed message and of the people from the population directly reached by the means of conveyance (direct info-targets), the emotion likely to be triggered in them and we simulate the propagation of the effects of such a message on indirect info-targets that are connected to them through the social networks that structure the population.Keywords: military psychological operations, social identity, social network, emotion propagation
Procedia PDF Downloads 4092832 Prosody of Text Communication: Inducing Synchronization and Coherence in Chat Conversations
Authors: Karolina Ziembowicz, Andrzej Nowak
Abstract:
In the current study, we examined the consequences of adding prosodic cues to text communication by allowing users to observe the process of message creation while engaged in dyadic conversations. In the first condition, users interacted through a traditional chat that requires pressing ‘enter’ to make a message visible to an interlocutor. In another, text appeared on the screen simultaneously as the sender was writing it, letter after letter (Synchat condition), so that users could observe the varying rhythm of message production, precise timing of message appearance, typos and their corrections. The results show that the ability to observe the dynamics of message production had a twofold effect on the social interaction process. First, it enhanced the relational aspect of communication – interlocutors synchronized their emotional states during the interaction, their communication included more statements on relationship building, and they evaluated the Synchat medium as more personal and emotionally engaging. Second, it increased the coherence of communication, reflected in greater continuity of the topics raised in Synchat conversations. The results are discussed from the interaction design (IxD) perspective.Keywords: chat communication, online conversation, prosody, social synchronization, interaction incoherence, relationship building
Procedia PDF Downloads 1402831 Islam, Tolerance and Anti-Terrorism: A Critical Assessment with Reference to the Royal 'Amman Message'
Authors: Adnan M. Al Assaf
Abstract:
This research project aims to assess the methods of enhancing tolerant thinking and behavior among Muslim societies. This is in addition to spreading the anti-terrorist approach in their communities. The critical assessment for the Islamic major texts in question is the selected way for convincing, as Muslims adopt these sources as the authentic references for their lives and cultures. Moreover, this research devotes a special room to the analysis of the royal ‘Amman Message’ as a contemporary Islamic approach for enhancing tolerance and anti-terrorism from an Islamic perspective. The paper includes the study of the related concepts, texts, practical applications, with some reference to the history of Islam in human interaction, accepting the others, mercy with minorities, protecting human rights. Furthermore, it assesses the methods of enhancing tolerance and minimizing the terrorist thinking and behavior practically, in the view of Amman message, as well.Keywords: Islam, tolerance, anti-terrorism, coexistence, Amman Message
Procedia PDF Downloads 4572830 Secure Message Transmission Using Meaningful Shares
Authors: Ajish Sreedharan
Abstract:
Visual cryptography encodes a secret image into shares of random binary patterns. If the shares are exerted onto transparencies, the secret image can be visually decoded by superimposing a qualified subset of transparencies, but no secret information can be obtained from the superposition of a forbidden subset. The binary patterns of the shares, however, have no visual meaning and hinder the objectives of visual cryptography. In the Secret Message Transmission through Meaningful Shares a secret message to be transmitted is converted to grey scale image. Then (2,2) visual cryptographic shares are generated from this converted gray scale image. The shares are encrypted using A Chaos-Based Image Encryption Algorithm Using Wavelet Transform. Two separate color images which are of the same size of the shares, taken as cover image of the respective shares to hide the shares into them. The encrypted shares which are covered by meaningful images so that a potential eavesdropper wont know there is a message to be read. The meaningful shares are transmitted through two different transmission medium. During decoding shares are fetched from received meaningful images and decrypted using A Chaos-Based Image Encryption Algorithm Using Wavelet Transform. The shares are combined to regenerate the grey scale image from where the secret message is obtained.Keywords: visual cryptography, wavelet transform, meaningful shares, grey scale image
Procedia PDF Downloads 4552829 Proposed Terminal Device for End-to-End Secure SMS in Cellular Networks
Authors: Neetesh Saxena, Narendra S. Chaudhari
Abstract:
Nowadays, SMS is a very popular mobile service and even the poor, illiterate people and those living in rural areas use SMS service very efficiently. Although many mobile operators have already started 3G and 4G services, 2G services are still being used by the people in many countries. In 2G (GSM), only encryption provided is between the MS and the BTS, there is no end-to-end encryption available. Sometimes we all need to send some confidential message to other person containing bank account number, some password, financial details, etc. Normally, a message is sent in plain text only to the recipient and it is not an acceptable standard for transmitting such important and confidential information. Authors propose an end-to-end encryption approach by proposing a terminal for sending/receiving a secure message. An asymmetric key exchange algorithm is used in order to transmit secret shared key securely to the recipient. The proposed approach with terminal device provides authentication, confidentiality, integrity and non-repudiation.Keywords: AES, DES, Diffie-Hellman, ECDH, A5, SMS
Procedia PDF Downloads 4142828 Data Hiding in Gray Image Using ASCII Value and Scanning Technique
Authors: R. K. Pateriya, Jyoti Bharti
Abstract:
This paper presents an approach for data hiding methods which provides a secret communication between sender and receiver. The data is hidden in gray-scale images and the boundary of gray-scale image is used to store the mapping information. In this an approach data is in ASCII format and the mapping is in between ASCII value of hidden message and pixel value of cover image, since pixel value of an image as well as ASCII value is in range of 0 to 255 and this mapping information is occupying only 1 bit per character of hidden message as compared to 8 bit per character thus maintaining good quality of stego image.Keywords: ASCII value, cover image, PSNR, pixel value, stego image, secret message
Procedia PDF Downloads 4112827 Determination of Complexity Level in Merged Irregular Transposition Cipher
Authors: Okike Benjamin, Garba Ejd
Abstract:
Today, it has been observed security of information along the superhighway is often compromised by those who are not authorized to have access to such information. In order to ensure the security of information along the superhighway, such information should be encrypted by some means to conceal the real meaning of the information. There are many encryption techniques out there in the market. However, some of these encryption techniques are often easily decrypted by adversaries. The researcher has decided to develop an encryption technique that may be more difficult to decrypt. This may be achieved by splitting the message to be encrypted into parts and encrypting each part separately and swapping the positions before transmitting the message along the superhighway. The method is termed Merged Irregular Transposition Cipher. Also, the research would determine the complexity level in respect to the number of splits of the message.Keywords: transposition cipher, merged irregular cipher, encryption, complexity level
Procedia PDF Downloads 3432826 Psychological Reactance to Anti-Piracy Messages Explained by Gender and Attitudes
Authors: Kate Whitman, Zahra Murad, Joe Cox
Abstract:
Digital piracy is costly to creative economies across the world. Anti-piracy messages can cause people to pirate more rather than less, suggesting the presence of psychological reactance. Gender differences in message reactance and the moderating impact of attitudes have not been explored. In this paper, we examine whether messages based on real-world anti-piracy campaigns cause reactance and whether this effect is explained by gender and attitudes. An experiment compares two threatening and one prosocial message against a control group, with changes in piracy intention from past behavior for digital TV/film analysed. The results suggest that the prosocial message is ineffective for both genders. However, the threatening messages have significantly opposing effects on men and women. One threatening message influences women to reduce their piracy intentions by over 50% and men to increase it by 18%. Gender effects are moderated by pre-existing attitudes, with men and women who report the most favorable attitudes towards piracy having the most polarised changes in piracy intentions. The results suggest that men and women process threatening messages differently and that the creative industries should take care when targeting their messages.Keywords: piracy, reactance, persuasive-messages, TV/film, gender
Procedia PDF Downloads 942825 Maintaining User-Level Security in Short Message Service
Authors: T. Arudchelvam, W. W. E. N. Fernando
Abstract:
Mobile phone has become as an essential thing in our life. Therefore, security is the most important thing to be considered in mobile communication. Short message service is the cheapest way of communication via the mobile phones. Therefore, security is very important in the short message service as well. This paper presents a method to maintain the security at user level. Different types of encryption methods are used to implement the user level security in mobile phones. Caesar cipher, Rail Fence, Vigenere cipher and RSA are used as encryption methods in this work. Caesar cipher and the Rail Fence methods are enhanced and implemented. The beauty in this work is that the user can select the encryption method and the key. Therefore, by changing the encryption method and the key time to time, the user can ensure the security of messages. By this work, while users can safely send/receive messages, they can save their information from unauthorised and unwanted people in their own mobile phone as well.Keywords: SMS, user level security, encryption, decryption, short message service, mobile communication
Procedia PDF Downloads 3942824 Determination of Complexity Level in Okike's Merged Irregular Transposition Cipher
Authors: Okike Benjami, Garba Ejd
Abstract:
Today, it has been observed security of information along the superhighway is often compromised by those who are not authorized to have access to such information. In other to ensure the security of information along the superhighway, such information should be encrypted by some means to conceal the real meaning of the information. There are many encryption techniques out there in the market. However, some of these encryption techniques are often decrypted by adversaries with ease. The researcher has decided to develop an encryption technique that may be more difficult to decrypt. This may be achieved by splitting the message to be encrypted into parts and encrypting each part separately and swapping the positions before transmitting the message along the superhighway. The method is termed Okike’s Merged Irregular Transposition Cipher. Also, the research would determine the complexity level in respect to the number of splits of the message.Keywords: transposition cipher, merged irregular cipher, encryption, complexity level
Procedia PDF Downloads 288