This paper suggests a new method for hidden secret message text in a RGB 24-bit color image. The positions of hidden text are selected randomly using auto key generator. The auto key is generated by selected three bytes from image each time, and then deposits these pixels to the main components Red, Green and Blue bytes. The values of least significant bits (LSB) from red color bytes are used to configure a binary number. The binary number determines the hidden position of message text bit in either LSB of green or blue color in the selected bytes, depending on specific criteria. After implementing this method on different images, it was founded easy to implement, high security, and difficulty of detection. The values of some metrics used to measure the efficiency of the proposed method are well. Also, there is no difference between the images before and after the information hiding which detect with human eye perception.
{"title":"Hiding Message in Color Image Using Auto Key Generator","authors":"Q. M. Hussein","doi":"10.1109/ACSAT.2014.33","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.33","url":null,"abstract":"This paper suggests a new method for hidden secret message text in a RGB 24-bit color image. The positions of hidden text are selected randomly using auto key generator. The auto key is generated by selected three bytes from image each time, and then deposits these pixels to the main components Red, Green and Blue bytes. The values of least significant bits (LSB) from red color bytes are used to configure a binary number. The binary number determines the hidden position of message text bit in either LSB of green or blue color in the selected bytes, depending on specific criteria. After implementing this method on different images, it was founded easy to implement, high security, and difficulty of detection. The values of some metrics used to measure the efficiency of the proposed method are well. Also, there is no difference between the images before and after the information hiding which detect with human eye perception.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128472553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Almomani, S. Basri, Saipunidzam Mahamad, A. Bajeh
Nowadays, software firms are playing very important roles in economies all over the world, and majority of these firms are Small and Medium Enterprises (SMEs). The SMEs recognize that it is important to improve their development processes and activities in order to produce software with high quality and to be competitive in the software industry. However, several studies have shown that the SMEs used ad-hoc manner in their development processes and they suffer from lack of the knowledge and resources to do Software Process Improvement (SPI). In this paper, a Systematic Literature Review (SLR) is used to identify and discuss the SPI initiatives in SME software firms. The results of the systematic review showed that the majority of software process improvement initiatives in SME firms are carried out in America and Europe. Only in one Asian country, Hong Kong was the SPI initiative considered and CMM Fast-Track was the model developed. The developed model did not cover all the CMM levels, only levels 1 and 2 were considered. In conclusion, many Software Process Improvement initiatives have been proposed for SME software firms but they have shortcomings such as lack of generalizability and take a lot of time to gain the benefits/advantage of the SPI model after implementation.
{"title":"Software Process Improvement Initiatives in Small and Medium Firms: A Systematic Review","authors":"M. Almomani, S. Basri, Saipunidzam Mahamad, A. Bajeh","doi":"10.1109/ACSAT.2014.35","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.35","url":null,"abstract":"Nowadays, software firms are playing very important roles in economies all over the world, and majority of these firms are Small and Medium Enterprises (SMEs). The SMEs recognize that it is important to improve their development processes and activities in order to produce software with high quality and to be competitive in the software industry. However, several studies have shown that the SMEs used ad-hoc manner in their development processes and they suffer from lack of the knowledge and resources to do Software Process Improvement (SPI). In this paper, a Systematic Literature Review (SLR) is used to identify and discuss the SPI initiatives in SME software firms. The results of the systematic review showed that the majority of software process improvement initiatives in SME firms are carried out in America and Europe. Only in one Asian country, Hong Kong was the SPI initiative considered and CMM Fast-Track was the model developed. The developed model did not cover all the CMM levels, only levels 1 and 2 were considered. In conclusion, many Software Process Improvement initiatives have been proposed for SME software firms but they have shortcomings such as lack of generalizability and take a lot of time to gain the benefits/advantage of the SPI model after implementation.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123600548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Email phishing classification is one of the vital problems in the online security research domain that have attracted several scholars due to its impact on the users payments performed daily online. One aspect to reach a good performance by the detection algorithms in the email phishing problem is to identify the minimal set of features that significantly have an impact on raising the phishing detection rate. This paper investigate three known feature selection methods named Information Gain (IG), Chi-square and Correlation Features Set (CFS) on the email phishing problem to separate high influential features from low influential ones in phishing detection. We measure the degree of influentially by applying four data mining algorithms on a large set of features. We compare the accuracy of these algorithms on the complete features set before feature selection has been applied and after feature selection has been applied. After conducting experiments, the results show 12 common significant features have been chosen among the considered features by the feature selection methods. Further, the average detection accuracy derived by the data mining algorithms on the reduced 12-features set was very slight affected when compared with the one derived from the 47-features set.
