-
RootNode
-
Co-operative College, Mandalay
-
Cooperative College, Phaunggyi
-
Co-operative University, Sagaing
-
Co-operative University, Thanlyin
-
Dagon University
-
Kyaukse University
-
Laquarware Technological college
-
Mandalay Technological University
-
Mandalay University of Distance Education
-
Mandalay University of Foreign Languages
-
Maubin University
-
Mawlamyine University
-
Meiktila University
-
Mohnyin University
-
Myanmar Institute of Information Technology
-
Myanmar Maritime University
-
National Management Degree College
-
Naypyitaw State Academy
-
Pathein University
-
Sagaing University
-
Sagaing University of Education
-
Taunggyi University
-
Technological University, Hmawbi
-
Technological University (Kyaukse)
-
Technological University Mandalay
-
University of Computer Studies, Mandalay
-
University of Computer Studies Maubin
-
University of Computer Studies, Meikhtila
-
University of Computer Studies Pathein
-
University of Computer Studies, Taungoo
-
University of Computer Studies, Yangon
-
University of Dental Medicine Mandalay
-
University of Dental Medicine, Yangon
-
University of Information Technology
-
University of Mandalay
-
University of Medicine 1
-
University of Medicine 2
-
University of Medicine Mandalay
-
University of Myitkyina
-
University of Public Health, Yangon
-
University of Veterinary Science
-
University of Yangon
-
West Yangon University
-
Yadanabon University
-
Yangon Technological University
-
Yangon University of Distance Education
-
Yangon University of Economics
-
Yangon University of Education
-
Yangon University of Foreign Languages
-
Yezin Agricultural University
-
New Index
-
Item
{"_buckets": {"deposit": "667eff7a-25d2-4f3d-ac86-8fd6524c2d3b"}, "_deposit": {"id": "4506", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4506"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4506", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Secure Information Hiding in SOAP Messages Using Cryptography and Steganography", "subitem_1551255648112": "en_US"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Computer techniques are progressingremarkably and the amount of electronicallytransmitted information is increasing every day.Different security measures can be employed toensure the integrity and confidentiality of secretinformation. As a result, steganography hasbecome an interesting and challenging field ofresearch striving to achieve greater immunity ofhidden data on the host cover media like image,audio, or text. Although techniques for images orsounds have mainly been studied, there are fewexamples of research of the information hidingmethod on text data. The proposed system usesan SOAP message as cover text, embedded secretinformation using stego-key. Steganographyespecially combined with cryptography is apowerful tool which enables people tocommunicate without possible eavesdropperseven knowing there is a form of communicationin the first place. It provides double security.Digital Signature which is a cryptographictechnique is used to authenticate messagesbetween parties. In this study, we propose asecure and undetectable steganographytechnique to be used for SOAP signaturemessages within XML Web servicesenvironments. This technique is embedded secretdata into an innocuous cover text by shufflingXML elements to form the stego text withminimum degradation."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "SOAP"}, {"interim": "information hiding"}, {"interim": "steganography"}, {"interim": "XML"}, {"interim": "digital signature"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-11-15"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "10086.pdf", "filesize": [{"value": "579 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 579000.0, "url": {"url": "https://meral.edu.mm/record/4506/files/10086.pdf"}, "version_id": "1273b876-1a07-4edc-a734-5542a6d18a38"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Tenth International Conference On Computer Applications (ICCA 2012)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Thin, Lwin Mar"}, {"subitem_authors_fullname": "Kham, Nang Saing Moon"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2012-02-28"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/2432"}, "item_title": "Secure Information Hiding in SOAP Messages Using Cryptography and Steganography", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004506", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-11-15"}, "publish_date": "2019-11-15", "publish_status": "0", "recid": "4506", "relation": {}, "relation_version_is_last": true, "title": ["Secure Information Hiding in SOAP Messages Using Cryptography and Steganography"], "weko_shared_id": -1}
Secure Information Hiding in SOAP Messages Using Cryptography and Steganography
http://hdl.handle.net/20.500.12678/0000004506
http://hdl.handle.net/20.500.12678/000000450627e4f43b-9631-4ee0-a617-24a7cf54eb4f
667eff7a-25d2-4f3d-ac86-8fd6524c2d3b
Name / File | License | Actions |
---|---|---|
![]() |
|
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Secure Information Hiding in SOAP Messages Using Cryptography and Steganography | |||||
Language | en_US | |||||
Publication date | 2012-02-28 | |||||
Authors | ||||||
Thin, Lwin Mar | ||||||
Kham, Nang Saing Moon | ||||||
Description | ||||||
Computer techniques are progressingremarkably and the amount of electronicallytransmitted information is increasing every day.Different security measures can be employed toensure the integrity and confidentiality of secretinformation. As a result, steganography hasbecome an interesting and challenging field ofresearch striving to achieve greater immunity ofhidden data on the host cover media like image,audio, or text. Although techniques for images orsounds have mainly been studied, there are fewexamples of research of the information hidingmethod on text data. The proposed system usesan SOAP message as cover text, embedded secretinformation using stego-key. Steganographyespecially combined with cryptography is apowerful tool which enables people tocommunicate without possible eavesdropperseven knowing there is a form of communicationin the first place. It provides double security.Digital Signature which is a cryptographictechnique is used to authenticate messagesbetween parties. In this study, we propose asecure and undetectable steganographytechnique to be used for SOAP signaturemessages within XML Web servicesenvironments. This technique is embedded secretdata into an innocuous cover text by shufflingXML elements to form the stego text withminimum degradation. | ||||||
Keywords | ||||||
SOAP, information hiding, steganography, XML, digital signature | ||||||
Identifier | http://onlineresource.ucsy.edu.mm/handle/123456789/2432 | |||||
Journal articles | ||||||
Tenth International Conference On Computer Applications (ICCA 2012) | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |