{"created":"2020-09-01T14:58:25.992882+00:00","id":4506,"links":{},"metadata":{"_buckets":{"deposit":"667eff7a-25d2-4f3d-ac86-8fd6524c2d3b"},"_deposit":{"id":"4506","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4506"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4506","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Secure Information Hiding in SOAP Messages Using Cryptography and Steganography","subitem_1551255648112":"en_US"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Computer techniques are progressingremarkably and the amount of electronicallytransmitted information is increasing every day.Different security measures can be employed toensure the integrity and confidentiality of secretinformation. As a result, steganography hasbecome an interesting and challenging field ofresearch striving to achieve greater immunity ofhidden data on the host cover media like image,audio, or text. Although techniques for images orsounds have mainly been studied, there are fewexamples of research of the information hidingmethod on text data. The proposed system usesan SOAP message as cover text, embedded secretinformation using stego-key. Steganographyespecially combined with cryptography is apowerful tool which enables people tocommunicate without possible eavesdropperseven knowing there is a form of communicationin the first place. It provides double security.Digital Signature which is a cryptographictechnique is used to authenticate messagesbetween parties. In this study, we propose asecure and undetectable steganographytechnique to be used for SOAP signaturemessages within XML Web servicesenvironments. This technique is embedded secretdata into an innocuous cover text by shufflingXML elements to form the stego text withminimum degradation."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"SOAP"},{"interim":"information hiding"},{"interim":"steganography"},{"interim":"XML"},{"interim":"digital signature"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-11-15"}],"displaytype":"preview","filename":"10086.pdf","filesize":[{"value":"579 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4506/files/10086.pdf"},"version_id":"1273b876-1a07-4edc-a734-5542a6d18a38"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Tenth International Conference On Computer Applications (ICCA 2012)","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Thin, Lwin Mar"},{"subitem_authors_fullname":"Kham, Nang Saing Moon"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2012-02-28"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/2432"},"item_title":"Secure Information Hiding in SOAP Messages Using Cryptography and Steganography","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-11-15","publish_status":"0","recid":"4506","relation_version_is_last":true,"title":["Secure Information Hiding in SOAP Messages Using Cryptography and Steganography"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T02:03:51.453536+00:00"}