2014 International Conference on Computer, Control, Informatics and Its Applications (IC3INA)最新文献

筛选
英文 中文
Implementation of steganography using LSB with encrypted and compressed text using TEA-LZW on Android 在Android平台上使用TEA-LZW对加密和压缩的文本使用LSB实现隐写
Made Adi Paramartha Putra, Gelar Budiman, L. Novamizanti
{"title":"Implementation of steganography using LSB with encrypted and compressed text using TEA-LZW on Android","authors":"Made Adi Paramartha Putra, Gelar Budiman, L. Novamizanti","doi":"10.1109/IC3INA.2014.7042607","DOIUrl":"https://doi.org/10.1109/IC3INA.2014.7042607","url":null,"abstract":"The development of data communications enabling the exchange of information via mobile devices more easily. Security in the exchange of information on mobile devices is very important. One of the weaknesses in steganography is the capacity of data that can be inserted. With compression, the size of the data will be reduced. In this paper, designed a system application on the Android platform with the implementation of LSB steganography and cryptography using TEA to the security of a text message. The size of this text message may be reduced by performing lossless compression technique using LZW method. The advantages of this method is can provide double security and more messages to be inserted, so it is expected be a good way to exchange information data. The system is able to perform the compression process with an average ratio of 67.42 %. Modified TEA algorithm resulting average value of avalanche effect 53.8%. Average result PSNR of stego image 70.44 dB. As well as average MOS values is 4.8.","PeriodicalId":120043,"journal":{"name":"2014 International Conference on Computer, Control, Informatics and Its Applications (IC3INA)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134068481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Insertion attack effects on some PRNGs based on NIST randomness tests tool: Case study on ANSI-X9.17, ANSIX9.31, Dragon and Rabbit algorithms 基于NIST随机测试工具的插入攻击对部分prng的影响:以ANSI-X9.17、ANSIX9.31、Dragon和Rabbit算法为例
S. Indarjani, Gigih Supriyatno, A. Nugraha, I Made Mustika Astawa
{"title":"Insertion attack effects on some PRNGs based on NIST randomness tests tool: Case study on ANSI-X9.17, ANSIX9.31, Dragon and Rabbit algorithms","authors":"S. Indarjani, Gigih Supriyatno, A. Nugraha, I Made Mustika Astawa","doi":"10.1109/IC3INA.2014.7042624","DOIUrl":"https://doi.org/10.1109/IC3INA.2014.7042624","url":null,"abstract":"Based on previous research [1], the 1-bit insertion attack with random bits on AES-based PRNG had some effects on randomness property of the output sequences after the attack, where about 8 from total 45 experiments (17.17%) had failed test at most 3 tests on AES-128, 11 experiments from 45 (24.44%) on AES-192 mostly had one failed test where only one experiment has two failed tests, and on AES 256 we got 10 experiments from 45 (22.22%) had failed test at most 3 tests, where 8 of them just have one test. So globally the 1-bit insertion attack with random bits affected the randomness property of AES-based PRNG even not significant based on NIST randomness tests under α =0.01. In this research, we also expand the case study on the other 4 algorithms ANSI X9.17, X9.31, Dragon and Rabbit Stream Cipher. The scenario still the same with level of significant α = 0.01. From the experiments, we found that the insertion attack with random bits on the four algorithms has affected the randomness property of the output sequences after the attack indicated by at least 2 experiments from 30 experiments on each algorithms has failed tests at most 2 tests on average on each experiment. The effects are increasing for higher intensity level. Among the 4 algorithms, the Dragon-based algorithm is stronger against the three other algorithms indicated by only 2 failed tests occurred in two different experiments. It is also shown that the insertion attack effect with extreme bits is very significant which may danger the randomness of the target PRNG that should be anticipated.","PeriodicalId":120043,"journal":{"name":"2014 International Conference on Computer, Control, Informatics and Its Applications (IC3INA)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133505991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of slotted and unslotted CSMA/CA Wireless Sensor Network for E-healthcare system 电子医疗系统中CSMA/CA无线传感器网络的开槽和非开槽分析
M. A. Rasyid, Isbat Uzzin Nadhori, Amang Sudarsono, Ridho Luberski
{"title":"Analysis of slotted and unslotted CSMA/CA Wireless Sensor Network for E-healthcare system","authors":"M. A. Rasyid, Isbat Uzzin Nadhori, Amang Sudarsono, Ridho Luberski","doi":"10.1109/IC3INA.2014.7042600","DOIUrl":"https://doi.org/10.1109/IC3INA.2014.7042600","url":null,"abstract":"Wireless Sensor Network (WSN) have emerged as an important area for research and development because of their application such as in e-healthcare monitoring system. This paper presents and discusses the performance of slotted and unslotted Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol WSN for medical system, with a few additions to the protocol and adequate tuning parameters. Performance of slotted and unslotted protocol CSMA/CA were evaluated and analyzed for different network configurations to understand the impact of protocol parameters such as Superframe Order (SO), Beacon Order (BO), Backoff Exponent (BE), and Maximum Backoff Exponent (maxBE). Network performances Quality of Service (QoS) are analyzed, namely Throughput, Power Consumption, Average Delay, and Packet Success Probability. The proposed work is implemented in Network Simulator 2 (NS2). The performance of the protocol CSMA/CA was evaluated for WSN star topology. The simulation results show that of unslotted CSMA/CA is better than slotted CSMA/CA in terms of the packet success probability, energy consumption, and delay. While slotted CSMA/CA is better than unslotted CSMA/CA in term of throughput.","PeriodicalId":120043,"journal":{"name":"2014 International Conference on Computer, Control, Informatics and Its Applications (IC3INA)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132314563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Analysis of digital mammograms for detection of breast cancer 数字乳房x线照片对乳腺癌检测的分析
H. A. Nugroho, N. Faisal, I. Soesanti, L. Choridah
{"title":"Analysis of digital mammograms for detection of breast cancer","authors":"H. A. Nugroho, N. Faisal, I. Soesanti, L. Choridah","doi":"10.1109/IC3INA.2014.7042595","DOIUrl":"https://doi.org/10.1109/IC3INA.2014.7042595","url":null,"abstract":"Digital mammogram has become the most effective technique for early breast cancer detection. The most common abnormality that may indicate breast cancer is masses. The challenge lies in early and accurate detection to overcome the development of breast cancer that affects more and more women throughout the world. Computer Aided Diagnosis (CAD) is used to help the radiologist in interpretation and recognition the pattern of the mammogram abnormality. The main objective of this research is to perform and analyze the contrast enhancement and feature selection method in order to build a CAD to discriminate normal, benign, and malignant. Preprocessing needs to enhance the poor quality of image and remove the artifact caused by preprocessing step. ROI as the suspicious area segmented, and then extracted by texture feature approach. High dimensionality of feature is selected by feature selection technique and would be classified according to their class each other. The digital mammogram images are taken from the Private database of Oncology Clinic Kotabaru Yogyakarta. The dataset consists of 40 mammogram images with 14 benign cases, 6 malignant cases, and 20 normal cases. The proposed method in preprocessing step made the image enhanced and proved by MSE and PSNR value. Histogram and gray level co-occurrence matrix (GLCM) as the texture feature are used to extract the suspicious area. Correlation based feature selection (CFS) is used to select the best feature among 12 extracted features before. Mean, standard deviation, smoothness, angular second moment (ASM), entropy, and correlation are the best feature that guarantee the improvement of classification with less feature dimension. The result shows that the proposed method was achieved the accuracy 96.66%, sensitivity 96.73%, specificity 97.35% and ROC 96.6% It is expected to contribute for helping the radiologist as material consideration in decision-making.","PeriodicalId":120043,"journal":{"name":"2014 International Conference on Computer, Control, Informatics and Its Applications (IC3INA)","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121563847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An implementation of secure wireless sensor network for e-healthcare system 电子医疗系统安全无线传感器网络的实现
Amang Sudarsono, M. A. Rasyid, Hendhi Hermawan
