Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "a834d20f-577a-4cda-ae07-95299c7d287a"}, "_deposit": {"id": "4513", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4513"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4513", "sets": ["1597824273898", "user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Syntax Bank and HMAC based Syntactic Steganography Approach for Information Security", "subitem_1551255648112": "en_US"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Steganography plays an important role forinformation security in today digital age.Because of the widespread usages of naturallanguage, we propose a linguisticsteganography approach based on syntax bankand HMAC in this paper. The proposed systemfirst uses the combination of most popular twolossless data compression methods to compressthe input secret message. At the same time, thesystem extracts the syntax of the incoming covertext sentence. Then, syntax set creation taskconstructs the syntax set of the given sentencewith the help of the syntax bank. The syntaxtransformation step then transforms the inputsentence into a desired syntax that canrepresent the key-controlled semi-randomlygenerated secret bits intended to hide in thesentence. In addition, we apply SHA 512 hashalgorithm to generate keyed-hash messageauthentication code (HMAC) in order to presentthe identity of the resulting stego text. Theresulting stego text will still be innocent-lookingby applying semantically unchanged syntaxtransformation on the input text. Thus, thedetection of the secret message may be hard forthe intruder."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-11-15"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "10094.pdf", "filesize": [{"value": "479 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 479000.0, "url": {"url": "https://meral.edu.mm/record/4513/files/10094.pdf"}, "version_id": "89f73786-5645-4055-8e66-a2bc4c8cd0cc"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Tenth International Conference On Computer Applications (ICCA 2012)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Wai, Ei Nyein Chan"}, {"subitem_authors_fullname": "Khine, May Aye"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2012-02-28"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/2439"}, "item_title": "Syntax Bank and HMAC based Syntactic Steganography Approach for Information Security", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004513", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-11-15"}, "publish_date": "2019-11-15", "publish_status": "0", "recid": "4513", "relation": {}, "relation_version_is_last": true, "title": ["Syntax Bank and HMAC based Syntactic Steganography Approach for Information Security"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Syntax Bank and HMAC based Syntactic Steganography Approach for Information Security

http://hdl.handle.net/20.500.12678/0000004513
http://hdl.handle.net/20.500.12678/0000004513
6b3dd16d-85c7-4988-b324-b36f5d2a9108
a834d20f-577a-4cda-ae07-95299c7d287a
None
Preview
Name / File License Actions
10094.pdf 10094.pdf (479 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 14:59:50.817044
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL