Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "667eff7a-25d2-4f3d-ac86-8fd6524c2d3b"}, "_deposit": {"id": "4506", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4506"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4506", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Secure Information Hiding in SOAP Messages Using Cryptography and Steganography", "subitem_1551255648112": "en_US"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Computer techniques are progressingremarkably and the amount of electronicallytransmitted information is increasing every day.Different security measures can be employed toensure the integrity and confidentiality of secretinformation. As a result, steganography hasbecome an interesting and challenging field ofresearch striving to achieve greater immunity ofhidden data on the host cover media like image,audio, or text. Although techniques for images orsounds have mainly been studied, there are fewexamples of research of the information hidingmethod on text data. The proposed system usesan SOAP message as cover text, embedded secretinformation using stego-key. Steganographyespecially combined with cryptography is apowerful tool which enables people tocommunicate without possible eavesdropperseven knowing there is a form of communicationin the first place. It provides double security.Digital Signature which is a cryptographictechnique is used to authenticate messagesbetween parties. In this study, we propose asecure and undetectable steganographytechnique to be used for SOAP signaturemessages within XML Web servicesenvironments. This technique is embedded secretdata into an innocuous cover text by shufflingXML elements to form the stego text withminimum degradation."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "SOAP"}, {"interim": "information hiding"}, {"interim": "steganography"}, {"interim": "XML"}, {"interim": "digital signature"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-11-15"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "10086.pdf", "filesize": [{"value": "579 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 579000.0, "url": {"url": "https://meral.edu.mm/record/4506/files/10086.pdf"}, "version_id": "1273b876-1a07-4edc-a734-5542a6d18a38"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Tenth International Conference On Computer Applications (ICCA 2012)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Thin, Lwin Mar"}, {"subitem_authors_fullname": "Kham, Nang Saing Moon"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2012-02-28"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/2432"}, "item_title": "Secure Information Hiding in SOAP Messages Using Cryptography and Steganography", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004506", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-11-15"}, "publish_date": "2019-11-15", "publish_status": "0", "recid": "4506", "relation": {}, "relation_version_is_last": true, "title": ["Secure Information Hiding in SOAP Messages Using Cryptography and Steganography"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Secure Information Hiding in SOAP Messages Using Cryptography and Steganography

http://hdl.handle.net/20.500.12678/0000004506
http://hdl.handle.net/20.500.12678/0000004506
27e4f43b-9631-4ee0-a617-24a7cf54eb4f
667eff7a-25d2-4f3d-ac86-8fd6524c2d3b
None
Preview
Name / File License Actions
10086.pdf 10086.pdf (579 Kb)
Publication type
Article
Upload type
Publication
Title
Title Secure Information Hiding in SOAP Messages Using Cryptography and Steganography
Language en_US
Publication date 2012-02-28
Authors
Thin, Lwin Mar
Kham, Nang Saing Moon
Description
Computer techniques are progressingremarkably and the amount of electronicallytransmitted information is increasing every day.Different security measures can be employed toensure the integrity and confidentiality of secretinformation. As a result, steganography hasbecome an interesting and challenging field ofresearch striving to achieve greater immunity ofhidden data on the host cover media like image,audio, or text. Although techniques for images orsounds have mainly been studied, there are fewexamples of research of the information hidingmethod on text data. The proposed system usesan SOAP message as cover text, embedded secretinformation using stego-key. Steganographyespecially combined with cryptography is apowerful tool which enables people tocommunicate without possible eavesdropperseven knowing there is a form of communicationin the first place. It provides double security.Digital Signature which is a cryptographictechnique is used to authenticate messagesbetween parties. In this study, we propose asecure and undetectable steganographytechnique to be used for SOAP signaturemessages within XML Web servicesenvironments. This technique is embedded secretdata into an innocuous cover text by shufflingXML elements to form the stego text withminimum degradation.
Keywords
SOAP, information hiding, steganography, XML, digital signature
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/2432
Journal articles
Tenth International Conference On Computer Applications (ICCA 2012)
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 14:58:31.073486
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL