Index Link

  • RootNode
    • Co-operative College, Mandalay
    • Cooperative College, Phaunggyi
    • Co-operative University, Sagaing
    • Co-operative University, Thanlyin
    • Dagon University
    • Kyaukse University
    • Laquarware Technological college
    • Mandalay Technological University
    • Mandalay University of Distance Education
    • Mandalay University of Foreign Languages
    • Maubin University
    • Mawlamyine University
    • Meiktila University
    • Mohnyin University
    • Myanmar Institute of Information Technology
    • Myanmar Maritime University
    • National Management Degree College
    • Naypyitaw State Academy
    • Pathein University
    • Sagaing University
    • Sagaing University of Education
    • Taunggyi University
    • Technological University, Hmawbi
    • Technological University (Kyaukse)
    • Technological University Mandalay
    • University of Computer Studies, Mandalay
    • University of Computer Studies Maubin
    • University of Computer Studies, Meikhtila
    • University of Computer Studies Pathein
    • University of Computer Studies, Taungoo
    • University of Computer Studies, Yangon
    • University of Dental Medicine Mandalay
    • University of Dental Medicine, Yangon
    • University of Information Technology
    • University of Mandalay
    • University of Medicine 1
    • University of Medicine 2
    • University of Medicine Mandalay
    • University of Myitkyina
    • University of Public Health, Yangon
    • University of Veterinary Science
    • University of Yangon
    • West Yangon University
    • Yadanabon University
    • Yangon Technological University
    • Yangon University of Distance Education
    • Yangon University of Economics
    • Yangon University of Education
    • Yangon University of Foreign Languages
    • Yezin Agricultural University
    • New Index

Item

{"_buckets": {"deposit": "667eff7a-25d2-4f3d-ac86-8fd6524c2d3b"}, "_deposit": {"id": "4506", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4506"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4506", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Secure Information Hiding in SOAP Messages Using Cryptography and Steganography", "subitem_1551255648112": "en_US"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Computer techniques are progressingremarkably and the amount of electronicallytransmitted information is increasing every day.Different security measures can be employed toensure the integrity and confidentiality of secretinformation. As a result, steganography hasbecome an interesting and challenging field ofresearch striving to achieve greater immunity ofhidden data on the host cover media like image,audio, or text. Although techniques for images orsounds have mainly been studied, there are fewexamples of research of the information hidingmethod on text data. The proposed system usesan SOAP message as cover text, embedded secretinformation using stego-key. Steganographyespecially combined with cryptography is apowerful tool which enables people tocommunicate without possible eavesdropperseven knowing there is a form of communicationin the first place. It provides double security.Digital Signature which is a cryptographictechnique is used to authenticate messagesbetween parties. In this study, we propose asecure and undetectable steganographytechnique to be used for SOAP signaturemessages within XML Web servicesenvironments. This technique is embedded secretdata into an innocuous cover text by shufflingXML elements to form the stego text withminimum degradation."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "SOAP"}, {"interim": "information hiding"}, {"interim": "steganography"}, {"interim": "XML"}, {"interim": "digital signature"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-11-15"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "10086.pdf", "filesize": [{"value": "579 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 579000.0, "url": {"url": "https://meral.edu.mm/record/4506/files/10086.pdf"}, "version_id": "1273b876-1a07-4edc-a734-5542a6d18a38"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Tenth International Conference On Computer Applications (ICCA 2012)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Thin, Lwin Mar"}, {"subitem_authors_fullname": "Kham, Nang Saing Moon"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2012-02-28"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/2432"}, "item_title": "Secure Information Hiding in SOAP Messages Using Cryptography and Steganography", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004506", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-11-15"}, "publish_date": "2019-11-15", "publish_status": "0", "recid": "4506", "relation": {}, "relation_version_is_last": true, "title": ["Secure Information Hiding in SOAP Messages Using Cryptography and Steganography"], "weko_shared_id": -1}

Secure Information Hiding in SOAP Messages Using Cryptography and Steganography

http://hdl.handle.net/20.500.12678/0000004506
27e4f43b-9631-4ee0-a617-24a7cf54eb4f
667eff7a-25d2-4f3d-ac86-8fd6524c2d3b
None
Name / File License Actions
10086.pdf 10086.pdf (579 Kb)
Publication type
Article
Upload type
Publication
Title
Title Secure Information Hiding in SOAP Messages Using Cryptography and Steganography
Language en_US
Publication date 2012-02-28
Authors
Thin, Lwin Mar
Kham, Nang Saing Moon
Description
Computer techniques are progressingremarkably and the amount of electronicallytransmitted information is increasing every day.Different security measures can be employed toensure the integrity and confidentiality of secretinformation. As a result, steganography hasbecome an interesting and challenging field ofresearch striving to achieve greater immunity ofhidden data on the host cover media like image,audio, or text. Although techniques for images orsounds have mainly been studied, there are fewexamples of research of the information hidingmethod on text data. The proposed system usesan SOAP message as cover text, embedded secretinformation using stego-key. Steganographyespecially combined with cryptography is apowerful tool which enables people tocommunicate without possible eavesdropperseven knowing there is a form of communicationin the first place. It provides double security.Digital Signature which is a cryptographictechnique is used to authenticate messagesbetween parties. In this study, we propose asecure and undetectable steganographytechnique to be used for SOAP signaturemessages within XML Web servicesenvironments. This technique is embedded secretdata into an innocuous cover text by shufflingXML elements to form the stego text withminimum degradation.
Keywords
SOAP, information hiding, steganography, XML, digital signature
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/2432
Journal articles
Tenth International Conference On Computer Applications (ICCA 2012)
Conference papers
Books/reports/chapters
Thesis/dissertations
0
0
views
downloads
Views Downloads

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats