Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "689205ea-02ad-4687-88e5-59eee45c8a4e"}, "_deposit": {"id": "3416", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3416"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3416", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Improving Confidentiality and Integrity of Syntactic Steganography by using Error Control Techniques", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Among many types of security techniques,steganography is the one that used to build privatecommunication over the public channel. This paperproposes linguistic steganography system by utilizinglossless compression methods, error controltechniques and syntax transformation of Englishlanguage based embedding. The secret message isfirst compressed with Huffman or Shannon-Fanocompression methods to achieve higher capacity. Tomaintain integrity and confidentiality of the secretmessage, Hamming code error correction and SHA-1based Keyed-hash Message Authentication Code(HMAC) may be applied after compressionaccording to the required security level. Because ofusing transformable syntax forms to carry hiddeninformation, the imperceptibility cannot be damagedby producing meaning preserving sentences. Theproposed system is evaluated by using Reuter corpusas a testing environment and Machine Translation(MT) evaluation toolkit of NIST as a similaritymeasuring tool. It randomly chooses 1804 sentencesfrom about 190 files of three publication days tocompare with an existing stego system. The resultshows that the proposed system can enhanceintegrity and confidentiality of secret information byusing error control techniques."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-03"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "12038.pdf", "filesize": [{"value": "553 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 553000.0, "url": {"url": "https://meral.edu.mm/record/3416/files/12038.pdf"}, "version_id": "1cf39862-253d-4c17-9b77-b368838cee75"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Twelfth International Conference On Computer Applications (ICCA 2014)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Khine, May Aye"}, {"subitem_authors_fullname": "Wai, Ei Nyein Chan"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2014-02-17"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/117"}, "item_title": "Improving Confidentiality and Integrity of Syntactic Steganography by using Error Control Techniques", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003416", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-03"}, "publish_date": "2019-07-03", "publish_status": "0", "recid": "3416", "relation": {}, "relation_version_is_last": true, "title": ["Improving Confidentiality and Integrity of Syntactic Steganography by using Error Control Techniques"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Improving Confidentiality and Integrity of Syntactic Steganography by using Error Control Techniques

http://hdl.handle.net/20.500.12678/0000003416
http://hdl.handle.net/20.500.12678/0000003416
690bc156-763e-45c1-b6c0-3e9953462aac
689205ea-02ad-4687-88e5-59eee45c8a4e
None
Preview
Name / File License Actions
12038.pdf 12038.pdf (553 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 10:07:21.364030
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL