Vol. 10 No. 12 DEC 2012

Vol. 10 No. 12 December 2012 International Journal of Computer Science and Information Security

Publication December 2012, Volume 10 No. 12 (Download Full Journal) (Archive) (Download 2)

.

Copyright © IJCSIS. This is an open access journal distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

.

1. Paper 30111225: Enhancing the Retrieval Performance by Combing the Texture and Edge Features (pp. 1-7)

Full Text: PDF

.

Mohamed Eisa, Computer Science Department, PortSaid University

Amira Eletrebi, Computer Science Department, Mansoura University

Ebrahim Elhenawy, Computer Science Department, Zagazig University

.

Abstract — In this paper, anew algorithm which is based on geometrical moments and local binary patterns (LBP) for content based image retrieval (CBIR) is proposed. In geometrical moments, each vector is compared with the all other vectors for edge map generation. The same concept is utilized at LBP calculation which is generating nine LBP patterns from a given 3x3 pattern. Finally, nine LBP histograms are calculated which are used as a feature vector for image retrieval. Moments are important features used in recognition of different types of images. Two experiments have been carried out for proving the worth of our algorithm. The results after being investigated shows a significant improvement in terms of their evaluation measures as compared to LBP and other existing transform domain techniques.

.

Keywords- CBIR; Feature extraction; geometrical moments; Local Binary Patterns.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

2. Paper 30111232: An Efficient Modeling and Simulation of Quantum Key Distribution Protocols Using OptiSystem™ (pp. 8-14)

Full Text: PDF

.

Abudhahir Buhari, Zuriati Ahmad Zukarnain, Shamla K. Subramaniam,

FSKTM, University Putra Malaysia, Serdang, Malaysia

Hishamuddin Zainuddin, INSPEM, University Putra Malaysia, Serdang, Malaysia

Suhairi Saharudin, MIMOS BERHAD, Technology Park Malaysia, KL, Malaysia

.

Abstract— In this paper, we propose a modeling and simulation framework for quantum key distribution protocols using commercial photonic simulator OptiSystem™. This simulation framework emphasize on experimental components of quantum key distribution. We simulate BB84 operation with several security attacks scenario and noise immune key distribution in this work. We also investigate the efficiency of simulator’s in-built photonic components in terms of experimental configuration. This simulation provides a study to analyze the impact of experimental photonic components in quantum key distribution process.

.

Keywords- quantum cryptography; qkd-simulation; optisystem;

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

3. Paper 30111239: Investigation of Security Enhancement and Performance Attributes of Key Agreement Protocol in Elliptic Curve Cryptography (pp. 15-19)

Full Text: PDF

.

Sonali U Nimbhorkar, Computer Science &Engineering, G.H.Raisoni College of Engineering, Nagpur, India

Dr. L. G. Malik, Computer Science & Engineering, G.H.Raisoni College of Engineering, Nagpur, India

.

Abstract — Augmented network use to communicate susceptible data and transactions requires an enhanced level of authentication and privacy for digital communication .Now a day’s most of the user authentication, integrity and confidentiality schemes are based on elliptic curve cryptography. The use of elliptic curve cryptography techniques provide greater security using less bits .The construction of key agreement protocol in elliptic curve cryptography requires being resistant to both active and passive attacks. In this paper provides comparative cryptanalysis of vulnerable schemes for key agreement protocol using elliptic curve cryptography and also considering parameters for security enhancement and performance attributes for achieving greater security for communication networks reducing computational overhead, bandwidth, and storage requirement.

.

Keywords—Key agreement ,elliptic curve , finite field , security, cryptosystem .

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

4. Paper 30111202: Optical Internet: Possible Attacks on TCP/OBS Networks (pp. 20-25)

Full Text: PDF

.

K. Muthuraj, Computer Science and Engineering Department, Pondicherry Engineering College, Puducherry, India

N. Sreenath, Computer Science and Engineering Department, Pondicherry Engineering College, Puducherry, India

.

Abstract — Optical Internet has become the main conduit for all types of virtually sharing communications around the world as it continues its phenomenal growth in traffic volumes and reaches using dedicated optical networks. Optical Burst Switching (OBS) is a technology for Optical Internet to cater the huge bandwidth demands and TCP is the prevailing mechanism to support the Internet. Hence, TCP over OBS has become standard for Optical Internet. There is good amount of research in the area of security in TCP. Also, the issue related to physical network security has been dealt. However, there is limited work is done related to security issues in TCP/OBS networks. Here our work is to identify the possible attacks that may happen in TCP/OBS networks. The NS2 simulator with modified OBS patch is used to identify the same.

.

Keywords - OBS Attack; threats on TCP over OBS networks; Optical Internet security; DoS attack on TCP/OBS networks; Orphan burst; Burst tapping attack; Timeout attack; Land attack; Burst header flooding attack; Circulating burst header attack

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

5. Paper 30111221: A Novel Symmetric Key Distribution Protocol for Data Encryption (pp. 26-29)

Full Text: PDF

.

S. G. Srikantaswamy, Research Scholar, National Institute of Engineering Mysore, Karnataka, India

Dr. H. D. Phaneendra, Professor & Research Guide, National Institute of Engineering, Mysore, Karnataka, India

.

Abstract - Encryption is a mechanism used for protecting data from hackers. The key used for encryption and decryption play a very important role. For conventional encryption both the transmitting and receiving entities use similar key. This key is referred as secret key. Distribution of secret key to communicating entities by a trusted third party is a tedious task. Meet in the middle attack plays a threat to security. In our paper, we have proposed a method to distribute secret key to communicating entities by a trusted third party. The entire process depends on resistance calculation concepts and expressions and equations. Here, by using simple quadratic equations, the key can be distributed to communicating parties without actually transmitting the key itself. Even though the method looks simple, it provides greater security and involves less resources (execution time and memory).

.

Keywords - Encryption, Protocol, distribution, Quadratic equation, Authentication, Security

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

6. Paper 30111223: Analysis of Influence of Internet Retail Service Quality (IRSQ) to Consumer Online Shopping Satisfaction at www.kebanaran.com (pp. 30-35)

Full Text: PDF

.

Imam Tahyudin, Department of Information System, STMIK AMIKOM PURWOKERTO, Purwokerto, Indonesia

.

Abstract – The purpose of this research was to determine the influence of Internet Retail Service Quality (IRSQ) (website performance, access, security, sensation, and information) to the satisfaction www.kebanaran.com online shoppers. The method of analysis used was path analysis. Based on the research results influence IRSQ variables (performance, access, sensation, and information security), performance variables (X1), access (X2) and sensation (X3) had no significant effect on satisfaction (Y). It shows that the online shopping website www.kebanaran.com already apply standard terms online stores in general, such as membership, has a return policy, a unique craft product offerings, the choice of language, the choice of currency, the chatroom facility, the product ctalogue about images from different angles and so forth, so that consumers be sure to purchase products through the online shopping website www.kebanaran.com. Security variable (X4) and information (X5) has a significant effect on satisfaction (Y). This shows that security is applied and the importance of information for consumers such as information availability, quality productsinformation, accurate product information is essential so that consumers do not hesitate to deal transaction use online shopping website www.kebanaran.com.

.

Keyword: Service Quality, Satisfaction, Online Shop

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

7. Paper 30111230: Detecting the Presence of Hidden Information Using Back Propagation Neural Network Classifier (pp. 36-41)

Full Text: PDF

.

P. Sujatha, Assistant Professor, School of Computing Sciences, Vels University, Chennai, India.

S. Purushothaman, Professor and Dean – PG Studies, Udaya School of Engineering, Kanyakumari 629 204, Tamil Nadu, India.

R. Rajeswari, Research Scholar, Mother Therasa University, Kodaikanal, India

.

Abstract - The covert communication based on steganography is a challenging technology for governments. Illegal uses of steganography are Fraud, Gambling, Criminal communications, Hacking, Electronic payments, Harassment, Offenses on Intellectual property, Viruses and Pedophilia. The government needs to find out new techniques to decipher (steganalysis) the information hidden by stegnography. So as to avoid the misusage of steganographic technique, some powerful method is needed to detect the existence of the hidden data in the digital media. This leads to the concept of steganalysis that is a technique of extracting hidden information. This paper uses Artificial Neural Network as a classifier for steganalysis. Back Propagation Neural network algorithm is proposed that uses steepest-descent method to reach a global minimum. However it needs this requires much iteration for the network to converge.

.

Keywords: Covert Communication; Steganography; Steganalysis; Artificial Neural Network; Back Propagation Algorithm (BPA)

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

8. Paper 30111233: A Discrete Event Simulation Approach on Polarized based Quantum Key Distribution Protocols using OptiSystem (pp. 42-48)

Full Text: PDF

.

Abudhahir Buhari, Zuriati Ahmad Zukarnain, Shamla K.Subramaniam

FSKTM, University Putra Malaysia, Serdang, Malaysia

Hishamuddin Zainuddin, INSPEM, University Putra Malaysia, Serdang, Malaysia

Suhairi Saharudin, MIMOS BERHAD, Technology Park Malaysia, KL, Malaysia

.

Abstract — In this paper, we present a discrete event approach to simulate the various quantum cryptographic protocols based on commercial photonic simulator OptiSystem. We modeled and simulated polarization based and decoy state based quantum key distribution protocols. We applied same experimental setup procedure and parameters on simulation models with slight modification on few photonic components. Probabilistic mechanism is applied in the entire events which satisfy the quantum spirit. Further, we have also modeled some eavesdropping attacks and free space quantum key distribution. Similarity score is high on our simulation result compare with experimental results. Finally, we packaged the simulation concept as an additional library to the simulator. The usability, modularity, reliability and robustness are the main core concern of our proposed simulation library.

.

Keywords - quantum cryptography; quantum key distribution; discrete event simulation, qkd-optisystem simulation

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------