A WATERMARKING TECHNIQUE USING SYNONYM SUBSTITUTION FOR INTEGRITY PROTECTION OF XML DOCUMENTS
|
|
- Gwendolyn Allison
- 5 years ago
- Views:
Transcription
1 ICIC Express Letters ICIC International c 2010 ISSN X Volume 4, Number 1, February 2010 pp A WATERMARKING TECHNIQUE USING SYNONYM SUBSTITUTION FOR INTEGRITY PROTECTION OF XML DOCUMENTS Chin-Chen Chang 1, Yi-Hui Chen 2 and The Duc Kieu 3 1 Department of Information Engineering and Computer Science Feng Chia University Taichung , Taiwan ccc@cs.ccu.edu.tw 2 Research Center for Information Technology Innovation Academia Sinica Taipei 115, Taiwan chenyh@cs.ccu.edu.tw 3 School of Computer Science and Engineering International University Ho Chi Minh city, Vietnam ktduc@hcmiu.edu.vn Received May 2009; accepted August 2009 Abstract. Extensible Markup Language (XML) as the standard representation language is widely used for information exchange. Up to now, how to protect the integrity of XML documents becomes an important issue. XML signature is one of the methods for integrity protection. However, it needs significantly extra spaces for recording the protection information. In this paper, we propose a novel watermarking scheme which uses synonym substitution for embedding the watermarks. Without needing large extra spaces, the XML document can verify the integrity by itself. Keywords: XML, XML signature, Watermark, Integrity protection, Synonym substitution 1. Introduction. XML signature [2, 3, 9] and XML watermarking [11] are techniques to protect the integrity of XML documents. As for XML signature, it requires extra storage for recording the signature information. Another issue concerned for protecting the copyright and integrity is a watermarking technique, which is a data embedding scheme [1, 4, 6, 7, 10, 10, 11, 12] to treat the protection information as watermarks and embeds the watermarks into digital media without attaching any extra data. Later, the watermarks can be extracted to verify the copyright and integrity of the media. Up to now, a few schemes [6, 10, 12] were proposed for text documents because few spaces of them can be used to embed the protected information. Katzenbeisser et al. [7] proposed a watermarking scheme for HTML documents with STC (Switching-tree coding) technique, but extra spaces and tags are needed for embedding watermarks. Furthermore, the file size is significantly expanded because it must record the STC codes after data embedding. In 2003, Sui and Luo [9] modified the case of letters in HTML tags for embedding the secrets as steganography scheme. Zhao and Lu [12] adopted the same concept to design a watermarking scheme applied to tamperproof of HTML documents. In 2006, Yao et al. [11] extended Zhao and Lu s scheme to design a watermarking scheme for protecting the integrity of XML documents. Later on, Huang et al. [6] proposed a steganalytic method, called Tag-Mismatch analysis, to successfully detect the hidden information embedded by using Sui and Luo s scheme. 89
2 90 C.-C. CHANG, Y.-H. CHEN AND T.-D. KIEU In this paper, we propose a watermark technique for protecting the integrity of XML documents by using synonym substitution. It has advantage of no extra storages needed in the proposed scheme so that the size of transmitted data can be significantly reduced than that is done in XML signature. Additionally, the proposed scheme is a self-authentication scheme because the watermark is generated by the XML document itself. 2. Proposed Scheme. Before embedding, a bit sequence is generated by using a one-way hash function with secret key K to hash all the contents without including the structure of the XML document. Next, the generated bit sequence B is re-expressed as a decimal integer with Equation (1), where n is the length of the bit sequence and b j is the jth bit of the bit sequence. B = n b j 2 n j (1) j=1 In the embedding procedure, we look for the synonym terms for each of elements and attributes in the DTD structure and then use the notation to separate any two synonym terms for re-defining the DTD structure as shown in Figure 1. For example, the name element is as someone s signature to let users input the student s full name so the caption of such element can be replaced with full name or signature. Owing to re-define the DTD structure, the XML document is a valid document for senders and receivers while the elements and attributes are replaced with other synonym terms. Figure 1. An example of an XML document Before data embedding, the XML document is scanned in advance for checking the predefined DTD structure, if the element/attribute (E/A) has synonym terms, it is judged as embeddable; otherwise, it is un-embeddable. It is noted that each of the embeddable elements/attributes is treated as a single group. For example, the first element Students does not contain any synonym terms so that it is un-embeddable. When the encoder scans the first attribute id and checks the DTD structure, the attribute id is judged as embeddable because it has another synonym term student id in Table 1. As for the second element student in Figure 1, the element has one child element represented as name, full name or signature in Table 1, therefore, student s child element is judged as embeddable. By this way, after the encoder completely scans the whole XML document, eight elements are picked up. In the end, the encoder generates an embedding sequence depicted as i with a secret key K 1 for later embedding the watermark in such order. All the results are arranged as shown in Table 1, where 1 g(i) w and w is total number of elements. In this example, w is equal to 8. Additionally, g is a function for mapping the ith sequence to the element G g(i). Furthermore, element G g(i) has G g(i) synonym terms,
