Nowadays, due to the incredible advance in information and communication technology, security of ... more Nowadays, due to the incredible advance in information and communication technology, security of information transferring through communication channel becomes a major concern. Cryptography and steganography are essential tools for information security. Therefore, in order to achieve more robust security system, this paper focuses on combination usage of cryptographic system and text steganographic technique. Traditionally, all of the steganographic techniques have limited information-hiding capacity. For this reason, this paper proposes a new embedding algorithm to hide a larger amount of secret text in cover text without degrading in the content of the cover. In addition, to enhance the security of secret message, it has been scrambled first through RC5 encryption algorithm before concealing into an innocuous cover text. The basic idea behind this paper is to provide a good, new efficient embedding method for hiding the data in text from hackers and sent to the receiver in a safer...
American Scientific Research Journal for Engineering, Technology, and Sciences, 2016
Due to the growth in frequent exchange of digital data over public channel, information security ... more Due to the growth in frequent exchange of digital data over public channel, information security plays an important role in daily part of communication. Hence, various techniques like steganography are applied in information security area for more efficient information security system. This paper proposes two new text steganographic approaches using two different languages which are based on Unicode standard for secure data transfer over the public channel. The main aim is to overcome the limited embedding capacity, suspiciousness, and data damaging effect due to modification of existing steganographic approaches. The first approach conceals a message, without degrading the cover, by using four specific characters of words of the English cover text. The second approach performs message hiding by using the three specific groups of characters of combined words in Myanmar cover text while maintaining the content of the cover. The structure and operation of the proposed approaches based...
Nowadays, the study on student data has been becoming more and more interesting and astonishing m... more Nowadays, the study on student data has been becoming more and more interesting and astonishing methodologies arose to address its wonder. This paper explores the conventional data mining models such as ‘Vanilla’ artificial neural network and fuzzy inference system ─ also, principal component analysis (PCA) for feature classes ─ and proposes a particular model for an available dataset. The principal components deliver the untold correlations between subjective and objective aspects of the data, and raise the feasibility for deep learning algorithm. Meanwhile, a simple fuzzy inference system is needed to express the linguistic variability of the principal components which are also fuzzy input parameters: objective aspect such as grades and extra-curricular activities, and subjective aspect, for instance, parents’ education and jobs. The system is implemented in Python 3.x with functional dependencies being Numpy, Pickle, Pandas, sklearn and seaborn.
Data hiding technique, so called Steganography, is one of the popular approaches used in data sec... more Data hiding technique, so called Steganography, is one of the popular approaches used in data security as it can even protect the presence of data on public channels by obscuring it inside some carrier files such as text, image, audio, and video. Often, text files are the most preferable medium for its faster communication and less memory usage. However, storing large amount of data in text file is more noticeable to adversaries due to less redundant data in a text file to replace with secret data. Hence, there is a tradeoff between security and data hiding capacity in text steganography. The main idea of this paper is to propose a new text steganographic approach with the purpose of providing high embedding capacity while maintaining the security by generating identical stego text to the original cover text and position file after embedding process. Since all the rest of security depends on the generated position file, it has been converted to unreadable format by using RC6 encrypt...
Proceedings of the 21st International Conference on Information Integration and Web-based Applications & Services, 2019
Although Myanmar's car import policy led shocks in the automotive market due to the Policy ch... more Although Myanmar's car import policy led shocks in the automotive market due to the Policy changes to import left-hand drive (new car), many consumers in Myanmar still more desire using second-hand cars. Car history is essential in the used car market which is a popular business in Myanmar. Online car trading requires a reliable supplier which may grantee the integrity of car grading. This problem can be solved by using a pure decentralized mechanism called blockchain which has become a hot research area to achieve an open and safe environment. In this paper, the system is aimed to develop a blockchain-based car trading system that can speed up the verification of car information and currency transfers. Besides the proposed car trading system is not only reliable but also protects from the 51% attacks even if 51% of car owners, insurance companies and repair services in this cooperation are simultaneously compromised.
