{"title":"Discrete Wavelet Transform Domain Techniques","authors":"Farnaz Arab, S. Daud, S. Z. Hashim","doi":"10.1109/ICICM.2013.73","DOIUrl":"https://doi.org/10.1109/ICICM.2013.73","url":null,"abstract":"In this paper we focus on the process of embedding and retrieving on DWT domain in format of video. We therefore have chosen some proposed technique in DWT. We choose DWT because as it provides both spatial and frequency domain characteristic of the signal.","PeriodicalId":179536,"journal":{"name":"2013 International Conference on Informatics and Creative Multimedia","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128823817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Taxonomy of SQL Injection Detection and Prevention Techniques","authors":"Amirmohammad Sadeghian, M. Zamani, A. A. Manaf","doi":"10.1109/ICICM.2013.18","DOIUrl":"https://doi.org/10.1109/ICICM.2013.18","url":null,"abstract":"While using internet for proposing online services is increasing every day, security threats in the web also increased dramatically. One of the most serious and dangerous web application vulnerabilities is SQL injection. SQL injection attack took place by inserting a portion of malicious SQL query through a non-validated input from the user into the legitimate query statement. Consequently database management system will execute these commands and it leads to SQL injection. A successful SQL injection attack interfere Confidentiality, Integrity and availability of information in the database. Based on the statistical researches this type of attack had a high impact on business. Finding the proper solution to stop or mitigate the SQL injection is necessary. To address this problem security researchers introduce different techniques to develop secure codes, prevent SQL injection attacks and detect them. In this paper we present a comprehensive review of different types of SQL injection detection and prevention techniques. We criticize strengths and weaknesses of each technique. Such a structural classification would further help other researchers to choose the right technique for the further studies.","PeriodicalId":179536,"journal":{"name":"2013 International Conference on Informatics and Creative Multimedia","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126612784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cypris Chat: Emergent Design for Language Education in Second Life","authors":"J. DuQuette","doi":"10.1109/ICICM.2013.21","DOIUrl":"https://doi.org/10.1109/ICICM.2013.21","url":null,"abstract":"Technology stewards are individuals who assume responsibility for the development and maintenance of online digital habitats suited to a community of practice or affinity group. Though guidelines for effective stewardship exist, most focus on serving the needs off offline organizations and individuals through now canonical online resources such as forums, blogs and text-based chat, they may not be applicable to emergent online groups in which the dialectic of negotiation plays a much stronger role. As part of a larger ethnographic study, this paper introduces Cypris Chat, a language learning community in the online virtual world of Second Life. Through examination of its design evolution from 2008-2012, Cypris proves itself an exemplar of digital habitat design negotiation in entirely virtual communities, as well as opens up new possibilities for both independent language learners and instructors interested in innovative and cost-free learning environments.","PeriodicalId":179536,"journal":{"name":"2013 International Conference on Informatics and Creative Multimedia","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121159828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Diffusion of iTV Advertising in Malaysia: The Industry Players' Perspectives","authors":"S. M. Sarif, A. A. Mutalib, S. Rashid, A. Omar","doi":"10.1109/ICICM.2013.24","DOIUrl":"https://doi.org/10.1109/ICICM.2013.24","url":null,"abstract":"This paper reports on an ongoing initiative in proposing guidelines for iTV advertising, which leads to the implementation of t-commerce for iTV in Malaysia. While the infrastructures are ready for the innovation, this paper believes that it will get onto the track soon. Hence, the preparation for it should be commenced. In accordance, this paper discusses theories and concepts that support the innovation. On top of that, it details the findings of a series of interviews with entities that are directly involved with advertising practices. Based on the interviews, this paper deduces that even though Malaysians are not moving towards it yet, initiatives like carried out in this study are necessary to prepare Malaysia for the innovation.","PeriodicalId":179536,"journal":{"name":"2013 International Conference on Informatics and Creative Multimedia","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121814955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interactive Kinect Using Mobile Phone for Education","authors":"M. M. Tehrani, Y. Lim","doi":"10.1109/ICICM.2013.30","DOIUrl":"https://doi.org/10.1109/ICICM.2013.30","url":null,"abstract":"Research into new interaction devices has garnered much attention in recent years. A key factor in digital games is the immersion of players as they seek to enhance their experience in the virtual world created by them. This immersion can be achieved in different ways, such as graphics effects, realistic physics, artificial intelligence and even from user inputs. The Nintendo Wii controller, Sony Play station Move controller and Microsoft Xbox Kinect, to name a few, present new forms of user interaction using the player's movements and have led to new forms of game play, as well as great forms of feedback. In addition, mobile devices provide new features like accelerometers, touch screens, cameras and GPS, which allow new forms of interaction in games played on the devices.","PeriodicalId":179536,"journal":{"name":"2013 International Conference on Informatics and Creative Multimedia","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124549762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Model to Assess the Usability of Enterprise Architecture Frameworks","authors":"Amir Bijarchian, R. Ali","doi":"10.1109/ICICM.2013.76","DOIUrl":"https://doi.org/10.1109/ICICM.2013.76","url":null,"abstract":"Since the advent of Enterprise Architecture (EA), several EA frameworks have been proposed. Each EA framework has strong and weak points which can be assessed qualitatively to determine the best EA for an organization. One of the qualitative characteristics is usability of the EA framework. However, currently there is a lack of well-defined criteria to measure EA framework usability. In this paper a model is proposed to evaluate and measure the usability of EA frameworks.","PeriodicalId":179536,"journal":{"name":"2013 International Conference on Informatics and Creative Multimedia","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121282490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Approach to Enhance Robustness in Digital Image Watermarking Using Multiple Bit-Planes of Intermediate Significant Bits","authors":"Ali Sharifara, M. Rahim, Morteza Bashardoost","doi":"10.1109/ICICM.2013.13","DOIUrl":"https://doi.org/10.1109/ICICM.2013.13","url":null,"abstract":"The main aim of this paper is to introduce a novel approach to preserve digital images' copyrights. Hence as ISB scheme was selected in relation to the approach in an attempt conquer the issues of robustness and imperceptibility in watermarked imagery. According to the literature review, embedding the aimed secret bits (Watermark) is a problematic issue inside a host image (normal 8-bit, grey-scale) in a sense to make it undetectable by the HVS (Human Visual System) in addition to the matter that it is predicted to receive any attacks. The suggested method here represents an improved scheme for the embedding of ISB which maintains the robustness and cultivates the rate of security by employing repeated bits in various bit planes over an irregular order and it develops the LSB technique specifically in circumstances where robustness and imperceptibility are main points of assessment.","PeriodicalId":179536,"journal":{"name":"2013 International Conference on Informatics and Creative Multimedia","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122271124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
WaiShiang Cheah, Tay Zhen Wei, Boon Hue kee, F. Mohamad
{"title":"Interactive Mobile Game for Learning about Sustainablity Education","authors":"WaiShiang Cheah, Tay Zhen Wei, Boon Hue kee, F. Mohamad","doi":"10.1109/ICICM.2013.65","DOIUrl":"https://doi.org/10.1109/ICICM.2013.65","url":null,"abstract":"Game-based learning is an effective way to engage learners to learn through interactivity afforded by computing technology today. This paper presents an approach to use an interactive mobile game to teach about sustainability issues. The game is created as an interactive mobile application called \"LifeTree\", and it introduces a new design strategy that uses a bubble analogy throughout the theme in the game. Initial user testing has indicated that the mobile game is found to be interesting and relevant to the learning of environmental issues that challenge the world today.","PeriodicalId":179536,"journal":{"name":"2013 International Conference on Informatics and Creative Multimedia","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125476443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Concept of Digital Literacy from the Perspective of the Creative Multimedia Industry","authors":"Nazerin Ibrahim, T. N. T. Shariman, P. Woods","doi":"10.1109/ICICM.2013.51","DOIUrl":"https://doi.org/10.1109/ICICM.2013.51","url":null,"abstract":"It is pertinent to develop digital literacy skills that enable the effective and efficient use of Information Technology applications to access and use the digital information needed for work tasks (Coiro, Knoble, Lank shear & Leu, 2008) to meet the current needs of the creative multimedia industry. Even when graduates have access to computers and the Internet and use these tools on a daily basis, they may not have the digital literacy to fulfil the requirements as needed by employers. This preliminary study seeks to identify the digital literacy requirement of the creative multimedia industry. This is a small scale study that employs the interview method to obtain information from five leaders, selected through purposive sampling, of the creative multimedia industry. Findings indicate three aspect of digital literacy, namely research competence, communication competence and social competence, are needed to prepare students for employment in creative multimedia industries.","PeriodicalId":179536,"journal":{"name":"2013 International Conference on Informatics and Creative Multimedia","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124051137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile Learning Awareness among Students at Higher Learning Institutes: A Case Study","authors":"Siti Fazlina, A. A. Manap, R. M. Rias","doi":"10.1109/ICICM.2013.46","DOIUrl":"https://doi.org/10.1109/ICICM.2013.46","url":null,"abstract":"Mobile learning or M-Learning provides effective pedagogical and useful learning activities that can be supported by the wireless technology. This new learning paradigm has captivated the interest of researchers, educators and companies developing learning system and instructional materials. This preliminary study is intended to investigate the student's acceptance towards the use of mobile devices as a medium of learning to accommodate the learning experience and complement the effectiveness of traditional learning in order to promote learning. The reported study is aimed to identify the students' view point on M-Learning in their academic life. The data was analyzed using descriptive statistical analysis techniques, arithmetic mean and standard deviation. The finding revealed that student readiness to perceived usefulness of mobile learning was very positive. Students' acceptance towards mobile learning was very high. Result was highly shown that majority of the respondents practically willing to accept the mobile learning as a new mechanism of teaching and learning process in order to enhance the learning and education experience of the students.","PeriodicalId":179536,"journal":{"name":"2013 International Conference on Informatics and Creative Multimedia","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130729431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}