3 ICIC EXPRESS LETTERS, VOL.4, NO.1, where signifies the number of synonym terms of the element G g(i). Subsequently, we can evaluate the total hiding capacity H with Equation (2). <!DOCTYPE Students [ <!ELEMENT Students (student)+> <!ELEMENT student (name full_name signature)> <!ELEMENT name (first_name given_name, last_name surname family_name)> <!ELEMENT full_name (first_name given_name, last_name surname family_name)> <!ELEMENT signature (first_name given_name, last_name surname family_name)> <!ELEMENT first_name (#PCDATA)> <!ELEMENT last_name (#PCDATA)> <!ELEMENT surname (#PCDATA)> <!ATTLIST student (id student_id) ID#REQUIRED> <!ATTLIST student sex (M F) #REQUIRED> ]> Figure 2. An example of the DTD Figure 3. An example of an embedding XML document H = w G g(i) (2) i=1 To ensure the length of the watermark being able to successfully hide into the XML document, an adjustment mechanism is needed to be used while the value of watermark B is not identical to that of H. The adjustment mechanism is broken into two cases. At first, the H and B are transformed into two bit streams as R 1 and R 2, respectively. In the first case, if the length of R 1 is larger than that of R 2, copy the bits of R 2 to concatenate with the original R 2 sequentially bit by bit until size of R 1 and R 2 are equal. In the other case, while the length of R 2 is larger than that of R 1, R 2 is divided into several segments with the size of R 1 and use the XOR operation to get the final watermark. When the size of the final segment is not equal to the size of R 1, the XOR operation is ignored. For taking an example as shown in Figure 4, the values of H and B are 21 and 157, respectively. The transformed bit streams R 1 and R 2 are and , respectively. The length of R 1 is 5, therefore, R 2 is segmented into two segmentations as and 101. Afterward, those two segments are calculated by using the XOR operation and the blank
4 92 C.-C. CHANG, Y.-H. CHEN AND T.-D. KIEU Table 1. The embeddable list for Figure 6 places are ignored, which can be seen as in Figure 4, to get the final bit stream Finally, the bit stream can be re-expressed as an integer and then the integer is replaced with the original value of B Length of is Segment every bits Watermark Figure 4. An example for the adjustment mechanism Input the group Gg(i) according to the embedding sequence order i. The total number of groups: Temporary parameters: r and tmp For i = 1 to { r= tmp mod G g(i) +1; tmp = tmp / G g(i) ; Replace the caption of the original element or attribute with rth synonym term. } Figure 5. The embedding algorithm
5 ICIC EXPRESS LETTERS, VOL.4, NO.1, After the adjustment mechanism has been performed, the watermark can be embedded into the XML document by using synonym substitution. The embedding algorithm is described in Figure 5. In the verification procedure, the watermark w can be extracted by hashing the whole document except the document structure. Also, with the key K 1, the embeddable list and hiding capacity H can be retrieved as described in the embedding procedure. With the same adjustment mechanism, a new watermark w can be extracted. Additionally, the hidden data h prime is extracted according to the rank of synonym terms displayed in the group G g(i), where the extracted data is depicted as R g(i). Next, the extracted R g(i) can be used to calculate h with Equation (3). Finally, in comparison between h and w, if they are equal, the XML document is authentic; otherwise, it is inauthentic. w 1 h = ( G g(i) (R g(i+1) 1)) + (R g(1) 1). (3) i=1 3. Implementation and Discussions. In this section, a prototype was developed to evaluate the feasibility of the proposed method. For portability, we used Java to implement the prototype. In addition, all of the XML files are processed using Apache s Xalan. The proposed method is suited for the valid XML documents so each of the XML files must comply with its corresponding DTD structure or XML Schema as shown in Figure 2. Assume that the original XML document is shown in Figure 6(a) and the contents needed for protection are , F, Alice, Mandel, , M, Eric, and Jlu. The important contents can be concatenated with each other to generate a watermark as by using hash function with the secret key K. With the watermark embedding algorithm, the watermarked XML document is shown in Figure 6(b). After receiving the watermarked XML document, the document must be verified to identify whether the document structure is matched with the DTD or XML Schema. If the verification fails, the XML document is ignored; otherwise, receivers will collect the contents of the XML document to generate the watermark with the secret key K. Also, the hidden watermark can be extracted by using the extracting algorithm as Due to the generated watermark and the extracted watermark are the same, the XML document is judged as an authentic document. If some contents of the watermarked XML document are manipulated as shown in Figure 6(c), the generated watermark will be different from the extracted watermark so the document is verified as an inauthentic document. If the tags of such document are modified as shown in Figure 6(d), the extracted watermark will be different from the generated watermark. As a whole, either tags or contents of such document are corrupted, the document will be judged as an inauthentic document. 4. Conclusions. To authenticate the integrity of an XML document, XML signature methods require significantly extra space to describe the digital signature. Although Yao et al. proposed the XML-based watermarking technique by altering the case of letters in XML tags, as for a valid XML document, the parser might verify the watermarked document as inauthentic one because XML is a sensitive-case language. In this paper, a watermarking technique is proposed to protect the integrity of XML documents without needing an extra storage to record the protection information. Additionally, the proposed scheme is flexibly adjusted by using the adjustment mechanism if the hiding capacity and the watermark size are not equal.
6 94 C.-C. CHANG, Y.-H. CHEN AND T.-D. KIEU (a) An original XML document (b) A watermarked XML document (c) The corruption of attribute values (d) The corruption of element values Figure 6. An XML watermark example REFERENCES [1] Y. H. Chen, C. C. Chang and C. C. Lin, Adaptive data embedding using VQ and clustering, International Journal of Innovational Computing and Information Control, vol.3, no.6(a), pp , [2] B. Dournaee, XML Security, McGraw-Hill Companies, Inc., [3] D. Eastlake, J. Reagle and D. Solo, XML-signature Syntax and Processing, W3C Recommendation, [4] G. R. Feng, L. Jiang and C. He, Orthogonal transformation to enhance the security of the still image watermarking system, IEICE Transactions on Fundamentals, vol.e87-a, no.4, pp , [5] B. Galbraith, W. Hankison, A. Hiotis, M. Janakiraman, D. V. Prasad, R. Trivedi and Whitney, Professional Web Services Security, Wrox Press Ltd., [6] H. J. Huang, X. M. Sun, G. Sun and J. W. Huang, Detection of steganographic information in tags of webpage, Proc. of the 2nd International Conference on Scalable Information Systems, ACM Press, pp , [7] S. Katzenbeisser and A. P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking, Boston, Artech House, [8] C. C. Lin, Y. H. Chen and C. C. Chang, LSB-based high-capacity data embedding scheme for images, International Journal of Innovational Computing and Information Control, to appear, [9] E. J. L. Lu and R. F. Chen, An XML multisignature scheme, Applied Mathematics and Computation, vol.149, no.1, 2004, pp [10] X. G. Sui and L. Luo, A new steganography method based on hypertext, Proc. of the 2004 Asia- Pacific Radio Science Conference, pp , [11] R. Yao, Q. Zhao and H. Lu, A novel watermark algorithm for integrity protection of XML documents, IJCSNS International Journal of Computer Science and Network Security, vol.6, no.2b, pp , [12] Q. Zhao and H. Lu, A PCA-based watermarking scheme for tamper-proof of web pages, Pattern Recognition, vol.38, no.8, pp , 2005.
Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques
Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Meaningful Shadows for Image Secret Sharing with Steganography
More informationA Revisit to LSB Substitution Based Data Hiding for Embedding More Information
A Revisit to LSB Substitution Based Data Hiding for Embedding More Information Yanjun Liu 1,, Chin-Chen Chang 1, and Tzu-Yi Chien 2 1 Department of Information Engineering and Computer Science, Feng Chia
More informationData Hiding on Text Using Big-5 Code
Data Hiding on Text Using Big-5 Code Jun-Chou Chuang 1 and Yu-Chen Hu 2 1 Department of Computer Science and Communication Engineering Providence University 200 Chung-Chi Rd., Shalu, Taichung 43301, Republic
More informationA Flexible Scheme of Self Recovery for Digital Image Protection
www.ijcsi.org 460 A Flexible Scheme of Self Recoery for Digital Image Protection Zhenxing Qian, Lili Zhao 2 School of Communication and Information Engineering, Shanghai Uniersity, Shanghai 200072, China
More informationImage Tamper Detection and Recovery Based on Dual Watermarks Sharing Strategy
Image Tamper Detection and Recovery Based on Dual Watermars Sharing Strategy Yi-Hui Chen, Chin-Chen Chang Department of Applied Informatics and Multimedia Asia University, Taichung, Taiwan 35, R.O.C. Department
More informationarxiv: v1 [cs.cr] 31 Dec 2018
Security analysis of a self-embedding fragile image watermark scheme Xinhui Gong, Feng Yu, Xiaohong Zhao, Shihong Wang School of Science, Beijing University of Posts and Telecommunications, Beijing 100876,
More informationIntroduction to XML. Chapter 133
Chapter 133 Introduction to XML A. Multiple choice questions: 1. Attributes in XML should be enclosed within. a. single quotes b. double quotes c. both a and b d. none of these c. both a and b 2. Which
More informationCovert Communication with Authentication via Software Programs Using Invisible ASCII Codes --- A New Approach
Covert Communication with Authentication via Software Programs Using Invisible ASCII Codes --- A New Approach I-Shi Lee Dept. of Computer Science, National Chiao Tung University, Hsinchu, Taiwan 30010
More informationDigital Image Steganography Using Bit Flipping
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 1 Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2018-0006 Digital Image Steganography Using
More informationDATA HIDING IN PDF FILES AND APPLICATIONS BY IMPERCEIVABLE MODIFICATIONS OF PDF OBJECT PARAMETERS
DATA HIDING IN PDF FILES AND APPLICATIONS BY IMPERCEIVABLE MODIFICATIONS OF PDF OBJECT PARAMETERS 1 Jiun-Tsung Wang ( 王竣聰 ) and 2 Wen-Hsiang Tsai ( 蔡文祥 ) 1 Institute of Multimedia Eng., National Chiao
More informationResearch Issues and Challenges for Multiple Digital Signatures
INTERNATION JOURNAL OF NETWORK SECURITY, VOL.1, NO.1,PP. 1-6, 2005 1 Research Issues and Challenges for Multiple Digital Signatures Min-Shiang Hwang, and Cheng-Chi Lee, Abstract In this paper, we survey
More informationRandom Traversing Based Reversible Data Hiding Technique Using PE and LSB
Random Traversing Based Reversible Data Hiding Technique Using PE and LSB Rhythm Katira #1, Prof. V. Thanikaiselvan *2 # ECE Department, VIT University Vellore, Tamil-Nadu, India 1 rhythm.katira2009@vit.ac.in
More informationA BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu
International Journal of Innovative Computing, Information and Control ICIC International c 2016 ISSN 1349-4198 Volume 12, Number 2, April 2016 pp. 395 405 A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD
More informationIntroduction to XML. An Example XML Document. The following is a very simple XML document.
Introduction to XML Extensible Markup Language (XML) was standardized in 1998 after 2 years of work. However, it developed out of SGML (Standard Generalized Markup Language), a product of the 1970s and
More informationAuthenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem
Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem Li-Chin Huang and Min-Shiang Hwang 1 Department of Computer Science and Engineering,
More informationA Survey of Fragile Watermarking-based Image Authentication Techniques
Journal of Information Hiding and Multimedia Signal Processing c 2016 ISSN 2073-4212 Ubiquitous International Volume 7, Number 6, November 2016 A Survey of Fragile Watermarking-based Image Authentication
More informationA CAVLC-BASED VIDEO WATERMARKING SCHEME FOR H.264/AVC CODEC. Received May 2010; revised October 2010
International Journal of Innovative Computing, Information and Control ICIC International c 2011 ISSN 1349-4198 Volume 7, Number 11, November 2011 pp. 6359 6367 A CAVLC-BASED VIDEO WATERMARKING SCHEME
More informationThe concept of DTD. DTD(Document Type Definition) Why we need DTD
Contents Topics The concept of DTD Why we need DTD The basic grammar of DTD The practice which apply DTD in XML document How to write DTD for valid XML document The concept of DTD DTD(Document Type Definition)
More informationResearch Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography
Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2009, Article ID 187874, 11 pages doi:10.1155/2009/187874 Research Article Improvements in Geometry-Based Secret Image Sharing
More informationCOMPARATIVE STUDY OF HISTOGRAM SHIFTING ALGORITHMS FOR DIGITAL WATERMARKING
International Journal of Computer Engineering and Applications, Volume X, Issue VII, July 16 www.ijcea.com ISSN 2321-3469 COMPARATIVE STUDY OF HISTOGRAM SHIFTING ALGORITHMS FOR DIGITAL WATERMARKING Geeta
More informationDigital image steganography using LSB substitution, PVD, and EMD
Digital image steganography using LSB substitution, PVD, and EMD Anita Pradhan, K. Raja Sekhar, Gandharba Swain* Department of Computer Science and Engineering, K L University, Vaddeswaram-522502, Andhra
More informationHighly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 8 August, 2014 Page No. 7932-7937 Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting
More informationAbstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction
A Report on Genetic Algorithm based Steganography for Image Authentication by Amrita Khamrui Enrolled Scholar Department of Computer Science & Engineering, Kalyani University Prof. (Dr.) J K Mandal Professor
More informationAssignment 9 / Cryptography
Assignment 9 / Cryptography Michael Hauser March 2002 Tutor: Mr. Schmidt Course: M.Sc Distributed Systems Engineering Lecturer: Mr. Owens CONTENTS Contents 1 Introduction 3 2 Simple Ciphers 3 2.1 Vignère
More informationA Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques
Bashar S. Mahdi Alia K. Abdul Hassan Department of Computer Science, University of Technology, Baghdad, Iraq A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and
More informationImage Authentication and Recovery Scheme Based on Watermarking Technique
Image Authentication and Recovery Scheme Based on Watermarking Technique KENJI SUMITOMO 1, MARIKO NAKANO 2, HECTOR PEREZ 2 1 Faculty of Information and Computer Engineering The University of Electro-Communications
More informationAn UML-XML-RDB Model Mapping Solution for Facilitating Information Standardization and Sharing in Construction Industry
An UML-XML-RDB Model Mapping Solution for Facilitating Information Standardization and Sharing in Construction Industry I-Chen Wu 1 and Shang-Hsien Hsieh 2 Department of Civil Engineering, National Taiwan
More informationSecret Communication through Audio for Defense Application
Secret Communication through Audio for Defense Application A.Nageshwar Rao Maduguri Sudhir R.Venkatesh Abstract: A steganographic method of embedding textual information in an audio file is presented in