{"title":"An implementation of secure wireless sensor network for e-healthcare system","authors":"Amang Sudarsono, M. A. Rasyid, Hendhi Hermawan","doi":"10.1109/IC3INA.2014.7042603","DOIUrl":"https://doi.org/10.1109/IC3INA.2014.7042603","url":null,"abstract":"In wireless sensor networks (WSNs), information carried in data sensor is very important for everyone, especially for critical data such as disaster warning, location based in military, and other high-risk data. Wireless Body Area Network (WBAN) which informs data sensor of body status, such as blood pressure, electrocardiogram, air-flow of breathing, body temperature, patient position and falls, galvanic skin response, etc. as well as environment conditions such as humidity, gases, noise, etc. Such data sensor should be transferred through wireless to the data center server securely and can be easily accessed by everyone at anytime and anywhere. However, data exchange in WSNs has a big possibility to be illegally intercepted by many threats and attacks. Hence, security mechanism would be desirable to address the problem. In fact, sensor nodes usually have low power, low performance and limited resources. In this paper, we propose a security system in WSN for e-healthcare system that satisfies confidentiality, authenticity, and data integrity with consideration on low overhead of cryptographic computation. Our experimental results showed that total computation time for cryptographic is about 3.61 seconds on Waspmote ATmegal281 microcontroller 14MHz.","PeriodicalId":120043,"journal":{"name":"2014 International Conference on Computer, Control, Informatics and Its Applications (IC3INA)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125009578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Shared secret-based steganography for protecting medical data 用于保护医疗数据的基于共享秘密的隐写术
T. Ahmad, H. Studiawan, Hafidh Sholihuddin Ahmad, R. Ijtihadie, W. Wibisono
{"title":"Shared secret-based steganography for protecting medical data","authors":"T. Ahmad, H. Studiawan, Hafidh Sholihuddin Ahmad, R. Ijtihadie, W. Wibisono","doi":"10.1109/IC3INA.2014.7042606","DOIUrl":"https://doi.org/10.1109/IC3INA.2014.7042606","url":null,"abstract":"Medical data (i.e., medical image and medical record) is private which should be protected before being transferred or stored. There have been some methods proposed by implementing various algorithms, such as steganography. It is sometimes combined with the shared secret method, so that, the reconstruction of the original data must be done by some users. It is believed that this method increases the security of the data. However, there is still a need to make the stego data (i.e, stego image) has an as good as possible quality. This means that the stego image has high similarity to the cover (carrier) image. In this paper, we propose methods to protect the medical data by using the shared secret mechanism and steganography for 2 and 1 bit LSB. The experimental results show that they produce relatively good quality (similarity) in terms of PSNR.","PeriodicalId":120043,"journal":{"name":"2014 International Conference on Computer, Control, Informatics and Its Applications (IC3INA)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124116198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Attendance Management System (AMS) with fast track analysis 考勤管理系统(AMS)与快速跟踪分析
M. A. Abas, T. B. Tuck, M. Dahlui
{"title":"Attendance Management System (AMS) with fast track analysis","authors":"M. A. Abas, T. B. Tuck, M. Dahlui","doi":"10.1109/IC3INA.2014.7042597","DOIUrl":"https://doi.org/10.1109/IC3INA.2014.7042597","url":null,"abstract":"Fast track analysis for Attendance Management System (AMS) is designed to facilitate the lecturer in monitoring student attendance during lecture session. Monitoring attendance is crucial especially for large group of students. Lecturers have difficulties to verify student's attendance during class and would take up some time. Error in key in the attendance into the system is also likely when transferring the attendance into the main system, with no way to trace the mistakes once the class is over. Late comers would be overlooked due to recording on the time they join the classes. Hence, a new system was innovated applying simple mechanism which consists of RFID data logger and data analysis using ASP.net. The system is portable and quick to verify attendances within 5 minutes regardless, of the size of the class.","PeriodicalId":120043,"journal":{"name":"2014 International Conference on Computer, Control, Informatics and Its Applications (IC3INA)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129259271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Improved timing estimation based on symmetric correlator using statistical change of correlator for OFDM systems OFDM系统中基于对称相关器的改进定时估计
S. Suyoto, A. Kurniawan, Sugihartono
{"title":"Improved timing estimation based on symmetric correlator using statistical change of correlator for OFDM systems","authors":"S. Suyoto, A. Kurniawan, Sugihartono","doi":"10.1109/IC3INA.2014.7042609","DOIUrl":"https://doi.org/10.1109/IC3INA.2014.7042609","url":null,"abstract":"An improved method for estimating the symbol timing offset based on symmetric correlator using statistical change of correlator in preamble-aided OFDM systems is presented. It uses a preamble structure that have symmetrical property and combines with statistical change of Correlator to achieve a near-ideal timing performance without degradation in multipath channel environment. Computer simulations show that the method is robust in fading multipath channels, achieving better performance than the existing methods.","PeriodicalId":120043,"journal":{"name":"2014 International Conference on Computer, Control, Informatics and Its Applications (IC3INA)","volume":"1559 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128070299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modeling flight departure delay distributions 模拟航班起飞延误分布
Khusnul Novianingsih, R. Hadianti
{"title":"Modeling flight departure delay distributions","authors":"Khusnul Novianingsih, R. Hadianti","doi":"10.1109/IC3INA.2014.7042596","DOIUrl":"https://doi.org/10.1109/IC3INA.2014.7042596","url":null,"abstract":"In this paper, we construct a probability distribution for flight departure delay durations. The probability distribution is developed by fitting historical departure delay data of an airline to a number of probability distributions. Then, we choose the most fitted model by applying two-stage Genetic Algorithm. In the first stage, the algorithm works for maximizing log-likelihood function, and then we proceed to the second stage by facing the optimization model for minimizing the sum of squared error. The second stage is intended to avoid getting trapped in a local optimal solution which often occurs in log-likelihood approach. Since the historical data show that at a certain time in a day a flight has a bigger probability to be delayed, we also analyze the probability distribution of flight departure delay-time by using a similar approach for distribution of flight departure delay duration. The distributions can be used by the airline for measuring the sensitivity of flight schedules, so that a robust flight schedule can be constructed.","PeriodicalId":120043,"journal":{"name":"2014 International Conference on Computer, Control, Informatics and Its Applications (IC3INA)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132270094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Comparison of classical and modern landing control system for a small unmanned aerial vehicle 小型无人机经典与现代着陆控制系统的比较
Larasmoyo Nugroho
{"title":"Comparison of classical and modern landing control system for a small unmanned aerial vehicle","authors":"Larasmoyo Nugroho","doi":"10.1109/IC3INA.2014.7042625","DOIUrl":"https://doi.org/10.1109/IC3INA.2014.7042625","url":null,"abstract":"Research presented in the following paper contrasted the modern optimal robust control method with classical one, applied for a landing control system of a small unmanned aerial vehicle. Philosophically speaking, the optimal control used H2 method meets excellent dynamic performance, while the robustness given by the H∞ method diminish the effect of disturbance to the performance output. Accordingly, implemented mixed H2/H∞ optimal robust control method in this paper appear to meet a balancing result between performance and robustness stability. Three phases of flight, level flight, descent and flare used both classical and modern control system to stabilize and track the desired trajectory, which is exposed heavily to the presence of wind disturbance and ground effect. PID with fuzzy logic approach is employed to switch autopilot between the flight phases. Linear matrix inequality (LMI) approach is clearly suited to find the balanced H2/H∞ gain. To sum up, all results simulated in linearized model (Simulink-Flight Gear), strengthened with non-linear model flight simulation (X-Plane). The optimal robust landing control system delivers the performance and stability superior than classical controller one as expected.","PeriodicalId":120043,"journal":{"name":"2014 International Conference on Computer, Control, Informatics and Its Applications (IC3INA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130090413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信