Professional Documents
Culture Documents
Chapter-6: Software Testing Is An Investigation Conducted To Provide Stakeholders With Information About
Chapter-6: Software Testing Is An Investigation Conducted To Provide Stakeholders With Information About
Chapter-6: Software Testing Is An Investigation Conducted To Provide Stakeholders With Information About
TESTING
CHAPTER-6 TESTING
Software testing is an investigation conducted to provide stakeholders with information about the quality of the product or service under test.[1] Software testing can also provide an objective, independent view of the software to allow the business to appreciate and understand the risks of software implementation. Test techniques include, but are not limited to, the process of executing a program or application with the intent of finding software bugs (errors or other defects). Software testing can be stated as the process of validating and verifying that a software program/application/product: 1. 2. 3. meets the requirements that guided its design and development; works as expected; and can be implemented with the same characteristics.
Software testing, depending on the testing method employed, can be implemented at any time in the development process. However, most of the test effort occurs after the requirements have been defined and the coding process has been completed[1]. As such, the methodology of the test is governed by the software development methodology adopted.
TESTING
TESTING
6.3.1.2 TEST CASE -EMBEDDING PROCEDUREAction performed Input Host image Action On logo image Input logo image greater in dimension w.r.t host image Action Performed The large sized logo file is fed into software for embedding Invalid output Showing Invalid outputs Required Output Error message: Choose proper image size, go to welcome screen Remarks
TESTING
TESTING
6.4.1 Impercebtibility
The imperceptibility of the watermark is tested through comparing the watermarked image with the original one.Several tests are used in this regard
6.4.1.2 PSNR
Pick Signal to Noise Ratio (PSNR) is a better test since it takes the signal strength into consideration (not only the error). Equation (4) describes how this value is obtained.
TESTING
Fig: showing PSNR and MSE value for attacked and non-attacked images
6.4.2 ROBUSTNESS
This is by far the most important requirement of a watermark. There are various attacks, unintentional (cropping, compression, scaling) and unintentional attacks which are aimed at destroying the watermark. So, the embedded watermark should be such that it is invariant to various such attacks. They are designed to resist any manipulations that may be encountered. All applications where security is the main issue use. The robustness of a watermark method can be evaluated by performing attacks on the watermarked image and evaluating the similarity of the extracted message to the original one.
TESTING
The noise attacked watermarked image is fed into software for extraction
TESTING
Fig: Watermarked_Image
Fig: Attacked_watermarkimage
Fig: Recovered_logo
TESTING
TESTING
HISTOGRAM ANALYSIS
TESTING
6.4.3 CAPACITY
. The capacity of the watermark method can be easily tested by increasing the length of the watermarking message. Any watermarking method is not capable of holding more than a certain length of message or it will endanger its imperceptibility.