In today’s electronic era, wealth of electronic information are accessing over the Internet. Seve... more In today’s electronic era, wealth of electronic information are accessing over the Internet. Several important information and private data transferring over the Internet are being hacked by attackers via latest communication technology. So, maintaining the security of secret data has been a great challenge. To tackle the security problem, cryptographic methods as well as steganographic techniques are essential. This paper focuses on hybrid security system using cryptographic algorithm and text steganographic technique to achieve a more robust security system. In this work, to overcome the limited data hiding capacity, suspiciousness, and data damaging effect due to modification, of traditional steganographic techniques, a new technique for information hiding in text file is proposed. The proposed approach conceals a message, without degrading cover, by using first, second, second last, and last letter of words of the cover text. Hence, from the embedding capacity point of view, its...
2020 International Conference on Advanced Information Technologies (ICAIT)
Although Blockchain technology is formerly invented for digital currencies such as Bitcoin, its a... more Although Blockchain technology is formerly invented for digital currencies such as Bitcoin, its applications have extended into such areas as fair voting, healthcare, banking, and digital identity. A blockchain ‘s data is cryptographically connected and distributed across multiple computers, making them nearly impossible to temper with. Hence, this paper considers the possible use of introducing blockchain technology for digital identity management system for the issue of digital identity (passport) in Myanmar. Through blockchain technology, all the passport offices in Myanmar will be connected to each other in decentralized environment and enough passport information of a person can be securely shared within peers. Therefore, the proposed system can hinder the illegal duplication of passports (different types) since a valid passport can be issued only once to a person (except passport loss, renewal and expired) and it is impossible for a person to apply more than one passport type in the decentralized system. In addition, in the proposed system, the authenticity of passport can also be verified after granting permission for international travel. Therefore, the proposed system can be effectively applied for the passport offices in Myanmar for verifying the passport application and its data authentication.
Nowadays, due to the incredible advance in information and communication technology, security of ... more Nowadays, due to the incredible advance in information and communication technology, security of information transferring through communication channel becomes a major concern. Cryptography and steganography are essential tools for information security. Therefore, in order to achieve more robust security system, this paper focuses on combination usage of cryptographic system and text steganographic technique. Traditionally, all of the steganographic techniques have limited information-hiding capacity. For this reason, this paper proposes a new embedding algorithm to hide a larger amount of secret text in cover text without degrading in the content of the cover. In addition, to enhance the security of secret message, it has been scrambled first through RC5 encryption algorithm before concealing into an innocuous cover text. The basic idea behind this paper is to provide a good, new efficient embedding method for hiding the data in text from hackers and sent to the receiver in a safer...
American Scientific Research Journal for Engineering, Technology, and Sciences, 2016
Due to the growth in frequent exchange of digital data over public channel, information security ... more Due to the growth in frequent exchange of digital data over public channel, information security plays an important role in daily part of communication. Hence, various techniques like steganography are applied in information security area for more efficient information security system. This paper proposes two new text steganographic approaches using two different languages which are based on Unicode standard for secure data transfer over the public channel. The main aim is to overcome the limited embedding capacity, suspiciousness, and data damaging effect due to modification of existing steganographic approaches. The first approach conceals a message, without degrading the cover, by using four specific characters of words of the English cover text. The second approach performs message hiding by using the three specific groups of characters of combined words in Myanmar cover text while maintaining the content of the cover. The structure and operation of the proposed approaches based...
Nowadays, the study on student data has been becoming more and more interesting and astonishing m... more Nowadays, the study on student data has been becoming more and more interesting and astonishing methodologies arose to address its wonder. This paper explores the conventional data mining models such as ‘Vanilla’ artificial neural network and fuzzy inference system ─ also, principal component analysis (PCA) for feature classes ─ and proposes a particular model for an available dataset. The principal components deliver the untold correlations between subjective and objective aspects of the data, and raise the feasibility for deep learning algorithm. Meanwhile, a simple fuzzy inference system is needed to express the linguistic variability of the principal components which are also fuzzy input parameters: objective aspect such as grades and extra-curricular activities, and subjective aspect, for instance, parents’ education and jobs. The system is implemented in Python 3.x with functional dependencies being Numpy, Pickle, Pandas, sklearn and seaborn.
