MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "a834d20f-577a-4cda-ae07-95299c7d287a"}, "_deposit": {"id": "4513", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4513"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4513", "sets": ["1597824273898", "user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Syntax Bank and HMAC based Syntactic Steganography Approach for Information Security", "subitem_1551255648112": "en_US"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Steganography plays an important role forinformation security in today digital age.Because of the widespread usages of naturallanguage, we propose a linguisticsteganography approach based on syntax bankand HMAC in this paper. The proposed systemfirst uses the combination of most popular twolossless data compression methods to compressthe input secret message. At the same time, thesystem extracts the syntax of the incoming covertext sentence. Then, syntax set creation taskconstructs the syntax set of the given sentencewith the help of the syntax bank. The syntaxtransformation step then transforms the inputsentence into a desired syntax that canrepresent the key-controlled semi-randomlygenerated secret bits intended to hide in thesentence. In addition, we apply SHA 512 hashalgorithm to generate keyed-hash messageauthentication code (HMAC) in order to presentthe identity of the resulting stego text. Theresulting stego text will still be innocent-lookingby applying semantically unchanged syntaxtransformation on the input text. Thus, thedetection of the secret message may be hard forthe intruder."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-11-15"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "10094.pdf", "filesize": [{"value": "479 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 479000.0, "url": {"url": "https://meral.edu.mm/record/4513/files/10094.pdf"}, "version_id": "89f73786-5645-4055-8e66-a2bc4c8cd0cc"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Tenth International Conference On Computer Applications (ICCA 2012)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Wai, Ei Nyein Chan"}, {"subitem_authors_fullname": "Khine, May Aye"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2012-02-28"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/2439"}, "item_title": "Syntax Bank and HMAC based Syntactic Steganography Approach for Information Security", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004513", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-11-15"}, "publish_date": "2019-11-15", "publish_status": "0", "recid": "4513", "relation": {}, "relation_version_is_last": true, "title": ["Syntax Bank and HMAC based Syntactic Steganography Approach for Information Security"], "weko_shared_id": -1}
Syntax Bank and HMAC based Syntactic Steganography Approach for Information Security
http://hdl.handle.net/20.500.12678/0000004513
http://hdl.handle.net/20.500.12678/00000045136b3dd16d-85c7-4988-b324-b36f5d2a9108
a834d20f-577a-4cda-ae07-95299c7d287a
Name / File | License | Actions |
---|---|---|
10094.pdf (479 Kb)
|
|