More informationA reversible data hiding based on adaptive prediction technique and histogram shifting
A reversible data hiding based on adaptive prediction technique and histogram shifting Rui Liu, Rongrong Ni, Yao Zhao Institute of Information Science Beijing Jiaotong University E-mail: rrni@bjtu.edu.cn
More informationOverview. Introduction. Introduction XML XML. Lecture 16 Introduction to XML. Boriana Koleva Room: C54
Overview Lecture 16 Introduction to XML Boriana Koleva Room: C54 Email: bnk@cs.nott.ac.uk Introduction The Syntax of XML XML Document Structure Document Type Definitions Introduction Introduction SGML
More informationHigh Capacity Data Hiding Scheme for DCT-based Images
Journal of Information Hiding and Multimedia Signal Processing c 010 ISSN 073-41 Ubiquitous International Volume 1, Number 3, July 010 High Capacity Data Hiding Scheme for DCT-based Images Chia-Chen Lin
More informationA Reversible Data Hiding Scheme for BTC- Compressed Images
IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives
More informationImage Steganography Method Using Integer Wavelet Transform
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
More informationVARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS
VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS Anita Pradhan Department of CSE, Sri Sivani College of Engineering, Srikakulam, Andhra Pradesh, India anita.pradhan15@gmail.com
More informationA Formula Diamond Encoding Data Hiding Scheme
Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 6, November 2015 A Formula Diamond Encoding Data Hiding Scheme Wen-Chung Kuo
More informationImplementation of Security in Cloud Systems Based using Encryption and Steganography
Implementation of Security in Cloud Systems Based using Encryption and Steganography 1 A.Mahesh Babu, 2 G.A. Ramachandra, 3 M.Suresh Babu 1,2 Department of Computer Science & Technology, Sri Krishnadevaraya
More informationEnhanced Delegation Based Authentication Protocol for Secure Roaming Service with Synchronization
JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 9, NO. 4, DECEMBER 2011 345 Enhanced Delegation Based Authentication Protocol for Secure Roaming Service with Synchronization Hsing-Bai Chen, Yung-Hsiang
More informationSECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES
VOL., NO. 7, APRIL 5 ISSN 89-668 6-5 Asian Research Publishing Network (ARPN). All rights reserved. SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES R. Selveeswari and P. R. Vijayalakshmi
More informationXML Introduction 1. XML Stands for EXtensible Mark-up Language (XML). 2. SGML Electronic Publishing challenges -1986 3. HTML Web Presentation challenges -1991 4. XML Data Representation challenges -1996
More informationAn Information Hiding Scheme Based on Pixel- Value-Ordering and Prediction-Error Expansion with Reversibility
An Information Hiding Scheme Based on Pixel- Value-Ordering Prediction-Error Expansion with Reversibility Ching-Chiuan Lin Department of Information Management Overseas Chinese University Taichung, Taiwan
More informationQuality Measurements of Lossy Image Steganography Based on H-AMBTC Technique Using Hadamard Transform Domain
Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique Using Hadamard Transform Domain YAHYA E. A. AL-SALHI a, SONGFENG LU *b a. Research Scholar, School of computer science, Huazhong
More informationEnhanced Least Significant Bit Scheme Robust Against Chi-Squared Attack
2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation Enhanced Least Significant Bit Scheme Robust Against Chi-Squared Attack Masoud Afrakhteh Dept. of
More informationMessage Authentication and Hash function 2
Message Authentication and Hash function 2 Concept and Example 1 SHA : Secure Hash Algorithm Four secure hash algorithms, SHA-11, SHA-256, SHA-384, and SHA-512. All four of the algorithms are iterative,
More informationAdaptive Steganography Method Based on Two Tiers Pixel Value Differencing
Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing Chi-Yao Weng 1, Yen-Chia Huang 1, Chin-Feng Lee 2(&), and Dong-Peng Lin 2 1 Department of Computer Science, National Pingtung University,
More informationConcealing Information in Images using Progressive Recovery
Concealing Information in Images using Progressive Recovery Pooja R 1, Neha S Prasad 2, Nithya S Jois 3, Sahithya KS 4, Bhagyashri R H 5 1,2,3,4 UG Student, Department Of Computer Science and Engineering,
More informationWatermarking Moble Phone Color Images With Error Correction Codes
IOSR Journal of Electronics & Communication Engineering (IOSR-JECE) ISSN(e) : 2278-1684 ISSN(p) : 2320-334X, PP 05-09 www.iosrjournals.org Watermarking Moble Phone Color Images With Error Correction Codes
More informationA Forward-Secure Signature with Backward-Secure Detection
A Forward-Secure Signature with Backward-Secure Detection Dai-Rui Lin and Chih-I Wang Department of Computer Science and Engineering National Sun Yat-sen University, Kaohsiung 804, Taiwan June 17, 2007
More informationA New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique
A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique 1 Arathi Chitla, 2 Dr. M. Chandra Mohan 1 Associate Professor, Department of Computer Science &
More informationReversible Data Hiding Based on Median Difference Histogram
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 27, 577-593 (2011) Reversible Data Hiding Based on Median Difference Histogram HSIEN-WEI YANG 1,2, I-EN LIAO * AND CHAUR-CHIN CHEN + 1 Department of Information
More informationx ide xml Integrated Development Environment Specifications Document 1 Project Description 2 Specifi fications
x ide xml Integrated Development Environment Specifications Document Colin Hartnett (cphartne) 7 February 2003 1 Project Description There exist many integrated development environments that make large
More informationAN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS
AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan
More informationA DTD-Syntax-Tree Based XML file Modularization Browsing Technique
IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.2A, February 2006 127 A DTD-Syntax-Tree Based XML file Modularization Browsing Technique Zhu Zhengyu 1, Changzhi Li, Yuan
More informationHybrid Stegnography using ImagesVaried PVD+ LSB Detection Program
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12086-12090 Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program Shruti
More informationCryptanalysis of Blind Signature Schemes
IJCSNS International Journal of Computer Science and Network Security, VOL.14 No.5, May 2014 73 Cryptanalysis of Blind Signature Schemes Nitu Singh M.Tech Scholar Dept. of Cmputer Science & Engineering
More informationA Grayscale Image Steganography Based upon Discrete Cosine Transformation
A Grayscale Image Steganography Based upon Discrete Cosine Transformation Chin-Chen Chang 1, Pei-Yu Lin, and Jun-Chou Chuang 3 1 Department of Information Engineering and Computer Science, Feng Chia University,
More informationUser-Friendly Sharing System using Polynomials with Different Primes in Two Images
User-Friendly Sharing System using Polynomials with Different Primes in Two Images Hung P. Vo Department of Engineering and Technology, Tra Vinh University, No. 16 National Road 53, Tra Vinh City, Tra
More informationIntroducing live graphics gems to educational material
Introducing live graphics gems to educational material Johannes Görke, Frank Hanisch, Wolfgang Straíer WSI/GRIS University of Tübingen, Sand 14, 72076 Tübingen, Germany Thiruvarangan Ramaraj CS525 Graphics
More informationAN IMPROVED METHOD FOR HIDING DATA IN A MAZE
AN IMPROVED METHOD FOR HIDING DATA IN A MAZE HUI-LUNG LEE, CHIA-FENG LEE, LING-HWEI CHEN Department of Computer Science, National Chiao Tung University Hsinchu, Taiwan, R.O.C. E-MAIL: huilung@debut.cis.nctu.edu.tw,
More informationLSB Based Audio Steganography Using Pattern Matching
ISSN: 359-0040 Vol 2 Issue, November - 205 LSB Based Audio Steganography Using Pattern Matching Mr Ratul Choudhury Student, Dept of Computer Sc & Engg Dept University of Calcutta Kolkata, India ratulchowdhury@iemcalcom
More informationMoment-preserving Based Watermarking for Color Image Authentication and Recovery
2012 IACSIT Hong Kong Conferences IPCSIT vol. 30 (2012) (2012) IACSIT Press, Singapore Moment-preserving Based Watermarking for Color Image Authentication and Recovery Kuo-Cheng Liu + Information Educating
More informationHTML Steganography using Relative links & Multi web-page Embedment
HTML Steganography using Relative links & Multi web-page Embedment 1 Chintan Dhanani, 2 Krunal Panchal 1 Mtech Scholar, 2 Lecturer Department of computer engineering, Gujarat Technological University,
More informationAuthentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
, 2009, 5, 363-370 doi:10.4236/ijcns.2009.25040 Published Online August 2009 (http://www.scirp.org/journal/ijcns/). Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
More informationImproved Qualitative Color Image Steganography Based on DWT
Improved Qualitative Color Image Steganography Based on DWT 1 Naresh Goud M, II Arjun Nelikanti I, II M. Tech student I, II Dept. of CSE, I, II Vardhaman College of Eng. Hyderabad, India Muni Sekhar V
More informationDOI: /jos Tel/Fax: by Journal of Software. All rights reserved. , )
ISSN 1000-9825, CODEN RUXUEW E-mail: jos@iscasaccn Journal of Software, Vol17, No2, February 2006, pp315 324 http://wwwjosorgcn DOI: 101360/jos170315 Tel/Fax: +86-10-62562563 2006 by Journal of Software
More informationAdaptive Pixel Pair Matching Technique for Data Embedding
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationA compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems.
A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. G Swetha M.Tech Student Dr.N.Chandra Sekhar Reddy Professor & HoD U V N Rajesh Assistant Professor Abstract Cryptography
More informationEfficient & Secure Data Hiding Using Secret Reference Matrix
Efficient & Secure Data Hiding Using Secret Reference Matrix Laxman Tawade 1, Rajshree Mahajan 2, Chandan Kulthe 3 1 Department of Electronic and Telecommunication Engineering, Pune University, India 2,3
More informationData Hiding in Binary Text Documents 1. Q. Mei, E. K. Wong, and N. Memon
Data Hiding in Binary Text Documents 1 Q. Mei, E. K. Wong, and N. Memon Department of Computer and Information Science Polytechnic University 5 Metrotech Center, Brooklyn, NY 11201 ABSTRACT With the proliferation
More informationWorld-Wide Wide Web. Netprog HTTP
Web Services Based partially on Sun Java Tutorial at http://java.sun.com/webservices/ Also, XML, Java and the Future of The Web, Jon Bosak. And WSDL Tutorial at: http://www.w3schools.com/wsdl wsdl/ 1 World-Wide
More informationCOMP9321 Web Application Engineering
COMP9321 Web Application Engineering Semester 2, 2015 Dr. Amin Beheshti Service Oriented Computing Group, CSE, UNSW Australia Week 4 http://webapps.cse.unsw.edu.au/webcms2/course/index.php?cid=2411 1 Extensible
More informationBlind Signature Scheme Based on Elliptic Curve Cryptography
Blind Signature Scheme Based on Elliptic Curve Cryptography Chwei-Shyong Tsai Min-Shiang Hwang Pei-Chen Sung Department of Management Information System, National Chung Hsing University 250 Kuo Kuang Road.,
More informationIntroduction Syntax and Usage XML Databases Java Tutorial XML. November 5, 2008 XML
Introduction Syntax and Usage Databases Java Tutorial November 5, 2008 Introduction Syntax and Usage Databases Java Tutorial Outline 1 Introduction 2 Syntax and Usage Syntax Well Formed and Valid Displaying
More informationHigh Capacity Reversible Watermarking Scheme for 2D Vector Maps
Scheme for 2D Vector Maps 1 Information Management Department, China National Petroleum Corporation, Beijing, 100007, China E-mail: jxw@petrochina.com.cn Mei Feng Research Institute of Petroleum Exploration
More informationM359 Block5 - Lecture12 Eng/ Waleed Omar
Documents and markup languages The term XML stands for extensible Markup Language. Used to label the different parts of documents. Labeling helps in: Displaying the documents in a formatted way Querying
More informationRestricted Nearest Feature Line with Ellipse for Face Recognition
Journal of Information Hiding and Multimedia Signal Processing c 2012 ISSN 2073-4212 Ubiquitous International Volume 3, Number 3, July 2012 Restricted Nearest Feature Line with Ellipse for Face Recognition
More informationSource Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network
Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network 1 Ms.Anisha Viswan, 2 Ms.T.Poongodi, 3 Ms.Ranjima P, 4 Ms.Minimol Mathew 1,3,4 PG Scholar, 2 Assistant Professor,
More informationA New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam
More informationReview On Secrete Sharing Scheme for Color Image Steganography
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 5 (2014), pp. 485-490 International Research Publications House http://www. irphouse.com /ijict.htm Review
More informationA New Approach to Compressed Image Steganography Using Wavelet Transform
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. III (Sep. Oct. 2015), PP 53-59 www.iosrjournals.org A New Approach to Compressed Image Steganography
More informationWatermark-Based Authentication and Key Exchange in Teleconferencing Systems
Watermark-Based Authentication and Key Exchange in Teleconferencing Systems Ulrich Rührmair a, Stefan Katzenbeisser b, Martin Steinebach c, and Sascha Zmudzinski c a Technische Universität München, Department
More informationBit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationDigital Image Steganography Techniques: Case Study. Karnataka, India.
ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College
More information.. Cal Poly CPE/CSC 366: Database Modeling, Design and Implementation Alexander Dekhtyar..
