International Journal of Information Privacy, Security and Integrity (5 papers in press)
Proposition of a dynamic steganography system based on the chaos properties and image registration for distributing an encryption key
by Rachid RIMANI, Naima Hadj Said, Adda Ali Pacha
Abstract: Cryptography has been used as an instrument for securing confidential data, especially with the globalization of exchanges (internet, messaging and e-commerce), based on various mediums (sound, image, video). Keys have a crucial role in the security of cryptosystems and their distribution is an important primitive in cryptography. This article presents a new dynamic system of steganography (data hiding) for concealing data in a particular sequence of images intended to regulate in an unlimited time the secure transfer of the key between the different correspondents; the proposed key exchange protocol using an image registration system and a chaotic sequence is comparable to the Diffie-Hellman key exchange protocol. The use of chaos makes it possible to increase the level of confidentiality by sending to the receiver a register which contains parameters of a chaotic sequence; knowing these parameters, the receiver can extract the chaotic sequence. The purpose of using the image registration is to find the transformation between two or several images; these transformations become a tool with the chaotic sequence calculated to recover the key on the receiver side.
Keywords: chaotic sequence; Diffie-Hellman key exchange; image registration; secure transfer; steganography.
The Study of Acceptance Thai LGBTQs in Bangkok: Analysis of Attitudes from Gen-Z People
by Jirayut Monjagapate, Nakorn Rungkittanasan
Abstract: This study is intentionally created to make an awareness about being third genders in the society. We interviewed 300 interviewees who were born from 1995 to 2012, or they are called as generation-z people. Those interviewees are living in Bangkok, Thailand. The interviewees were asked about their opinions in terms of acknowledgement and perceiving on LGBTQs.
There are 2 main parts that the study tries to figure them out. In the first part, interviewees are asked to define the definition of being third genders. As a result, the majority of interviewees believes that being third gender refers to a man who wants to be a woman, and being third gender highly refers to men rather than women. However, the term third gender is wider than that. Therefore, people should understand more about gender diversity.
Secondly, they are asked about acceptance of third genders. The results are illustrated that male and female (referred to heterosexuality) interviewees accept third genders more than third genders accept themselves (this is based on scores that interviewees answered in terms of numerical documents only). In the same direction, in Thai society, third genders are still in limitation of regulations and official acceptance. The majority of interviewees gave a high rate of acceptance of LGBTQs. However, they still believe that nowadays, third genders are still not totally treated equally. The scores that interviewees gave and authors observed from the interview are in different level between Family and Mentality section with high variations.
Keywords: LGBTQ; Third Genders; Generation-Z.
Live event creation and management : case of King Bhumibol Adulyadej mourning event
by Chonlathip Aswakan
Abstract: On the 13th of October 2016, Thailand and the world lost a great man, King Bhumibol Adulyadej. Thailand has mourning period following his death. This research studies the creation of a live event designed to express loyalty towards the late King. The areas of study are: idea generation, interpretation, and communication of the message of appreciation for the king. Even though we are in sorrow and tears are in our faces, our beloved Thailand and the monarchy must continue, noted the Thai Prime Minister during an appearance broadcast on all Thai television channels. Do not let the death derail his majestys determination to see his kingdom prosper, the people live in blessedness, and be kind to each other he continued. This research is divided into three parts: production and management, creative and performance communication, and design production. As the sender, the creators a of a live event about the King and the mourning period have many factors to consider including the appropriate modes of expression in Thai ceremony, culture, and tradition, and also the fact that people were sad and it was a sensitive time. The main message of the event was thankfulness, respect, and deep gratitude toward King Rama IX. The results show that audiences, made up of both Thais and foreigners, felt part of the live event, demonstrated their appreciation with tears, and showed their respect toward the King.
Keywords: Communication Studied; Event creation; Event management.
BiSign: Pairing-Based Anonymity in Bitcoin Cryptocurrency
by Albert Kofi Kwansah Ansah, Daniel Adu-Gyamfi, Stephen Anokye
Abstract: The field of cybersecurity and its applications are still under discovery, despite the existing advances in research and education. New technologies keep evolving. Bitcoin as cryptocurrency cyber application has recently evolved which records cryptocurrency transactions on a Blockchain network. Bitcoin is arguably the most popular peer-to-peer electronic payment system but its anonymity is not fully explored. Users information and identity leakage vulnerabilities possibly exist due to Bitcoins public address system and decentralised nature of the blockchain network which invariably attracts privacy issues. Practical and compatible anonymity requirements for users are still not satisfactory despite several attempts provided in existing techniques. In this paper, we propose a privacy-preservation scheme that ensures users carry out anonymous bitcoin transactions based on bilinear pairing, elliptic curve cryptography, and other cryptographic primitives. We theoretically analyse and evaluate our proposed scheme which is proven secure to implement for preserving users privacy in bitcoin transactions without any modification to the Bitcoin blockchain. Simulation performed proved the correctness of our scheme and show average performance time of 6musec and 11musec respectively for 80-bits and 128-bits with PBC Type A pairing internal. Effectively, the analysis and evaluation suggest the proposed scheme as secure and robust to implement for preserving users privacy in bitcoin transactions.
Keywords: Bitcoin; Blockchain; Anonymity; Cryptocurrency; Bilinear pairing; User privacy.
Privacy-Preservation in Data Pre-processing for Web Usage Mining
by Michael Mireku Kwakye
Keywords: Web Usage Mining; Data Privacy; Privacy Taxonomy; Privacy-Preservation; Privacy Policies.