Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "e69254c2-1a8b-4763-9b0e-0e9e235c0d83"}, "_deposit": {"id": "4252", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4252"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4252", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Syntactic Steganography Approach for Information Security", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "In today digital age, there are moredemands to improve techniques for informationsecurity. One of the solutions is steganography,hiding sensitive information within innocentlookingcover media. In this paper, we proposea syntax-based steganography approach byusing the syntax bank. The input raw sentence isparsed with the Stanford parser that canproduce a phrase structure of the sentence. Thisparse structure is then used to produce thesyntax of the sentence. At the same time,Shannon-Fano coding is used to compress theinput secret message as minimum total bitslength as possible. Then, syntax transformationtask searches the syntax set of the givensentence within the syntax bank, and thentransforms it into a desired syntax that canrepresent the key-controlled semi-randomlygenerated secret bits intended to hide in thesentence. The resulting stego text will still beinnocent-looking by applying semanticallyunchanged syntax transformation on the inputtext. Thus, the detection of the secret messagemay be hard for the intruder."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-03"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "9064.pdf", "filesize": [{"value": "55 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 55000.0, "url": {"url": "https://meral.edu.mm/record/4252/files/9064.pdf"}, "version_id": "db27685b-279c-4b42-85d8-3bd300eddc4a"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Ninth International Conference On Computer Applications (ICCA 2011)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Wai, Ei Nyein Chan"}, {"subitem_authors_fullname": "Khine, May Aye"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2011-05-05"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/207"}, "item_title": "Syntactic Steganography Approach for Information Security", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004252", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-03"}, "publish_date": "2019-07-03", "publish_status": "0", "recid": "4252", "relation": {}, "relation_version_is_last": true, "title": ["Syntactic Steganography Approach for Information Security"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Syntactic Steganography Approach for Information Security

http://hdl.handle.net/20.500.12678/0000004252
http://hdl.handle.net/20.500.12678/0000004252
c87fbea4-eb66-4c72-8ba6-4c48580d83a5
e69254c2-1a8b-4763-9b0e-0e9e235c0d83
None
Preview
Name / File License Actions
9064.pdf 9064.pdf (55 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 14:24:58.146870
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL