{"created":"2020-09-01T10:07:16.624375+00:00","id":3416,"links":{},"metadata":{"_buckets":{"deposit":"689205ea-02ad-4687-88e5-59eee45c8a4e"},"_deposit":{"id":"3416","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3416"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3416","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Improving Confidentiality and Integrity of Syntactic Steganography by using Error Control Techniques","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Among many types of security techniques,steganography is the one that used to build privatecommunication over the public channel. This paperproposes linguistic steganography system by utilizinglossless compression methods, error controltechniques and syntax transformation of Englishlanguage based embedding. The secret message isfirst compressed with Huffman or Shannon-Fanocompression methods to achieve higher capacity. Tomaintain integrity and confidentiality of the secretmessage, Hamming code error correction and SHA-1based Keyed-hash Message Authentication Code(HMAC) may be applied after compressionaccording to the required security level. Because ofusing transformable syntax forms to carry hiddeninformation, the imperceptibility cannot be damagedby producing meaning preserving sentences. Theproposed system is evaluated by using Reuter corpusas a testing environment and Machine Translation(MT) evaluation toolkit of NIST as a similaritymeasuring tool. It randomly chooses 1804 sentencesfrom about 190 files of three publication days tocompare with an existing stego system. The resultshows that the proposed system can enhanceintegrity and confidentiality of secret information byusing error control techniques."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-03"}],"displaytype":"preview","filename":"12038.pdf","filesize":[{"value":"553 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3416/files/12038.pdf"},"version_id":"1cf39862-253d-4c17-9b77-b368838cee75"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Twelfth International Conference On Computer Applications (ICCA 2014)","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Khine, May Aye"},{"subitem_authors_fullname":"Wai, Ei Nyein Chan"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2014-02-17"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/117"},"item_title":"Improving Confidentiality and Integrity of Syntactic Steganography by using Error Control Techniques","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-03","publish_status":"0","recid":"3416","relation_version_is_last":true,"title":["Improving Confidentiality and Integrity of Syntactic Steganography by using Error Control Techniques"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T00:55:21.336261+00:00"}