.. Cal Poly CPE/CSC 366: Database Modeling, Design and Implementation Alexander Dekhtyar.. XML in a Nutshell XML, extended Markup Language is a collection of rules for universal markup of data. Brief History
More informationXML. XML Syntax. An example of XML:
XML Extensible Markup Language (XML) is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable. Defined in the XML 1.0 Specification
More informationThe new Hybrid approach to protect MPEG-2 video header
The new Hybrid approach to protect MPEG-2 video header *YUK YING CHUNG, *XIANG ZHANG, *XIAOMING CHEN, *MOHD AFIZI MOHD SHUKRAN, **CHANGSEOK BAE *School of Information Technologies, University of Sydney,
More informationAvailable online at ScienceDirect. The 4th International Conference on Electrical Engineering and Informatics (ICEEI 2013)
Available online at www.sciencedirect.com ScienceDirect Procedia Technology 11 ( 2013 ) 614 620 The 4th International Conference on Electrical Engineering and Informatics (ICEEI 2013) Reversible Fragile
More informationA Novel Fragile Watermark-Based Image Authentication Scheme for AMBTC-Compressed Images
Journal of Information Hiding and Multimedia Signal Processing c 2016 ISSN 2073-4212 Ubiquitous International Volume 7, Number 2, March 2016 A Novel Fragile Watermark-Based Image Authentication Scheme
More informationOpen Access The Three-dimensional Coding Based on the Cone for XML Under Weaving Multi-documents
Send Orders for Reprints to reprints@benthamscience.ae 676 The Open Automation and Control Systems Journal, 2014, 6, 676-683 Open Access The Three-dimensional Coding Based on the Cone for XML Under Weaving
More informationOverview. Structured Data. The Structure of Data. Semi-Structured Data Introduction to XML Querying XML Documents. CMPUT 391: XML and Querying XML
Database Management Systems Winter 2004 CMPUT 391: XML and Querying XML Lecture 12 Overview Semi-Structured Data Introduction to XML Querying XML Documents Dr. Osmar R. Zaïane University of Alberta Chapter
More informationRDGL Reference Manual
RDGL Reference Manual COMS W4115 Programming Languages and Translators Professor Stephen A. Edwards Summer 2007(CVN) Navid Azimi (na2258) nazimi@microsoft.com Contents Introduction... 3 Purpose... 3 Goals...
More informationUsing Wavelets to Embed Images in Images
University of Tennessee, Knoxville Trace: Tennessee Research and Creative Exchange University of Tennessee Honors Thesis Projects University of Tennessee Honors Program 3-2004 Using Wavelets to Embed Images
More informationAgenda. Summary of Previous Session. XML for Java Developers G Session 6 - Main Theme XML Information Processing (Part II)
XML for Java Developers G22.3033-002 Session 6 - Main Theme XML Information Processing (Part II) Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical
More informationSTEGANOGRAPHY: THE ART OF COVERT COMMUNICATION
Journal homepage: www.mjret.in STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION Sudhanshi Sharma 1, Umesh Kumar 2 Computer Engineering, Govt. Mahila Engineering College, Ajmer, India 1 sudhanshisharma91@gmail.com,
More informationA NEW WATERMARKING TECHNIQUE FOR SECURE DATABASE
Online Journal, www.ijcea.com A NEW WATERMARKING TECHNIQUE FOR SECURE DATABASE Jun Ziang Pinn 1 and A. Fr. Zung 2 1,2 P. S. University for Technology, Harbin 150001, P. R. China ABSTRACT Digital multimedia
More informationXML. extensible Markup Language. Overview. Overview. Overview XML Components Document Type Definition (DTD) Attributes and Tags An XML schema
XML extensible Markup Language An introduction in XML and parsing XML Overview XML Components Document Type Definition (DTD) Attributes and Tags An XML schema 3011 Compiler Construction 2 Overview Overview
More informationPHP and MySQL for Dynamic Web Sites. Intro Ed Crowley
PHP and MySQL for Dynamic Web Sites Intro Ed Crowley Class Preparation If you haven t already, download the sample scripts from: http://www.larryullman.com/books/phpand-mysql-for-dynamic-web-sitesvisual-quickpro-guide-4thedition/#downloads
More informationA tutorial report for SENG Agent Based Software Engineering. Course Instructor: Dr. Behrouz H. Far. XML Tutorial.
A tutorial report for SENG 609.22 Agent Based Software Engineering Course Instructor: Dr. Behrouz H. Far XML Tutorial Yanan Zhang Department of Electrical and Computer Engineering University of Calgary
More informationA new approach to the secret image sharing with steganography and authentication
1 A new approach to the secret image sharing with steganography and authentication C-C Wu a, M-S Hwang* b and S-J Kao a a Department of Computer Science and Engineering, National Chung Hsing University,
More informationBit-Plane Decomposition Steganography Using Wavelet Compressed Video
Bit-Plane Decomposition Steganography Using Wavelet Compressed Video Tomonori Furuta, Hideki Noda, Michiharu Niimi, Eiji Kawaguchi Kyushu Institute of Technology, Dept. of Electrical, Electronic and Computer
More information