33 research outputs found

    Evaluation of possibilities of java cryptography architecture and java mail libraries usage to encrypt e-mail messages

    Get PDF
    The following paper presents the possibilities of applying Java language to encrypt e-mail messages. The introduction includes a short outline about symmetric and asymmetric cryptography and how to build a safe electronic letter is discussed later. Finally, we would like to consider the possibility of implementing the discussed Java model of the safe message creation

    Robustness of data hiding in image the Fourier spectrum

    Get PDF
    The following paper presents the results of tests conducted by the author in the field of verification of influence of JPEG lossy compression on the robustness of data hiding methods used for the colour image which has been transformed to the frequency domain. The data have been embedded to the Fourier magnitude spectrum of the image. The possibility of decoding the hidden data with two embedding methods and various parameter values as well as diverse compression rates has also been examined. The paper also contains a short description of the discrete Fourier transform

    New steerable pyramid steganography algorithm resistant to the Fisher Linear Discriminant steganalysis

    Get PDF
    This paper describes a new steganography algorithm based on a steerable pyramid transform of a digital image and the steganalysis of the existence of secret messages hidden by this new method. The data embedding process uses the elements of a Lee and Chen steganography algorithm which is adapted to the steerable pyramid transform domain. This article describes the Fisher Linear Disriminant (FLD) analysis and its steganalysis application, too. The main part of the paper is the description of the conducted research and the results of FLD steganalysis of stegoimages produced by the new steganography algorithm

    Comparison of frameworks for developing web applications in PHP

    Get PDF
    The article presents a comparative analysis of two frameworks of PHP application development such as Laravel and Code Igniter. Test results obtained using the implemented implementation problem compare the application code size, code execution time, hardware resources used, as well as the complexity of the code. The purpose of the research was to present the possibilities of given application development skeletons, with the help of which the web application programmer will be able to decide on its use depending on the implemented solution

    Analysis of the application possibilities of IoT technology in smart home systems

    Get PDF
    Many home appliances available on the market are equipped with components to receive and generate data and communication modules allow connection to the Internet. As a result, the devices can be combined to smart homes systems. The analysis presents the individual capabilities of devices that can work in such systems. Presented are devices available on the market and made a smart home system working in Wi-Fi and Z-Wave networks

    Comparative analysis of transfer protocols asynchronous messages on systems queuing

    Get PDF
    This article presents an analysis of the performance of two protocols supported by queuing systems, i.e. MQTT and AMQP. This analysis was performed using two message brokers - ActiveMQ and RabbitMQ. The time of sending the message was analyzed, determined on the basis of the time of sending and receiving the message for both protocols in both of the above-mentioned queuing systems. The tests were carried out using proprietary applications written in Java and the Spring application framework

    Comparison of the security mechanisms of popular operating systems for mobile devices

    Get PDF
    The article concerns the differences in the mechanisms of securing the three most popular mobile platforms, which are Android, iOS and Windows Phone. Mainly focuses on the differences related to access to user data, installing and running applications, Internet access, network connectivity, cloud services, backup, file encryption capabilities, the use of electronic signatures and connect the device to your computer

    Comparison of capabilities to implement REST services in Java language using the popular web application frameworks.

    Get PDF
    This article presents the results of a comparison of capabilities and efficiency of REST in Java using frameworks such as Jersey, Apache CXF and Spring MVC. Comparative analysis was conducted on the basis of application implemented by each of the above frameworks. Application have been implemented using technologies such as Spring Boot, Hibernate, Maven, and MySQL

    Assessment of the web application security effectiveness against various methods of network attacks

    Get PDF
    The article discusses the issue of the security of Internet applications. The most popular types of attacks and methods of securing web applications against them are discussed. The study conducted the effectiveness of security of web applications. The research methodology was based on the proprietary application implemented in PHP technology. The result of the research is a proposal of solutions aimed at improving application security

    Analysis of configuration distribution methods in service application environments

    Get PDF
    This work is an analysis of methods and solutions enabling centralization of the storage of configuration values in ser-vice application environments. It presents a comparison focused on the user's interaction with the available solutions and performance tests during the operation. Consul, ZooKeeper tools and the implementation of the configuration serv-er with the use of the Spring Cloud Config library were tested. Created test environment with the use of Java Spring, Kafka and Python technologies was used for this purpose. The aim of the research is to determine the best tool for working in large microservice networks and the most optimal in the context of working with the user. The presented results confirm the advantage of the Consul tool in terms of efficiency and interface quality over other solutions
    corecore