• Title/Summary/Keyword: text-message

Search Result 299, Processing Time 0.027 seconds

A Study on SMiShing Detection Technique using TaintDroid (테인트드로이드를 이용한 스미싱 탐지 기법 연구)

  • Cho, Jiho;Shin, Jiyong;Lee, Geuk
    • Convergence Security Journal
    • /
    • v.15 no.1
    • /
    • pp.3-9
    • /
    • 2015
  • In this paper, a detection technique of smishing using a TaintDroid is suggested. Suggesting system detects malicious acts by transmitting a URL to the TaintDroid server and installing a relevant application to a virtual device of the TaintDroid server, when a smartphone user receives a text message including the URL suspected as a smishing. Through this we want to distinguish an application that can not install because of suspicion of a smishing in an actual smartphone whether said application is malicious application or not by testing with the virtual device of said system. The detection technique of a smishing using the TaintDroid suggested in this paper is possible to detect in a new form a smishing with a text message and to identifying which application it is through analysis of results from a user.

An Ethnography of Emergent Writing and Literacy of Two-year-old Toddlers in Classroom (2세 영아 학급에서의 글쓰기와 문해의 발현 과정 : 문화기술적 연구)

  • Kim, Misuk
    • Korean Journal of Child Studies
    • /
    • v.26 no.6
    • /
    • pp.267-285
    • /
    • 2005
  • This ethnography explored, the emergent writing and literacy of two-year-old children in classroom. The specific purpose of the study focuses on toddler's text appropriation from text environment and on social interaction between teachers and toddlers. The result showed that toddlers appropriated writing signs or words from their own text-environment and used it as the instrument for social interaction and communication. Specifically, they initiated social interaction by giving messages of their appropriated signs to adults as teachers, who were easily capable of communication. This led to all toddlers' involvement in message exchange in the classroom. Toddlers' marks of scribbles were also consisted of different kinds of lines and circles. Those marks have different meaning and. symbolic systems: drawing and writing graphics. Even though drawing and writing graphics developed as different symbol systems in toddlers' marks, each system helped to extend each other.

  • PDF

A Method for Short Text Classification using SNS Feature Information based on Markov Logic Networks (SNS 특징정보를 활용한 마르코프 논리 네트워크 기반의 단문 텍스트 분류 방법)

  • Lee, Eunji;Kim, Pankoo
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.7
    • /
    • pp.1065-1072
    • /
    • 2017
  • As smart devices and social network services (SNSs) become increasingly pervasive, individuals produce large amounts of data in real time. Accordingly, studies on unstructured data analysis are actively being conducted to solve the resultant problem of information overload and to facilitate effective data processing. Many such studies are conducted for filtering inappropriate information. In this paper, a feature-weighting method considering SNS-message features is proposed for the classification of short text messages generated on SNSs, using Markov logic networks for category inference. The performance of the proposed method is verified through a comparison with an existing frequency-based classification methods.

A Techniques for Information Hiding in the Steganography using LSB and Genetic Algorithm (유전적 알고리즘과 LSB를 이용한 스테가노그래피의 정보은닉 기법)

  • Ji, Seon-Su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.3
    • /
    • pp.277-282
    • /
    • 2018
  • The goal of the secret message communication on the internet is to maintain invisibility and confidentiality. Digital steganography is a technique in which a secret message is inserted in a cover medium and transmitted to a destination so that a third party can not perceive the existence of the message itself. Steganography is an efficient method for ensuring confidentiality and integrity together with encryption techniques. In order to insert a secret (Hangul) message, I propose a image steganography method that the secret character is separated and converted into binary code with reference to the encryption table, the cover image is divided into two areas, and the secret message and the right l-LSB information of the second area are encrypted and crossed, concealing the k-LSB of the first region. The experimental results of the proposed method show that the PSNR value is 52.62 and the acceptable image quality level.

Design and Implementation of the Conversion Rule between XML and MTF Messages (MTF 메시지와 XML간 상호변환 규칙 설계 및 구현)

  • Park, In-Soo;Yoon, Hee-Byung
    • The KIPS Transactions:PartD
    • /
    • v.12D no.5 s.101
    • /
    • pp.781-788
    • /
    • 2005
  • MTF message is the normalized and standardized format which is used in the time when it tries to transmit data to other systems or exchanges needed information in defense message systems. XML can support variety of search functionality and is estimated to be the best way from the view of efficient presentation and exchange in internet based environment, based on advantage which is independent of hardware and software. US army brought in XML-MTF combining with XML based technology, but we do not contain such a MTF system, and necessity of MTF is increasing for combined operation between ROK and US as a lot of C4I system were transferred to Web based systems. In this paper, we make analysis of fundamental structure, organization of paragraph, witting regulation of MTF message. We present the rule of naming element and fundamental mapping rule for transformation of its XML based on it. Also, we prove that MTF message can be transformed to XML document by trying to transforming sample documents to XML document applying presented mapping rule, creating MTF message based on it and implement program which can automatically transform them to XML-MTF.

On a Speech Coding Algorithm for Low Cost Implementation of Voice Telegram System (보이스 전보 시스템 구현을 위한 저가형 음성파형 부호화 알고리즘)

  • 나덕수;민소연;배명진
    • The Journal of the Acoustical Society of Korea
    • /
    • v.19 no.2
    • /
    • pp.101-105
    • /
    • 2000
  • A telegram has been used to transmit the emergency news or celebration message. So, it has been very important media in our life. Although the telegram processing is more and more convenient, on the other hand, the telegram service contains only text message. The voice telegram is that delivering user's voice with text message. So, the voice telegram can be delivered sender's emotions and feelings. However, since voice information contains lots of data, large memory size and high cost processor are needed to deliver itself. In this paper, we proposed a new speech waveform coding method that has low complexity and low cost implementation for the voice telegram system. First, we fixed one basic speech waveform per pitch period and measured the waveform similarity between basic and neighbor speech waveform. Second, if the similarity satisfied threshold values, we compress the neighbor speech waveform with pitch and magnitude value per pitch period and if not, we save speech waveform. When the compression is about 45%, we obtained about 4 point in MOS.

  • PDF

Content Analysis of Webzine for Gist-based Health Message Design (핵심정보 중심 건강 메시지 디자인을 위한 웹진 내용분석)

  • Cho, Young Hoan;Choi, Hyoseon;You, Myoung Soon
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.2
    • /
    • pp.192-204
    • /
    • 2014
  • Gist-based message design is essential in the Internet in which a lot of health messages are created and shared constantly. This study intended to identify the characteristics of health messages in a webzine and explore a way to design gist-based health messages. A total of 72 webzine articles published in Korean Ministry of Food and Drug Safety were selected, and text and visual messages of the articles were analyzed in terms of content types, the frequency and position of gists, and intuitive expression. The articles were also categorized regarding the characteristics of health messages through cluster analyses. This study found that most texts of the health articles consisted of facts and methods, while most visual messages represented concepts. In addition, both text and visual messages had limitations in presenting a gist effectively. It was also necessary to explore an effective way to improve an intuitive understanding of jargon and quantitative information in health messages. Based on these findings, this study provided suggestions for the design of gist-based health messages in the Internet.

The effects of driving performance during driving with sending text message and searching navigation : a study among 50s taxi drivers (운전 중 문자 메시지 전송과 네비게이션 검색이 운전 수행 능력에 미치는 영향 : 50대 택시 운전자를 대상으로)

  • Kim, Han-Soo;Choi, Jin-Seung;Kang, Dong-Won;Oh, Ho-Sang;Seo, Jung-Woo;Yeon, Hong-Won;Choi, Mi-Hyun;Min, Byung-Chan;Chung, Soon-Cheol;Tack, Gye-Rae
    • Science of Emotion and Sensibility
    • /
    • v.14 no.4
    • /
    • pp.571-580
    • /
    • 2011
  • The purpose of this study was to evaluate the effects of secondary task such as sending text message (STM) and searching navigation (SN) using the variable indicating control of vehicle ((Medial-Lateral Coefficient of Variation, MLCV), (Anterior-Posterior Coefficient of Variation, APCV)) and motion signal (Jerk-Cost function, JC). Participants included 50s taxi drivers; 14 males and 14 females. Participants were instructed to keep a certain distance (30m) from the car ahead with constant speed (80km/hr or 100km/hr). Experiement consisted of driving alone for 1minute and driving with secondary task for 1minute. Both MLCV and APCV were significantly increased during Driving + Sending Text Message(STM) and Driving + Searching Navigation(SN) than Driving only. Also, JC was increased during Driving + STM and Driving + SN than Driving only. In this study, we found that even in the experts group who are taxi driver and have 25 years driving experience, the smoothness of motion is decreased and the control of vehicle is disturbed when they were performing secondary tasks like sending text message or searching navigation.

  • PDF

New Text Steganography Technique Based on Part-of-Speech Tagging and Format-Preserving Encryption

  • Mohammed Abdul Majeed;Rossilawati Sulaiman;Zarina Shukur
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.1
    • /
    • pp.170-191
    • /
    • 2024
  • The transmission of confidential data using cover media is called steganography. The three requirements of any effective steganography system are high embedding capacity, security, and imperceptibility. The text file's structure, which makes syntax and grammar more visually obvious than in other media, contributes to its poor imperceptibility. Text steganography is regarded as the most challenging carrier to hide secret data because of its insufficient redundant data compared to other digital objects. Unicode characters, especially non-printing or invisible, are employed for hiding data by mapping a specific amount of secret data bits in each character and inserting the character into cover text spaces. These characters are known with limited spaces to embed secret data. Current studies that used Unicode characters in text steganography focused on increasing the data hiding capacity with insufficient redundant data in a text file. A sequential embedding pattern is often selected and included in all available positions in the cover text. This embedding pattern negatively affects the text steganography system's imperceptibility and security. Thus, this study attempts to solve these limitations using the Part-of-speech (POS) tagging technique combined with the randomization concept in data hiding. Combining these two techniques allows inserting the Unicode characters in randomized patterns with specific positions in the cover text to increase data hiding capacity with minimum effects on imperceptibility and security. Format-preserving encryption (FPE) is also used to encrypt a secret message without changing its size before the embedding processes. By comparing the proposed technique to already existing ones, the results demonstrate that it fulfils the cover file's capacity, imperceptibility, and security requirements.

Supporting Media using XML-based Messages on Online Conversational Activity (온라인 대화 행위에서 XML 기반 메시지를 이용한 미디어 지원)

  • Kim, Kyung-Deok
    • The KIPS Transactions:PartB
    • /
    • v.11B no.1
    • /
    • pp.91-98
    • /
    • 2004
  • This paper proposes how to support various media on online conversational activity using XML(extensible Markup Language). The method converts media information into XML based messages and handles alike conventional text based messages. The XML based messages are unified to an XML document, and then a HTML document is generated using the XML and an XSLT documents in a server. A user in each client can play or present media through the hyperlink that is associated media information on the HTML document. The suggested method supports use of various media (text, image, audio, video, documents, etc) and efficient maintenance of font size, color, and style on messages according to extension and modification of XML tags. For application, this paper implemented the system to support media that has client and server architecture on online conversational activity. A user in each client inputs text or media based message using JAVA applet and servlet on the system, and conversational messages on every users' interfaces are automatically updated whenever a user inputs new message. Media on conversational messages are played or presented according to a user's click on hyperlink. Applications for the media presentation are as follows : distance learning, online game, collaboration, etc.