Data hiding technique, so called Steganography, is one of the popular approaches used in data sec... more Data hiding technique, so called Steganography, is one of the popular approaches used in data security as it can even protect the presence of data on public channels by obscuring it inside some carrier files such as text, image, audio, and video. Often, text files are the most preferable medium for its faster communication and less memory usage. However, storing large amount of data in text file is more noticeable to adversaries due to less redundant data in a text file to replace with secret data. Hence, there is a tradeoff between security and data hiding capacity in text steganography. The main idea of this paper is to propose a new text steganographic approach with the purpose of providing high embedding capacity while maintaining the security by generating identical stego text to the original cover text and position file after embedding process. Since all the rest of security depends on the generated position file, it has been converted to unreadable format by using RC6 encrypt...
Proceedings of the 21st International Conference on Information Integration and Web-based Applications & Services, 2019
Although Myanmar's car import policy led shocks in the automotive market due to the Policy ch... more Although Myanmar's car import policy led shocks in the automotive market due to the Policy changes to import left-hand drive (new car), many consumers in Myanmar still more desire using second-hand cars. Car history is essential in the used car market which is a popular business in Myanmar. Online car trading requires a reliable supplier which may grantee the integrity of car grading. This problem can be solved by using a pure decentralized mechanism called blockchain which has become a hot research area to achieve an open and safe environment. In this paper, the system is aimed to develop a blockchain-based car trading system that can speed up the verification of car information and currency transfers. Besides the proposed car trading system is not only reliable but also protects from the 51% attacks even if 51% of car owners, insurance companies and repair services in this cooperation are simultaneously compromised.
In today’s electronic era, wealth of electronic information are accessing over the Internet. Seve... more In today’s electronic era, wealth of electronic information are accessing over the Internet. Several important information and private data transferring over the Internet are being hacked by attackers via latest communication technology. So, maintaining the security of secret data has been a great challenge. To tackle the security problem, cryptographic methods as well as steganographic techniques are essential. This paper focuses on hybrid security system using cryptographic algorithm and text steganographic technique to achieve a more robust security system. In this work, to overcome the limited data hiding capacity, suspiciousness, and data damaging effect due to modification, of traditional steganographic techniques, a new technique for information hiding in text file is proposed. The proposed approach conceals a message, without degrading cover, by using first, second, second last, and last letter of words of the cover text. Hence, from the embedding capacity point of view, its...
2020 International Conference on Advanced Information Technologies (ICAIT)
Although Blockchain technology is formerly invented for digital currencies such as Bitcoin, its a... more Although Blockchain technology is formerly invented for digital currencies such as Bitcoin, its applications have extended into such areas as fair voting, healthcare, banking, and digital identity. A blockchain ‘s data is cryptographically connected and distributed across multiple computers, making them nearly impossible to temper with. Hence, this paper considers the possible use of introducing blockchain technology for digital identity management system for the issue of digital identity (passport) in Myanmar. Through blockchain technology, all the passport offices in Myanmar will be connected to each other in decentralized environment and enough passport information of a person can be securely shared within peers. Therefore, the proposed system can hinder the illegal duplication of passports (different types) since a valid passport can be issued only once to a person (except passport loss, renewal and expired) and it is impossible for a person to apply more than one passport type in the decentralized system. In addition, in the proposed system, the authenticity of passport can also be verified after granting permission for international travel. Therefore, the proposed system can be effectively applied for the passport offices in Myanmar for verifying the passport application and its data authentication.
Uploads
Papers by May Htet