{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:10:38Z","timestamp":1753884638253,"version":"3.41.2"},"reference-count":37,"publisher":"World Scientific Pub Co Pte Ltd","issue":"06","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Image Grap."],"published-print":{"date-parts":[[2023,11]]},"abstract":"<jats:p> Context: Due to the change and advancement in technology, day by day the internet service usages are also increasing. Smartphones have become the necessity for every person these days. It is used to perform all basic daily activities such as calling, SMS, banking, gaming, entertainment, education, etc. Therefore, malware authors are developing new variants of malwares or malicious applications especially for monetary benefits. <\/jats:p><jats:p> Objective: Objective of this research paper is to develop a technique that can be used to detect malwares or malicious applications on the android devices that will work for all types of packed or encrypted malicious applications, which usually evade decompiling tools. <\/jats:p><jats:p> Method: In the proposed approach, visualization method is used for the detection of malware. In the first phase, application files are converted into images and then in second phase, texture feature of images are extracted using Grey Level Co-occurrence Matrix (GLCM). In the last phase, machine learning classification algorithms are used to classify the malicious and benign applications. <\/jats:p><jats:p> Results: The proposed approach is run on different datasets collected from various repositories. Different efficiency parameters are calculated and the proposed approach is compared with the existing approaches. <\/jats:p><jats:p> Conclusion: We have proposed a static technique for efficient detection of malwares. The proposed technique performs better than the existing technique. <\/jats:p>","DOI":"10.1142\/s0219467823500523","type":"journal-article","created":{"date-parts":[[2022,8,29]],"date-time":"2022-08-29T06:18:38Z","timestamp":1661753918000},"source":"Crossref","is-referenced-by-count":4,"title":["Visualizing Android Malicious Applications Using Texture Features"],"prefix":"10.1142","volume":"23","author":[{"given":"Tejpal","family":"Sharma","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Punjabi University, Patiala 147002, Punjab, India"},{"name":"Department of Computer Science and Engineering, CGC-College of Engineering, Landran, Mohali 140307, Punjab, India"}]},{"given":"Dhavleesh","family":"Rattan","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Punjabi University, Patiala 147002, Punjab, India"}]}],"member":"219","published-online":{"date-parts":[[2022,8,29]]},"reference":[{"key":"S0219467823500523BIB001","first-page":"1","volume":"11","author":"Ding Y.","year":"2020","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"S0219467823500523BIB002","doi-asserted-by":"publisher","DOI":"10.1016\/j.microrel.2019.01.007"},{"key":"S0219467823500523BIB003","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100373"},{"key":"S0219467823500523BIB004","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2021.301176"},{"key":"S0219467823500523BIB005","doi-asserted-by":"publisher","DOI":"10.1145\/3017427"},{"key":"S0219467823500523BIB006","doi-asserted-by":"publisher","DOI":"10.1142\/S0219467820500060"},{"issue":"5","key":"S0219467823500523BIB009","first-page":"2397","volume":"8","author":"Rawal H.","year":"2017","journal-title":"Int. J. Adv. Res. Comput. Sci."},{"key":"S0219467823500523BIB010","first-page":"16","volume":"1","author":"Castillo C. A.","year":"2011","journal-title":"White Pap. McAfee Mob. Secur. Work. Gr."},{"key":"S0219467823500523BIB011","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3447"},{"key":"S0219467823500523BIB012","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2015.06.005"},{"key":"S0219467823500523BIB013","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.03.011"},{"key":"S0219467823500523BIB015","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-6001-5_36"},{"key":"S0219467823500523BIB016","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-017-9368-4"},{"key":"S0219467823500523BIB017","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.11.006"},{"key":"S0219467823500523BIB018","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2021.301265"},{"key":"S0219467823500523BIB019","doi-asserted-by":"publisher","DOI":"10.1142\/S0219467821500339"},{"key":"S0219467823500523BIB020","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029222"},{"key":"S0219467823500523BIB021","doi-asserted-by":"publisher","DOI":"10.1145\/2016904.2016908"},{"key":"S0219467823500523BIB022","doi-asserted-by":"publisher","DOI":"10.1109\/CICYBS.2013.6597204"},{"key":"S0219467823500523BIB023","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0242-0"},{"key":"S0219467823500523BIB024","doi-asserted-by":"publisher","DOI":"10.1109\/ISCO.2016.7726949"},{"key":"S0219467823500523BIB025","first-page":"344","volume-title":"2017 IEEE 2nd Int. Conf. Cloud Computing and Big Data Analysis (ICCCBDA)","author":"Yang M.","year":"2017"},{"key":"S0219467823500523BIB026","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-6385-5_23"},{"key":"S0219467823500523BIB027","doi-asserted-by":"publisher","DOI":"10.1109\/CR.2018.8626828"},{"key":"S0219467823500523BIB028","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-019-06540-6"},{"key":"S0219467823500523BIB029","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.03.015"},{"key":"S0219467823500523BIB030","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-018-0314-1"},{"key":"S0219467823500523BIB031","doi-asserted-by":"publisher","DOI":"10.1007\/s11517-014-1158-6"},{"key":"S0219467823500523BIB032","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2890743"},{"key":"S0219467823500523BIB033","doi-asserted-by":"publisher","DOI":"10.14358\/PERS.69.4.357"},{"issue":"5","key":"S0219467823500523BIB034","first-page":"1","volume":"3","author":"Mohanaiah P.","year":"2013","journal-title":"Int. J. Sci. Res. Publ."},{"key":"S0219467823500523BIB035","doi-asserted-by":"publisher","DOI":"10.1177\/016173469301500401"},{"key":"S0219467823500523BIB036","doi-asserted-by":"publisher","DOI":"10.1016\/j.crad.2004.07.008"},{"key":"S0219467823500523BIB037","doi-asserted-by":"publisher","DOI":"10.1142\/S0219467821400106"},{"key":"S0219467823500523BIB038","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2903508"},{"key":"S0219467823500523BIB039","first-page":"23","volume-title":"21th Annual Network and Distributed System Security Symposium (NDSS)","volume":"14","author":"Arp D."},{"key":"S0219467823500523BIB040","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480701"}],"container-title":["International Journal of Image and Graphics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0219467823500523","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,6]],"date-time":"2023-12-06T08:47:51Z","timestamp":1701852471000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0219467823500523"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,29]]},"references-count":37,"journal-issue":{"issue":"06","published-print":{"date-parts":[[2023,11]]}},"alternative-id":["10.1142\/S0219467823500523"],"URL":"https:\/\/doi.org\/10.1142\/s0219467823500523","relation":{},"ISSN":["0219-4678","1793-6756"],"issn-type":[{"type":"print","value":"0219-4678"},{"type":"electronic","value":"1793-6756"}],"subject":[],"published":{"date-parts":[[2022,8,29]]},"article-number":"2350052"}}