{"created":"2020-09-01T14:24:56.338574+00:00","id":4252,"links":{},"metadata":{"_buckets":{"deposit":"e69254c2-1a8b-4763-9b0e-0e9e235c0d83"},"_deposit":{"id":"4252","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4252"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4252","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Syntactic Steganography Approach for Information Security","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"In today digital age, there are moredemands to improve techniques for informationsecurity. One of the solutions is steganography,hiding sensitive information within innocentlookingcover media. In this paper, we proposea syntax-based steganography approach byusing the syntax bank. The input raw sentence isparsed with the Stanford parser that canproduce a phrase structure of the sentence. Thisparse structure is then used to produce thesyntax of the sentence. At the same time,Shannon-Fano coding is used to compress theinput secret message as minimum total bitslength as possible. Then, syntax transformationtask searches the syntax set of the givensentence within the syntax bank, and thentransforms it into a desired syntax that canrepresent the key-controlled semi-randomlygenerated secret bits intended to hide in thesentence. The resulting stego text will still beinnocent-looking by applying semanticallyunchanged syntax transformation on the inputtext. Thus, the detection of the secret messagemay be hard for the intruder."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-03"}],"displaytype":"preview","filename":"9064.pdf","filesize":[{"value":"55 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4252/files/9064.pdf"},"version_id":"db27685b-279c-4b42-85d8-3bd300eddc4a"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Ninth International Conference On Computer Applications (ICCA 2011)","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Wai, Ei Nyein Chan"},{"subitem_authors_fullname":"Khine, May Aye"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2011-05-05"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/207"},"item_title":"Syntactic Steganography Approach for Information Security","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-03","publish_status":"0","recid":"4252","relation_version_is_last":true,"title":["Syntactic Steganography Approach for Information Security"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T01:39:36.128824+00:00"}