60 research outputs found

    A New Digital Watermarking Algorithm Using Combination of Least Significant Bit (LSB) and Inverse Bit

    Full text link
    In this paper, we introduce a new digital watermarking algorithm using least significant bit (LSB). LSB is used because of its little effect on the image. This new algorithm is using LSB by inversing the binary values of the watermark text and shifting the watermark according to the odd or even number of pixel coordinates of image before embedding the watermark. The proposed algorithm is flexible depending on the length of the watermark text. If the length of the watermark text is more than ((MxN)/8)-2 the proposed algorithm will also embed the extra of the watermark text in the second LSB. We compare our proposed algorithm with the 1-LSB algorithm and Lee's algorithm using Peak signal-to-noise ratio (PSNR). This new algorithm improved its quality of the watermarked image. We also attack the watermarked image by using cropping and adding noise and we got good results as well.Comment: 8 pages, 6 figures and 4 tables; Journal of Computing, Volume 3, Issue 4, April 2011, ISSN 2151-961

    Reverse Engineering Mobile Apps for Model Generation Using a Hybrid Approach

    Get PDF
    The popularity of mobile devices is ever increasing which led to rapid increase in the development of mobile applications. Model-Based testing can improve the quality of mobile application but the models are not always available or are of inadequate quality. Reverse engineering approaches are used to automatically generate model from the GUI of mobile applications for model-based testing. This paper proposes a hybrid approach for reverse engineering mobile applications which exploit the capabilities of both static and dynamic approaches while trying to maximize the quality of the generated models. The insight of this approach is to use static analysis on app’s source to identify supported events. The generated events can be used to dynamically explore an app at run-time to generate a state model of the app’s GUI. The preliminary results from our approach indicated that the technique can generate high quality models from android apps

    Finding new steganography algorithm to hide data in image

    Get PDF
    Steganography algorithm is used to hide data from third party in such a way that people are unable to detect the presence or contents of the hidden message inside the stego image. This algorithm is used to maintain the confidentiality of valuable information, and to protect the data from possible sabotage, theft, or unauthorized viewing as demonstrated in Figure I. Though the hacker,^ can steal the stego image, the valuable information inside the image is not readable. This really promotes secured data from hackers

    Automatic Generation of test Cases from Use-Case Diagram

    Get PDF
    Intelligent searching techniques have been developed in order to provide a solution to the issue of finding information relevant to the user needs, and the problem of information overload - when far too much information is returned from a search. We employ this technique to introduce an automatic tool which used to generate the test cases automatically according to the system’s requirement. The tool uses two steps for generating test cases. First, the system’s requirements are transformed into a Unified Modeling Language (UML) Use-case Diagram. Second, the test cases will be automatic generated according to the use cases respectively. In the workspace, the ToolBox is used in order to ease the drawing of the use-case diagram. As well as allowing a user to layout the requirements of the system via a use-case diagram in the provided workspace, a user also may type-in the properties for each of the use cases used. Once the use- case diagram has been finalized, it can be save for further used and modification. The engine of the tool will take the use cases from the use-case diagram and search the query string (keyword) used in the tool’s library. The searching engine uses both search keyword and additional information of the use-case diagram. This combination will result in improving data retrieval performance. Once the use case used matches the keyword inside the tool’s library, the engine will automatically generate its respective test cases according to its use case

    Comparative Analysis for Test Case Prioritization Using Particle Swarm Optimization and Firefly Algorithm

    Get PDF
    Software testing is the most importance phases for software development life cycle. However, it is always time consuming and costly. In order to solve this problem, regression testing is required to be conducted since it can verify the software modifications with zero effect to the software actual features. TCP is one type of the regression testing techniques. It can reduce the cost and time taken. In the area of TCP, there are several algorithms and the most powerful algorithms is the nature inspired algorithms. This study will focus on the comparison analysis of prioritization of test case by using PSO and FA. In order to choose an algorithm with better performance between PSO and FA, they are turned into the form of Python code. Then, PSO and FA are implemented into Case Study A and Case Study B. Their result will be compared and analysis based on the execution time, Big-O, and APFD. The comparison showed that FA is outperform than PSO since FA has the least execution time (0.001 second), less complexity (O(N)) than PSO (O(N3)), and same APFD values (0.520 and 0.600). Thus, FA has better prioritization performance compared to PSO

    An optimized attack tree model for security test case planning and generation

    Get PDF
    Securing software assets via efficient test case management is an important task in order to realize business goals. Given the huge risks web applications face due to incessant cyberattacks, a proactive risk strategy such as threat modeling is adopted. It involves the use of attack trees for identifying software vulnerabilities at the earliest phase of software development which is critical to successfully protect these applications. Although, many researches have been dedicated to security testing with attack tree models, test case redundancy using this threat modeling technique has been a major issue faced leading to poor test coverage and expensive security testing exercises. This paper presents an attack tree modeling algorithm for deriving a minimal set of effective attack vectors required to test a web application for SQL injection vulnerabilities. By leveraging on the optimized attack tree algorithm used in this research work, the threat model produces efficient test plans from which adequate test cases are derived to ensure a secured web application is designed, implemented and deployed. The experimental result shows an average optimization rate of 41.67% from which 7 test plans and 13 security test cases were designed to mitigate all SQL injection vulnerabilities in the web application under test. A 100% security risk intervention of the web application was achieved with respect to preventing SQL injection attacks after applying all security recommendations from test case execution report

    Steganography Algorithm to Hide Secret Message inside an Image

    Full text link
    In this paper, the authors propose a new algorithm to hide data inside image using steganography technique. The proposed algorithm uses binary codes and pixels inside an image. The zipped file is used before it is converted to binary codes to maximize the storage of data inside the image. By applying the proposed algorithm, a system called Steganography Imaging System (SIS) is developed. The system is then tested to see the viability of the proposed algorithm. Various sizes of data are stored inside the images and the PSNR (Peak signal-to-noise ratio) is also captured for each of the images tested. Based on the PSNR value of each images, the stego image has a higher PSNR value. Hence this new steganography algorithm is very efficient to hide the data inside the image.Comment: 7 pages, 7 figure

    A survey on IT adoption model for SMIs in Malaysia

    Get PDF
    Understanding the major roles and functions of Information Technology (IT) in an organisation is an important factor in shaping an organisation’s characteristics and determining the usage of IT as an enabler in a business.A survey on small and medium sized industries in Malaysia has been carried out in order to identify and recognise the usage of IT in businesses.The parameters such as organisational details (i.e. the numbers of employees, sales or profitability and the type of business) and managers details (in terms of educational level, computer literacy and computer experiences) were studied in order to see whether these parameters do contribute towards the usage of IT in businesses. Based on the results of the survey, an IT adoption model is proposed.This IT adoption model can be used as a framework for users who wishes to set-up a business.Due to the diverse cultural composition, the model can also be used as guidelines to émigré entrepreneurs of the important areas in setting-up new SMIs in Malaysia
    • …
    corecore