A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Boopathi, K.
- Learning Cyber Security Through Gamification
Authors
1 Department of Computer Science and Application, Amrita Vishwa Vidyapeetham University, Amritapuri, IN
2 Department of Cyber Security, Amrita Vishwa Vidyapeetham University, Amritapuri, IN
Source
Indian Journal of Science and Technology, Vol 8, No 7 (2015), Pagination: 642-649Abstract
Objectives: Introducing gaming approach in the jeopardy round of InCTF (Indian Capture the Flag). Methods: Present Jeopardy round of InCTF can be compared as take-away assignments, where participants are given set of questions to solve, this is aimed at testing their knowledge in various computer security concepts. To make jeopardy round more attractive and motivating to the students we introduce a gaming approach to it. A game is developed which is divided into various levels and at each level the knowledge of students in Cyber security concepts is tested. Our design will help others to host jeopardy round CTF and get maximum learning outcome from the students. Findings: Security competition like CTF (Capture the Flag) are effective tool in providing computer security training. Conclusion: Gaming approach in Cyber security education will be a big step forward in training more students in computer security and create a secure online world.Keywords
CTF, Cyber Security, Education, Gamification, Jeopardy.- Secure Digital Watermarking Techniques Based Authentication
Authors
1 K.S. Rangasamy College of Technology, Tiruchengode, IN
Source
Digital Image Processing, Vol 6, No 2 (2014), Pagination:Abstract
Digital watermarking is a technology used to identify the original or duplicate. In this paper we have compressive approach for digital video watermarking is introduced, were watermark image is embedded in to the video frame each video frame is decomposed in to sub images using Morphological Filters, Automatic Color Enhancement technique [ACE ] Transform is applied for each block. Combining the two transform improved the performance of the watermark algorithm. The scheme is tested by various attacks. Experimental result shows private key for embedding and a public key for detection, it shows the robustness against a wide range of attack such as Gauss ion noise, salt & pepper Noise, median filtering, rotation, cropping etc. The Proposed scheme is tested using number of video sequences .its experimental result shows high imperceptibility where there is no noticeable difference between the watermark video frame and original video frame.