电子邮件网络钓鱼分类是网络安全研究领域的重要问题之一,由于其对用户日常在线支付的影响,吸引了众多学者的关注。检测算法在邮件网络钓鱼问题中达到良好性能的一个方面是识别对提高网络钓鱼检测率有显著影响的最小特征集。本文研究了针对电子邮件网络钓鱼问题的信息增益(Information Gain, IG)、卡方(Chi-square)和相关特征集(Correlation Features Set, CFS)三种已知的特征选择方法,在网络钓鱼检测中分离高影响特征和低影响特征。我们通过在大量特征上应用四种数据挖掘算法来衡量影响程度。我们比较了这些算法在应用特征选择之前和应用特征选择之后在完整特征集上的准确性。实验结果表明,通过特征选择方法,在考虑的特征中选出了12个共同的显著特征。此外,与从47个特征集获得的平均检测精度相比,数据挖掘算法在减少的12个特征集上获得的平均检测精度受到很小的影响。
{"title":"An Experimental Study for Assessing Email Classification Attributes Using Feature Selection Methods","authors":"Issa Qabajeh, F. Thabtah","doi":"10.1109/ACSAT.2014.29","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.29","url":null,"abstract":"Email phishing classification is one of the vital problems in the online security research domain that have attracted several scholars due to its impact on the users payments performed daily online. One aspect to reach a good performance by the detection algorithms in the email phishing problem is to identify the minimal set of features that significantly have an impact on raising the phishing detection rate. This paper investigate three known feature selection methods named Information Gain (IG), Chi-square and Correlation Features Set (CFS) on the email phishing problem to separate high influential features from low influential ones in phishing detection. We measure the degree of influentially by applying four data mining algorithms on a large set of features. We compare the accuracy of these algorithms on the complete features set before feature selection has been applied and after feature selection has been applied. After conducting experiments, the results show 12 common significant features have been chosen among the considered features by the feature selection methods. Further, the average detection accuracy derived by the data mining algorithms on the reduced 12-features set was very slight affected when compared with the one derived from the 47-features set.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128760819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper aims to build an Arabic WEB-based learning system for Malaysian learners focusing on cognate words in the Arabic language and Malay language. This paper focuses only on the highlighted cognates in the lessons interface in the WEB-based system. The paper starts by the importance of Computer-Assisted Language Learning (CALL), benefits of using cognates in leaning a foreign language, and the bower of highlighting vocabulary strategy in language learning. Finally, the paper concluded by the technical details of building the present WEB-based system.
{"title":"Arabic-Malay Cognates as a Computer Assisted Language Learning","authors":"R. Shehab, A. Zeki","doi":"10.1109/ACSAT.2014.39","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.39","url":null,"abstract":"This paper aims to build an Arabic WEB-based learning system for Malaysian learners focusing on cognate words in the Arabic language and Malay language. This paper focuses only on the highlighted cognates in the lessons interface in the WEB-based system. The paper starts by the importance of Computer-Assisted Language Learning (CALL), benefits of using cognates in leaning a foreign language, and the bower of highlighting vocabulary strategy in language learning. Finally, the paper concluded by the technical details of building the present WEB-based system.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121912147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}