A WATERMARKING TECHNIQUE USING SYNONYM SUBSTITUTION FOR INTEGRITY PROTECTION OF XML DOCUMENTS

Size: px
Start display at page:

Download "A WATERMARKING TECHNIQUE USING SYNONYM SUBSTITUTION FOR INTEGRITY PROTECTION OF XML DOCUMENTS"

Transcription

1 ICIC Express Letters ICIC International c 2010 ISSN X Volume 4, Number 1, February 2010 pp A WATERMARKING TECHNIQUE USING SYNONYM SUBSTITUTION FOR INTEGRITY PROTECTION OF XML DOCUMENTS Chin-Chen Chang 1, Yi-Hui Chen 2 and The Duc Kieu 3 1 Department of Information Engineering and Computer Science Feng Chia University Taichung , Taiwan ccc@cs.ccu.edu.tw 2 Research Center for Information Technology Innovation Academia Sinica Taipei 115, Taiwan chenyh@cs.ccu.edu.tw 3 School of Computer Science and Engineering International University Ho Chi Minh city, Vietnam ktduc@hcmiu.edu.vn Received May 2009; accepted August 2009 Abstract. Extensible Markup Language (XML) as the standard representation language is widely used for information exchange. Up to now, how to protect the integrity of XML documents becomes an important issue. XML signature is one of the methods for integrity protection. However, it needs significantly extra spaces for recording the protection information. In this paper, we propose a novel watermarking scheme which uses synonym substitution for embedding the watermarks. Without needing large extra spaces, the XML document can verify the integrity by itself. Keywords: XML, XML signature, Watermark, Integrity protection, Synonym substitution 1. Introduction. XML signature [2, 3, 9] and XML watermarking [11] are techniques to protect the integrity of XML documents. As for XML signature, it requires extra storage for recording the signature information. Another issue concerned for protecting the copyright and integrity is a watermarking technique, which is a data embedding scheme [1, 4, 6, 7, 10, 10, 11, 12] to treat the protection information as watermarks and embeds the watermarks into digital media without attaching any extra data. Later, the watermarks can be extracted to verify the copyright and integrity of the media. Up to now, a few schemes [6, 10, 12] were proposed for text documents because few spaces of them can be used to embed the protected information. Katzenbeisser et al. [7] proposed a watermarking scheme for HTML documents with STC (Switching-tree coding) technique, but extra spaces and tags are needed for embedding watermarks. Furthermore, the file size is significantly expanded because it must record the STC codes after data embedding. In 2003, Sui and Luo [9] modified the case of letters in HTML tags for embedding the secrets as steganography scheme. Zhao and Lu [12] adopted the same concept to design a watermarking scheme applied to tamperproof of HTML documents. In 2006, Yao et al. [11] extended Zhao and Lu s scheme to design a watermarking scheme for protecting the integrity of XML documents. Later on, Huang et al. [6] proposed a steganalytic method, called Tag-Mismatch analysis, to successfully detect the hidden information embedded by using Sui and Luo s scheme. 89

2 90 C.-C. CHANG, Y.-H. CHEN AND T.-D. KIEU In this paper, we propose a watermark technique for protecting the integrity of XML documents by using synonym substitution. It has advantage of no extra storages needed in the proposed scheme so that the size of transmitted data can be significantly reduced than that is done in XML signature. Additionally, the proposed scheme is a self-authentication scheme because the watermark is generated by the XML document itself. 2. Proposed Scheme. Before embedding, a bit sequence is generated by using a one-way hash function with secret key K to hash all the contents without including the structure of the XML document. Next, the generated bit sequence B is re-expressed as a decimal integer with Equation (1), where n is the length of the bit sequence and b j is the jth bit of the bit sequence. B = n b j 2 n j (1) j=1 In the embedding procedure, we look for the synonym terms for each of elements and attributes in the DTD structure and then use the notation to separate any two synonym terms for re-defining the DTD structure as shown in Figure 1. For example, the name element is as someone s signature to let users input the student s full name so the caption of such element can be replaced with full name or signature. Owing to re-define the DTD structure, the XML document is a valid document for senders and receivers while the elements and attributes are replaced with other synonym terms. Figure 1. An example of an XML document Before data embedding, the XML document is scanned in advance for checking the predefined DTD structure, if the element/attribute (E/A) has synonym terms, it is judged as embeddable; otherwise, it is un-embeddable. It is noted that each of the embeddable elements/attributes is treated as a single group. For example, the first element Students does not contain any synonym terms so that it is un-embeddable. When the encoder scans the first attribute id and checks the DTD structure, the attribute id is judged as embeddable because it has another synonym term student id in Table 1. As for the second element student in Figure 1, the element has one child element represented as name, full name or signature in Table 1, therefore, student s child element is judged as embeddable. By this way, after the encoder completely scans the whole XML document, eight elements are picked up. In the end, the encoder generates an embedding sequence depicted as i with a secret key K 1 for later embedding the watermark in such order. All the results are arranged as shown in Table 1, where 1 g(i) w and w is total number of elements. In this example, w is equal to 8. Additionally, g is a function for mapping the ith sequence to the element G g(i). Furthermore, element G g(i) has G g(i) synonym terms,

3 ICIC EXPRESS LETTERS, VOL.4, NO.1, where signifies the number of synonym terms of the element G g(i). Subsequently, we can evaluate the total hiding capacity H with Equation (2). <!DOCTYPE Students [ <!ELEMENT Students (student)+> <!ELEMENT student (name full_name signature)> <!ELEMENT name (first_name given_name, last_name surname family_name)> <!ELEMENT full_name (first_name given_name, last_name surname family_name)> <!ELEMENT signature (first_name given_name, last_name surname family_name)> <!ELEMENT first_name (#PCDATA)> <!ELEMENT last_name (#PCDATA)> <!ELEMENT surname (#PCDATA)> <!ATTLIST student (id student_id) ID#REQUIRED> <!ATTLIST student sex (M F) #REQUIRED> ]> Figure 2. An example of the DTD Figure 3. An example of an embedding XML document H = w G g(i) (2) i=1 To ensure the length of the watermark being able to successfully hide into the XML document, an adjustment mechanism is needed to be used while the value of watermark B is not identical to that of H. The adjustment mechanism is broken into two cases. At first, the H and B are transformed into two bit streams as R 1 and R 2, respectively. In the first case, if the length of R 1 is larger than that of R 2, copy the bits of R 2 to concatenate with the original R 2 sequentially bit by bit until size of R 1 and R 2 are equal. In the other case, while the length of R 2 is larger than that of R 1, R 2 is divided into several segments with the size of R 1 and use the XOR operation to get the final watermark. When the size of the final segment is not equal to the size of R 1, the XOR operation is ignored. For taking an example as shown in Figure 4, the values of H and B are 21 and 157, respectively. The transformed bit streams R 1 and R 2 are and , respectively. The length of R 1 is 5, therefore, R 2 is segmented into two segmentations as and 101. Afterward, those two segments are calculated by using the XOR operation and the blank

4 92 C.-C. CHANG, Y.-H. CHEN AND T.-D. KIEU Table 1. The embeddable list for Figure 6 places are ignored, which can be seen as in Figure 4, to get the final bit stream Finally, the bit stream can be re-expressed as an integer and then the integer is replaced with the original value of B Length of is Segment every bits Watermark Figure 4. An example for the adjustment mechanism Input the group Gg(i) according to the embedding sequence order i. The total number of groups: Temporary parameters: r and tmp For i = 1 to { r= tmp mod G g(i) +1; tmp = tmp / G g(i) ; Replace the caption of the original element or attribute with rth synonym term. } Figure 5. The embedding algorithm

5 ICIC EXPRESS LETTERS, VOL.4, NO.1, After the adjustment mechanism has been performed, the watermark can be embedded into the XML document by using synonym substitution. The embedding algorithm is described in Figure 5. In the verification procedure, the watermark w can be extracted by hashing the whole document except the document structure. Also, with the key K 1, the embeddable list and hiding capacity H can be retrieved as described in the embedding procedure. With the same adjustment mechanism, a new watermark w can be extracted. Additionally, the hidden data h prime is extracted according to the rank of synonym terms displayed in the group G g(i), where the extracted data is depicted as R g(i). Next, the extracted R g(i) can be used to calculate h with Equation (3). Finally, in comparison between h and w, if they are equal, the XML document is authentic; otherwise, it is inauthentic. w 1 h = ( G g(i) (R g(i+1) 1)) + (R g(1) 1). (3) i=1 3. Implementation and Discussions. In this section, a prototype was developed to evaluate the feasibility of the proposed method. For portability, we used Java to implement the prototype. In addition, all of the XML files are processed using Apache s Xalan. The proposed method is suited for the valid XML documents so each of the XML files must comply with its corresponding DTD structure or XML Schema as shown in Figure 2. Assume that the original XML document is shown in Figure 6(a) and the contents needed for protection are , F, Alice, Mandel, , M, Eric, and Jlu. The important contents can be concatenated with each other to generate a watermark as by using hash function with the secret key K. With the watermark embedding algorithm, the watermarked XML document is shown in Figure 6(b). After receiving the watermarked XML document, the document must be verified to identify whether the document structure is matched with the DTD or XML Schema. If the verification fails, the XML document is ignored; otherwise, receivers will collect the contents of the XML document to generate the watermark with the secret key K. Also, the hidden watermark can be extracted by using the extracting algorithm as Due to the generated watermark and the extracted watermark are the same, the XML document is judged as an authentic document. If some contents of the watermarked XML document are manipulated as shown in Figure 6(c), the generated watermark will be different from the extracted watermark so the document is verified as an inauthentic document. If the tags of such document are modified as shown in Figure 6(d), the extracted watermark will be different from the generated watermark. As a whole, either tags or contents of such document are corrupted, the document will be judged as an inauthentic document. 4. Conclusions. To authenticate the integrity of an XML document, XML signature methods require significantly extra space to describe the digital signature. Although Yao et al. proposed the XML-based watermarking technique by altering the case of letters in XML tags, as for a valid XML document, the parser might verify the watermarked document as inauthentic one because XML is a sensitive-case language. In this paper, a watermarking technique is proposed to protect the integrity of XML documents without needing an extra storage to record the protection information. Additionally, the proposed scheme is flexibly adjusted by using the adjustment mechanism if the hiding capacity and the watermark size are not equal.

6 94 C.-C. CHANG, Y.-H. CHEN AND T.-D. KIEU (a) An original XML document (b) A watermarked XML document (c) The corruption of attribute values (d) The corruption of element values Figure 6. An XML watermark example REFERENCES [1] Y. H. Chen, C. C. Chang and C. C. Lin, Adaptive data embedding using VQ and clustering, International Journal of Innovational Computing and Information Control, vol.3, no.6(a), pp , [2] B. Dournaee, XML Security, McGraw-Hill Companies, Inc., [3] D. Eastlake, J. Reagle and D. Solo, XML-signature Syntax and Processing, W3C Recommendation, [4] G. R. Feng, L. Jiang and C. He, Orthogonal transformation to enhance the security of the still image watermarking system, IEICE Transactions on Fundamentals, vol.e87-a, no.4, pp , [5] B. Galbraith, W. Hankison, A. Hiotis, M. Janakiraman, D. V. Prasad, R. Trivedi and Whitney, Professional Web Services Security, Wrox Press Ltd., [6] H. J. Huang, X. M. Sun, G. Sun and J. W. Huang, Detection of steganographic information in tags of webpage, Proc. of the 2nd International Conference on Scalable Information Systems, ACM Press, pp , [7] S. Katzenbeisser and A. P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking, Boston, Artech House, [8] C. C. Lin, Y. H. Chen and C. C. Chang, LSB-based high-capacity data embedding scheme for images, International Journal of Innovational Computing and Information Control, to appear, [9] E. J. L. Lu and R. F. Chen, An XML multisignature scheme, Applied Mathematics and Computation, vol.149, no.1, 2004, pp [10] X. G. Sui and L. Luo, A new steganography method based on hypertext, Proc. of the 2004 Asia- Pacific Radio Science Conference, pp , [11] R. Yao, Q. Zhao and H. Lu, A novel watermark algorithm for integrity protection of XML documents, IJCSNS International Journal of Computer Science and Network Security, vol.6, no.2b, pp , [12] Q. Zhao and H. Lu, A PCA-based watermarking scheme for tamper-proof of web pages, Pattern Recognition, vol.38, no.8, pp , 2005.

Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques

Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Meaningful Shadows for Image Secret Sharing with Steganography

More information

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information A Revisit to LSB Substitution Based Data Hiding for Embedding More Information Yanjun Liu 1,, Chin-Chen Chang 1, and Tzu-Yi Chien 2 1 Department of Information Engineering and Computer Science, Feng Chia

More information

Data Hiding on Text Using Big-5 Code

Data Hiding on Text Using Big-5 Code Data Hiding on Text Using Big-5 Code Jun-Chou Chuang 1 and Yu-Chen Hu 2 1 Department of Computer Science and Communication Engineering Providence University 200 Chung-Chi Rd., Shalu, Taichung 43301, Republic

More information

A Flexible Scheme of Self Recovery for Digital Image Protection

A Flexible Scheme of Self Recovery for Digital Image Protection www.ijcsi.org 460 A Flexible Scheme of Self Recoery for Digital Image Protection Zhenxing Qian, Lili Zhao 2 School of Communication and Information Engineering, Shanghai Uniersity, Shanghai 200072, China

More information

Image Tamper Detection and Recovery Based on Dual Watermarks Sharing Strategy

Image Tamper Detection and Recovery Based on Dual Watermarks Sharing Strategy Image Tamper Detection and Recovery Based on Dual Watermars Sharing Strategy Yi-Hui Chen, Chin-Chen Chang Department of Applied Informatics and Multimedia Asia University, Taichung, Taiwan 35, R.O.C. Department

More information

arxiv: v1 [cs.cr] 31 Dec 2018

arxiv: v1 [cs.cr] 31 Dec 2018 Security analysis of a self-embedding fragile image watermark scheme Xinhui Gong, Feng Yu, Xiaohong Zhao, Shihong Wang School of Science, Beijing University of Posts and Telecommunications, Beijing 100876,

More information

Introduction to XML. Chapter 133

Introduction to XML. Chapter 133 Chapter 133 Introduction to XML A. Multiple choice questions: 1. Attributes in XML should be enclosed within. a. single quotes b. double quotes c. both a and b d. none of these c. both a and b 2. Which

More information

Covert Communication with Authentication via Software Programs Using Invisible ASCII Codes --- A New Approach

Covert Communication with Authentication via Software Programs Using Invisible ASCII Codes --- A New Approach Covert Communication with Authentication via Software Programs Using Invisible ASCII Codes --- A New Approach I-Shi Lee Dept. of Computer Science, National Chiao Tung University, Hsinchu, Taiwan 30010

More information

Digital Image Steganography Using Bit Flipping

Digital Image Steganography Using Bit Flipping BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 1 Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2018-0006 Digital Image Steganography Using

More information

DATA HIDING IN PDF FILES AND APPLICATIONS BY IMPERCEIVABLE MODIFICATIONS OF PDF OBJECT PARAMETERS

DATA HIDING IN PDF FILES AND APPLICATIONS BY IMPERCEIVABLE MODIFICATIONS OF PDF OBJECT PARAMETERS DATA HIDING IN PDF FILES AND APPLICATIONS BY IMPERCEIVABLE MODIFICATIONS OF PDF OBJECT PARAMETERS 1 Jiun-Tsung Wang ( 王竣聰 ) and 2 Wen-Hsiang Tsai ( 蔡文祥 ) 1 Institute of Multimedia Eng., National Chiao

More information

Research Issues and Challenges for Multiple Digital Signatures

Research Issues and Challenges for Multiple Digital Signatures INTERNATION JOURNAL OF NETWORK SECURITY, VOL.1, NO.1,PP. 1-6, 2005 1 Research Issues and Challenges for Multiple Digital Signatures Min-Shiang Hwang, and Cheng-Chi Lee, Abstract In this paper, we survey

More information

Random Traversing Based Reversible Data Hiding Technique Using PE and LSB

Random Traversing Based Reversible Data Hiding Technique Using PE and LSB Random Traversing Based Reversible Data Hiding Technique Using PE and LSB Rhythm Katira #1, Prof. V. Thanikaiselvan *2 # ECE Department, VIT University Vellore, Tamil-Nadu, India 1 rhythm.katira2009@vit.ac.in

More information

A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu

A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu International Journal of Innovative Computing, Information and Control ICIC International c 2016 ISSN 1349-4198 Volume 12, Number 2, April 2016 pp. 395 405 A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD

More information

Introduction to XML. An Example XML Document. The following is a very simple XML document.

Introduction to XML. An Example XML Document. The following is a very simple XML document. Introduction to XML Extensible Markup Language (XML) was standardized in 1998 after 2 years of work. However, it developed out of SGML (Standard Generalized Markup Language), a product of the 1970s and

More information

Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem

Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem Li-Chin Huang and Min-Shiang Hwang 1 Department of Computer Science and Engineering,

More information

A Survey of Fragile Watermarking-based Image Authentication Techniques

A Survey of Fragile Watermarking-based Image Authentication Techniques Journal of Information Hiding and Multimedia Signal Processing c 2016 ISSN 2073-4212 Ubiquitous International Volume 7, Number 6, November 2016 A Survey of Fragile Watermarking-based Image Authentication

More information

A CAVLC-BASED VIDEO WATERMARKING SCHEME FOR H.264/AVC CODEC. Received May 2010; revised October 2010

A CAVLC-BASED VIDEO WATERMARKING SCHEME FOR H.264/AVC CODEC. Received May 2010; revised October 2010 International Journal of Innovative Computing, Information and Control ICIC International c 2011 ISSN 1349-4198 Volume 7, Number 11, November 2011 pp. 6359 6367 A CAVLC-BASED VIDEO WATERMARKING SCHEME

More information

The concept of DTD. DTD(Document Type Definition) Why we need DTD

The concept of DTD. DTD(Document Type Definition) Why we need DTD Contents Topics The concept of DTD Why we need DTD The basic grammar of DTD The practice which apply DTD in XML document How to write DTD for valid XML document The concept of DTD DTD(Document Type Definition)

More information

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2009, Article ID 187874, 11 pages doi:10.1155/2009/187874 Research Article Improvements in Geometry-Based Secret Image Sharing

More information

COMPARATIVE STUDY OF HISTOGRAM SHIFTING ALGORITHMS FOR DIGITAL WATERMARKING

COMPARATIVE STUDY OF HISTOGRAM SHIFTING ALGORITHMS FOR DIGITAL WATERMARKING International Journal of Computer Engineering and Applications, Volume X, Issue VII, July 16 www.ijcea.com ISSN 2321-3469 COMPARATIVE STUDY OF HISTOGRAM SHIFTING ALGORITHMS FOR DIGITAL WATERMARKING Geeta

More information

Digital image steganography using LSB substitution, PVD, and EMD

Digital image steganography using LSB substitution, PVD, and EMD Digital image steganography using LSB substitution, PVD, and EMD Anita Pradhan, K. Raja Sekhar, Gandharba Swain* Department of Computer Science and Engineering, K L University, Vaddeswaram-522502, Andhra

More information

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 8 August, 2014 Page No. 7932-7937 Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting

More information

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction A Report on Genetic Algorithm based Steganography for Image Authentication by Amrita Khamrui Enrolled Scholar Department of Computer Science & Engineering, Kalyani University Prof. (Dr.) J K Mandal Professor

More information

Assignment 9 / Cryptography

Assignment 9 / Cryptography Assignment 9 / Cryptography Michael Hauser March 2002 Tutor: Mr. Schmidt Course: M.Sc Distributed Systems Engineering Lecturer: Mr. Owens CONTENTS Contents 1 Introduction 3 2 Simple Ciphers 3 2.1 Vignère

More information

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques Bashar S. Mahdi Alia K. Abdul Hassan Department of Computer Science, University of Technology, Baghdad, Iraq A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and

More information

Image Authentication and Recovery Scheme Based on Watermarking Technique

Image Authentication and Recovery Scheme Based on Watermarking Technique Image Authentication and Recovery Scheme Based on Watermarking Technique KENJI SUMITOMO 1, MARIKO NAKANO 2, HECTOR PEREZ 2 1 Faculty of Information and Computer Engineering The University of Electro-Communications

More information

An UML-XML-RDB Model Mapping Solution for Facilitating Information Standardization and Sharing in Construction Industry

An UML-XML-RDB Model Mapping Solution for Facilitating Information Standardization and Sharing in Construction Industry An UML-XML-RDB Model Mapping Solution for Facilitating Information Standardization and Sharing in Construction Industry I-Chen Wu 1 and Shang-Hsien Hsieh 2 Department of Civil Engineering, National Taiwan

More information

Secret Communication through Audio for Defense Application

Secret Communication through Audio for Defense Application Secret Communication through Audio for Defense Application A.Nageshwar Rao Maduguri Sudhir R.Venkatesh Abstract: A steganographic method of embedding textual information in an audio file is presented in

More information

A reversible data hiding based on adaptive prediction technique and histogram shifting

A reversible data hiding based on adaptive prediction technique and histogram shifting A reversible data hiding based on adaptive prediction technique and histogram shifting Rui Liu, Rongrong Ni, Yao Zhao Institute of Information Science Beijing Jiaotong University E-mail: rrni@bjtu.edu.cn

More information

Overview. Introduction. Introduction XML XML. Lecture 16 Introduction to XML. Boriana Koleva Room: C54

Overview. Introduction. Introduction XML XML. Lecture 16 Introduction to XML. Boriana Koleva Room: C54 Overview Lecture 16 Introduction to XML Boriana Koleva Room: C54 Email: bnk@cs.nott.ac.uk Introduction The Syntax of XML XML Document Structure Document Type Definitions Introduction Introduction SGML

More information

High Capacity Data Hiding Scheme for DCT-based Images

High Capacity Data Hiding Scheme for DCT-based Images Journal of Information Hiding and Multimedia Signal Processing c 010 ISSN 073-41 Ubiquitous International Volume 1, Number 3, July 010 High Capacity Data Hiding Scheme for DCT-based Images Chia-Chen Lin

More information

A Reversible Data Hiding Scheme for BTC- Compressed Images

A Reversible Data Hiding Scheme for BTC- Compressed Images IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives

More information

Image Steganography Method Using Integer Wavelet Transform

Image Steganography Method Using Integer Wavelet Transform ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference

More information

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS Anita Pradhan Department of CSE, Sri Sivani College of Engineering, Srikakulam, Andhra Pradesh, India anita.pradhan15@gmail.com

More information

A Formula Diamond Encoding Data Hiding Scheme

A Formula Diamond Encoding Data Hiding Scheme Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 6, November 2015 A Formula Diamond Encoding Data Hiding Scheme Wen-Chung Kuo

More information

Implementation of Security in Cloud Systems Based using Encryption and Steganography

Implementation of Security in Cloud Systems Based using Encryption and Steganography Implementation of Security in Cloud Systems Based using Encryption and Steganography 1 A.Mahesh Babu, 2 G.A. Ramachandra, 3 M.Suresh Babu 1,2 Department of Computer Science & Technology, Sri Krishnadevaraya

More information

Enhanced Delegation Based Authentication Protocol for Secure Roaming Service with Synchronization

Enhanced Delegation Based Authentication Protocol for Secure Roaming Service with Synchronization JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 9, NO. 4, DECEMBER 2011 345 Enhanced Delegation Based Authentication Protocol for Secure Roaming Service with Synchronization Hsing-Bai Chen, Yung-Hsiang

More information

SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES

SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES VOL., NO. 7, APRIL 5 ISSN 89-668 6-5 Asian Research Publishing Network (ARPN). All rights reserved. SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES R. Selveeswari and P. R. Vijayalakshmi

More information

XML Introduction 1. XML Stands for EXtensible Mark-up Language (XML). 2. SGML Electronic Publishing challenges -1986 3. HTML Web Presentation challenges -1991 4. XML Data Representation challenges -1996

More information

An Information Hiding Scheme Based on Pixel- Value-Ordering and Prediction-Error Expansion with Reversibility

An Information Hiding Scheme Based on Pixel- Value-Ordering and Prediction-Error Expansion with Reversibility An Information Hiding Scheme Based on Pixel- Value-Ordering Prediction-Error Expansion with Reversibility Ching-Chiuan Lin Department of Information Management Overseas Chinese University Taichung, Taiwan

More information

Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique Using Hadamard Transform Domain

Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique Using Hadamard Transform Domain Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique Using Hadamard Transform Domain YAHYA E. A. AL-SALHI a, SONGFENG LU *b a. Research Scholar, School of computer science, Huazhong

More information

Enhanced Least Significant Bit Scheme Robust Against Chi-Squared Attack

Enhanced Least Significant Bit Scheme Robust Against Chi-Squared Attack 2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation Enhanced Least Significant Bit Scheme Robust Against Chi-Squared Attack Masoud Afrakhteh Dept. of

More information

Message Authentication and Hash function 2

Message Authentication and Hash function 2 Message Authentication and Hash function 2 Concept and Example 1 SHA : Secure Hash Algorithm Four secure hash algorithms, SHA-11, SHA-256, SHA-384, and SHA-512. All four of the algorithms are iterative,

More information

Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing

Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing Chi-Yao Weng 1, Yen-Chia Huang 1, Chin-Feng Lee 2(&), and Dong-Peng Lin 2 1 Department of Computer Science, National Pingtung University,

More information

Concealing Information in Images using Progressive Recovery

Concealing Information in Images using Progressive Recovery Concealing Information in Images using Progressive Recovery Pooja R 1, Neha S Prasad 2, Nithya S Jois 3, Sahithya KS 4, Bhagyashri R H 5 1,2,3,4 UG Student, Department Of Computer Science and Engineering,

More information

Watermarking Moble Phone Color Images With Error Correction Codes

Watermarking Moble Phone Color Images With Error Correction Codes IOSR Journal of Electronics & Communication Engineering (IOSR-JECE) ISSN(e) : 2278-1684 ISSN(p) : 2320-334X, PP 05-09 www.iosrjournals.org Watermarking Moble Phone Color Images With Error Correction Codes

More information

A Forward-Secure Signature with Backward-Secure Detection

A Forward-Secure Signature with Backward-Secure Detection A Forward-Secure Signature with Backward-Secure Detection Dai-Rui Lin and Chih-I Wang Department of Computer Science and Engineering National Sun Yat-sen University, Kaohsiung 804, Taiwan June 17, 2007

More information

A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique

A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique 1 Arathi Chitla, 2 Dr. M. Chandra Mohan 1 Associate Professor, Department of Computer Science &

More information

Reversible Data Hiding Based on Median Difference Histogram

Reversible Data Hiding Based on Median Difference Histogram JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 27, 577-593 (2011) Reversible Data Hiding Based on Median Difference Histogram HSIEN-WEI YANG 1,2, I-EN LIAO * AND CHAUR-CHIN CHEN + 1 Department of Information

More information

x ide xml Integrated Development Environment Specifications Document 1 Project Description 2 Specifi fications

x ide xml Integrated Development Environment Specifications Document 1 Project Description 2 Specifi fications x ide xml Integrated Development Environment Specifications Document Colin Hartnett (cphartne) 7 February 2003 1 Project Description There exist many integrated development environments that make large

More information

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan

More information

A DTD-Syntax-Tree Based XML file Modularization Browsing Technique

A DTD-Syntax-Tree Based XML file Modularization Browsing Technique IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.2A, February 2006 127 A DTD-Syntax-Tree Based XML file Modularization Browsing Technique Zhu Zhengyu 1, Changzhi Li, Yuan

More information

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12086-12090 Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program Shruti

More information

Cryptanalysis of Blind Signature Schemes

Cryptanalysis of Blind Signature Schemes IJCSNS International Journal of Computer Science and Network Security, VOL.14 No.5, May 2014 73 Cryptanalysis of Blind Signature Schemes Nitu Singh M.Tech Scholar Dept. of Cmputer Science & Engineering

More information

A Grayscale Image Steganography Based upon Discrete Cosine Transformation

A Grayscale Image Steganography Based upon Discrete Cosine Transformation A Grayscale Image Steganography Based upon Discrete Cosine Transformation Chin-Chen Chang 1, Pei-Yu Lin, and Jun-Chou Chuang 3 1 Department of Information Engineering and Computer Science, Feng Chia University,

More information

User-Friendly Sharing System using Polynomials with Different Primes in Two Images

User-Friendly Sharing System using Polynomials with Different Primes in Two Images User-Friendly Sharing System using Polynomials with Different Primes in Two Images Hung P. Vo Department of Engineering and Technology, Tra Vinh University, No. 16 National Road 53, Tra Vinh City, Tra

More information

Introducing live graphics gems to educational material

Introducing live graphics gems to educational material Introducing live graphics gems to educational material Johannes Görke, Frank Hanisch, Wolfgang Straíer WSI/GRIS University of Tübingen, Sand 14, 72076 Tübingen, Germany Thiruvarangan Ramaraj CS525 Graphics

More information

AN IMPROVED METHOD FOR HIDING DATA IN A MAZE

AN IMPROVED METHOD FOR HIDING DATA IN A MAZE AN IMPROVED METHOD FOR HIDING DATA IN A MAZE HUI-LUNG LEE, CHIA-FENG LEE, LING-HWEI CHEN Department of Computer Science, National Chiao Tung University Hsinchu, Taiwan, R.O.C. E-MAIL: huilung@debut.cis.nctu.edu.tw,

More information

LSB Based Audio Steganography Using Pattern Matching

LSB Based Audio Steganography Using Pattern Matching ISSN: 359-0040 Vol 2 Issue, November - 205 LSB Based Audio Steganography Using Pattern Matching Mr Ratul Choudhury Student, Dept of Computer Sc & Engg Dept University of Calcutta Kolkata, India ratulchowdhury@iemcalcom

More information

Moment-preserving Based Watermarking for Color Image Authentication and Recovery

Moment-preserving Based Watermarking for Color Image Authentication and Recovery 2012 IACSIT Hong Kong Conferences IPCSIT vol. 30 (2012) (2012) IACSIT Press, Singapore Moment-preserving Based Watermarking for Color Image Authentication and Recovery Kuo-Cheng Liu + Information Educating

More information

HTML Steganography using Relative links & Multi web-page Embedment

HTML Steganography using Relative links & Multi web-page Embedment HTML Steganography using Relative links & Multi web-page Embedment 1 Chintan Dhanani, 2 Krunal Panchal 1 Mtech Scholar, 2 Lecturer Department of computer engineering, Gujarat Technological University,

More information

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation , 2009, 5, 363-370 doi:10.4236/ijcns.2009.25040 Published Online August 2009 (http://www.scirp.org/journal/ijcns/). Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

More information

Improved Qualitative Color Image Steganography Based on DWT

Improved Qualitative Color Image Steganography Based on DWT Improved Qualitative Color Image Steganography Based on DWT 1 Naresh Goud M, II Arjun Nelikanti I, II M. Tech student I, II Dept. of CSE, I, II Vardhaman College of Eng. Hyderabad, India Muni Sekhar V

More information

DOI: /jos Tel/Fax: by Journal of Software. All rights reserved. , )

DOI: /jos Tel/Fax: by Journal of Software. All rights reserved. , ) ISSN 1000-9825, CODEN RUXUEW E-mail: jos@iscasaccn Journal of Software, Vol17, No2, February 2006, pp315 324 http://wwwjosorgcn DOI: 101360/jos170315 Tel/Fax: +86-10-62562563 2006 by Journal of Software

More information

Adaptive Pixel Pair Matching Technique for Data Embedding

Adaptive Pixel Pair Matching Technique for Data Embedding Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems.

A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. G Swetha M.Tech Student Dr.N.Chandra Sekhar Reddy Professor & HoD U V N Rajesh Assistant Professor Abstract Cryptography

More information

Efficient & Secure Data Hiding Using Secret Reference Matrix

Efficient & Secure Data Hiding Using Secret Reference Matrix Efficient & Secure Data Hiding Using Secret Reference Matrix Laxman Tawade 1, Rajshree Mahajan 2, Chandan Kulthe 3 1 Department of Electronic and Telecommunication Engineering, Pune University, India 2,3

More information

Data Hiding in Binary Text Documents 1. Q. Mei, E. K. Wong, and N. Memon

Data Hiding in Binary Text Documents 1. Q. Mei, E. K. Wong, and N. Memon Data Hiding in Binary Text Documents 1 Q. Mei, E. K. Wong, and N. Memon Department of Computer and Information Science Polytechnic University 5 Metrotech Center, Brooklyn, NY 11201 ABSTRACT With the proliferation

More information

World-Wide Wide Web. Netprog HTTP

World-Wide Wide Web. Netprog HTTP Web Services Based partially on Sun Java Tutorial at http://java.sun.com/webservices/ Also, XML, Java and the Future of The Web, Jon Bosak. And WSDL Tutorial at: http://www.w3schools.com/wsdl wsdl/ 1 World-Wide

More information

COMP9321 Web Application Engineering

COMP9321 Web Application Engineering COMP9321 Web Application Engineering Semester 2, 2015 Dr. Amin Beheshti Service Oriented Computing Group, CSE, UNSW Australia Week 4 http://webapps.cse.unsw.edu.au/webcms2/course/index.php?cid=2411 1 Extensible

More information

Blind Signature Scheme Based on Elliptic Curve Cryptography

Blind Signature Scheme Based on Elliptic Curve Cryptography Blind Signature Scheme Based on Elliptic Curve Cryptography Chwei-Shyong Tsai Min-Shiang Hwang Pei-Chen Sung Department of Management Information System, National Chung Hsing University 250 Kuo Kuang Road.,

More information

Introduction Syntax and Usage XML Databases Java Tutorial XML. November 5, 2008 XML

Introduction Syntax and Usage XML Databases Java Tutorial XML. November 5, 2008 XML Introduction Syntax and Usage Databases Java Tutorial November 5, 2008 Introduction Syntax and Usage Databases Java Tutorial Outline 1 Introduction 2 Syntax and Usage Syntax Well Formed and Valid Displaying

More information

High Capacity Reversible Watermarking Scheme for 2D Vector Maps

High Capacity Reversible Watermarking Scheme for 2D Vector Maps Scheme for 2D Vector Maps 1 Information Management Department, China National Petroleum Corporation, Beijing, 100007, China E-mail: jxw@petrochina.com.cn Mei Feng Research Institute of Petroleum Exploration

More information

M359 Block5 - Lecture12 Eng/ Waleed Omar

M359 Block5 - Lecture12 Eng/ Waleed Omar Documents and markup languages The term XML stands for extensible Markup Language. Used to label the different parts of documents. Labeling helps in: Displaying the documents in a formatted way Querying

More information

Restricted Nearest Feature Line with Ellipse for Face Recognition

Restricted Nearest Feature Line with Ellipse for Face Recognition Journal of Information Hiding and Multimedia Signal Processing c 2012 ISSN 2073-4212 Ubiquitous International Volume 3, Number 3, July 2012 Restricted Nearest Feature Line with Ellipse for Face Recognition

More information

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network 1 Ms.Anisha Viswan, 2 Ms.T.Poongodi, 3 Ms.Ranjima P, 4 Ms.Minimol Mathew 1,3,4 PG Scholar, 2 Assistant Professor,

More information

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4 IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam

More information

Review On Secrete Sharing Scheme for Color Image Steganography

Review On Secrete Sharing Scheme for Color Image Steganography International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 5 (2014), pp. 485-490 International Research Publications House http://www. irphouse.com /ijict.htm Review

More information

A New Approach to Compressed Image Steganography Using Wavelet Transform

A New Approach to Compressed Image Steganography Using Wavelet Transform IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. III (Sep. Oct. 2015), PP 53-59 www.iosrjournals.org A New Approach to Compressed Image Steganography

More information

Watermark-Based Authentication and Key Exchange in Teleconferencing Systems

Watermark-Based Authentication and Key Exchange in Teleconferencing Systems Watermark-Based Authentication and Key Exchange in Teleconferencing Systems Ulrich Rührmair a, Stefan Katzenbeisser b, Martin Steinebach c, and Sascha Zmudzinski c a Technische Universität München, Department

More information

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Digital Image Steganography Techniques: Case Study. Karnataka, India. ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College

More information

.. Cal Poly CPE/CSC 366: Database Modeling, Design and Implementation Alexander Dekhtyar..

.. Cal Poly CPE/CSC 366: Database Modeling, Design and Implementation Alexander Dekhtyar.. .. Cal Poly CPE/CSC 366: Database Modeling, Design and Implementation Alexander Dekhtyar.. XML in a Nutshell XML, extended Markup Language is a collection of rules for universal markup of data. Brief History

More information

XML. XML Syntax. An example of XML:

XML. XML Syntax. An example of XML: XML Extensible Markup Language (XML) is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable. Defined in the XML 1.0 Specification

More information

The new Hybrid approach to protect MPEG-2 video header

The new Hybrid approach to protect MPEG-2 video header The new Hybrid approach to protect MPEG-2 video header *YUK YING CHUNG, *XIANG ZHANG, *XIAOMING CHEN, *MOHD AFIZI MOHD SHUKRAN, **CHANGSEOK BAE *School of Information Technologies, University of Sydney,

More information

Available online at ScienceDirect. The 4th International Conference on Electrical Engineering and Informatics (ICEEI 2013)

Available online at  ScienceDirect. The 4th International Conference on Electrical Engineering and Informatics (ICEEI 2013) Available online at www.sciencedirect.com ScienceDirect Procedia Technology 11 ( 2013 ) 614 620 The 4th International Conference on Electrical Engineering and Informatics (ICEEI 2013) Reversible Fragile

More information

A Novel Fragile Watermark-Based Image Authentication Scheme for AMBTC-Compressed Images

A Novel Fragile Watermark-Based Image Authentication Scheme for AMBTC-Compressed Images Journal of Information Hiding and Multimedia Signal Processing c 2016 ISSN 2073-4212 Ubiquitous International Volume 7, Number 2, March 2016 A Novel Fragile Watermark-Based Image Authentication Scheme

More information

Open Access The Three-dimensional Coding Based on the Cone for XML Under Weaving Multi-documents

Open Access The Three-dimensional Coding Based on the Cone for XML Under Weaving Multi-documents Send Orders for Reprints to reprints@benthamscience.ae 676 The Open Automation and Control Systems Journal, 2014, 6, 676-683 Open Access The Three-dimensional Coding Based on the Cone for XML Under Weaving

More information

Overview. Structured Data. The Structure of Data. Semi-Structured Data Introduction to XML Querying XML Documents. CMPUT 391: XML and Querying XML

Overview. Structured Data. The Structure of Data. Semi-Structured Data Introduction to XML Querying XML Documents. CMPUT 391: XML and Querying XML Database Management Systems Winter 2004 CMPUT 391: XML and Querying XML Lecture 12 Overview Semi-Structured Data Introduction to XML Querying XML Documents Dr. Osmar R. Zaïane University of Alberta Chapter

More information

RDGL Reference Manual

RDGL Reference Manual RDGL Reference Manual COMS W4115 Programming Languages and Translators Professor Stephen A. Edwards Summer 2007(CVN) Navid Azimi (na2258) nazimi@microsoft.com Contents Introduction... 3 Purpose... 3 Goals...

More information

Using Wavelets to Embed Images in Images

Using Wavelets to Embed Images in Images University of Tennessee, Knoxville Trace: Tennessee Research and Creative Exchange University of Tennessee Honors Thesis Projects University of Tennessee Honors Program 3-2004 Using Wavelets to Embed Images

More information

Agenda. Summary of Previous Session. XML for Java Developers G Session 6 - Main Theme XML Information Processing (Part II)

Agenda. Summary of Previous Session. XML for Java Developers G Session 6 - Main Theme XML Information Processing (Part II) XML for Java Developers G22.3033-002 Session 6 - Main Theme XML Information Processing (Part II) Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical

More information

STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION

STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION Journal homepage: www.mjret.in STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION Sudhanshi Sharma 1, Umesh Kumar 2 Computer Engineering, Govt. Mahila Engineering College, Ajmer, India 1 sudhanshisharma91@gmail.com,

More information

A NEW WATERMARKING TECHNIQUE FOR SECURE DATABASE

A NEW WATERMARKING TECHNIQUE FOR SECURE DATABASE Online Journal, www.ijcea.com A NEW WATERMARKING TECHNIQUE FOR SECURE DATABASE Jun Ziang Pinn 1 and A. Fr. Zung 2 1,2 P. S. University for Technology, Harbin 150001, P. R. China ABSTRACT Digital multimedia

More information

XML. extensible Markup Language. Overview. Overview. Overview XML Components Document Type Definition (DTD) Attributes and Tags An XML schema

XML. extensible Markup Language. Overview. Overview. Overview XML Components Document Type Definition (DTD) Attributes and Tags An XML schema XML extensible Markup Language An introduction in XML and parsing XML Overview XML Components Document Type Definition (DTD) Attributes and Tags An XML schema 3011 Compiler Construction 2 Overview Overview

More information

PHP and MySQL for Dynamic Web Sites. Intro Ed Crowley

PHP and MySQL for Dynamic Web Sites. Intro Ed Crowley PHP and MySQL for Dynamic Web Sites Intro Ed Crowley Class Preparation If you haven t already, download the sample scripts from: http://www.larryullman.com/books/phpand-mysql-for-dynamic-web-sitesvisual-quickpro-guide-4thedition/#downloads

More information

A tutorial report for SENG Agent Based Software Engineering. Course Instructor: Dr. Behrouz H. Far. XML Tutorial.

A tutorial report for SENG Agent Based Software Engineering. Course Instructor: Dr. Behrouz H. Far. XML Tutorial. A tutorial report for SENG 609.22 Agent Based Software Engineering Course Instructor: Dr. Behrouz H. Far XML Tutorial Yanan Zhang Department of Electrical and Computer Engineering University of Calgary

More information

A new approach to the secret image sharing with steganography and authentication

A new approach to the secret image sharing with steganography and authentication 1 A new approach to the secret image sharing with steganography and authentication C-C Wu a, M-S Hwang* b and S-J Kao a a Department of Computer Science and Engineering, National Chung Hsing University,

More information

Bit-Plane Decomposition Steganography Using Wavelet Compressed Video

Bit-Plane Decomposition Steganography Using Wavelet Compressed Video Bit-Plane Decomposition Steganography Using Wavelet Compressed Video Tomonori Furuta, Hideki Noda, Michiharu Niimi, Eiji Kawaguchi Kyushu Institute of Technology, Dept. of Electrical, Electronic and Computer

More information