scholarly journals A Time-Based Dynamic Operation Model for Webpage Steganography Methods

Electronics ◽  
2020 ◽  
Vol 9 (12) ◽  
pp. 2113
Author(s):  
Simun Yuk ◽  
Youngho Cho

The webpage steganography technique has been used for a covert communication method for various purposes in which a sender embeds a secret message into a plain webpage file like an HTML file by using various steganography methods. With human eyes, it is very difficult to distinguish between the original webpage (cover webpage) and the modified webpage with the secret data (stego webpage) because both are displayed alike in a web browser. In this approach, when two communicating entities want to share a secret message, a sender uploads a stego webpage to a web server or modifies an existing webpage in the web server by using a webpage steganography method, and then a receiver accesses the stego webpage to download and extract the embedded secret data from it. Meanwhile, according to our extensive survey, we observed that most webpage steganography methods focused on proposing or improving steganography algorithms but did not well address how to operate a stego webpage as time passes. However, if a stego webpage is used in a static way such that the stego webpage does not change and is constantly exposed to web clients until the sender removes it, such a static operation approach will limit or badly affect the hiding capacity and undetectability of a webpage steganography method. By this motivation, in this paper, we proposed a time-based dynamic operation model (TDOM) that improves the performance of existing webpage steganography methods in terms of hiding capacity and undetectability by dynamically replacing the stego webpage with other stego webpages or the original webpage. In addition, we designed two time-based dynamic operation algorithms (TDOA-C and TDOA-U), which improve the hiding capacity of existing methods and TDOA-U for improving the undetectability of existing methods, respectively. To validate our model and show the performance of our proposed algorithms, we conducted extensive comparative experiments and numerical analysis by implementing two webpage steganography methods with our TDOM (CCL with TDOA-C and COA with TDOA-C) and tested them in the web environment. According to our experiments and analysis, our proposed algorithms could significantly improve the hiding capacity and undetectability of two existing webpage steganography methods.

2015 ◽  
Author(s):  
Pere Puigbo ◽  
Jacqueline M Major

GPT (Global Positioning Trees) is a web-server that maps phylogenetic trees on a virtual globe. The minimum requirements are a phylogenetic tree and geographical coordinates of leaves to generate a Keyhole Markup Language (KML) file that can be viewed on Google Earth. An advantage of GPT is the results may be pre-visualized directly on the web. This web-server also implements several tools to display geolocation and geotrack data. GPT has been designed to be an easy-to-use tool to track evolutionary processes and will be useful for phylogeographical and spatial epidemiological studies. It covers a wide-range of visualizations divided in three components increasingly complex: geolocation, geotrack and GPT. This web-server is freely available at http://ppuigbo.me/programs/GPT and only requires Internet access, a web browser, and an earth browser able to read KML files. Several examples and a tutorial are accessible from the web-server’s home page.


Author(s):  
Thomas M. Chen ◽  
Zhi (Judy) Fu

Most people are concerned about online privacy but may not be aware of the various ways that their personal information is collected during routine Web browsing. We review the types of personal information that may be collected voluntarily or involuntarily through the Web browser or disclosed by a Web server. We present a taxonomy of regulatory and technological approaches to protect privacy. All approaches to date have only been partial solutions. By its nature, the Web was designed to be an open system to facilitate data sharing, and hence Web privacy continues to be a challenging problem.


2014 ◽  
Vol 971-973 ◽  
pp. 1866-1869
Author(s):  
Jin Sheng Sun ◽  
Zhi Pan Guo

With the rapid growth of the Internet, the interest for connecting devices such as frequency converters into Internet has increased. Web browser is used by remote operator to control and monitor frequency converters via Internet and this application will be widely utilized. This article makes a study of web-based monitoring for frequency converters with USS interface. It is based on TCP/IP stack and the real time operating systemμC/OS-II. Then this paper presents a detailed analysis of the Web server, and the interactive method of the browser and the Web server. In the design of the server, it emphasizes the USS protocol telegram processing method. The architecture of embedded monitoring system, hardware and software implementation are also described in this article.


2015 ◽  
Author(s):  
Pere Puigbo ◽  
Jacqueline M Major

GPT (Global Positioning Trees) is a web-server that maps phylogenetic trees on a virtual globe. The minimum requirements are a phylogenetic tree and geographical coordinates of leaves to generate a Keyhole Markup Language (KML) file that can be viewed on Google Earth. An advantage of GPT is the results may be pre-visualized directly on the web. This web-server also implements several tools to display geolocation and geotrack data. GPT has been designed to be an easy-to-use tool to track evolutionary processes and will be useful for phylogeographical and spatial epidemiological studies. It covers a wide-range of visualizations divided in three components increasingly complex: geolocation, geotrack and GPT. This web-server is freely available at http://ppuigbo.me/programs/GPT and only requires Internet access, a web browser, and an earth browser able to read KML files. Several examples and a tutorial are accessible from the web-server’s home page.


2019 ◽  
Vol 8 (4) ◽  
pp. 3369-3373

In present world data transfer using the internet is growing. It is very easy and fast way to transfer information like confidential documents, economic transactions, business applications and other covert information over internet. With the advent and growth of internet, people are more concerned about security of information. Data Security is important while data is transferred over internet because any illegal user can access important and private data also make it worthless. Research in data security area will help government agencies, military organization and private companies to securely transmit their confidential data over internet. From past few years various steganography techniques have been developed to hide secret message using various multimedia objects having large amount of redundant data to support steganography. In this paper introduction about steganography, related concepts and implementation of commonly used spatial domain techniques like LSB(Least Significant Bit Technique) with modulus, PVD(Pixel Value Difference) with LSB replacement and adaptive data hiding over edges with LSB are considered. It is observed(while visual, statistical analysis and experiments were carried out) with benchmark cover and stego objects that embedding same amount of secret data in each pixel leads to more visible distortions in a stego image because all pixels do not bear same amount of changes and this effect is more observed in smooth area then edges. Improving stego image imperceptibility and adjusting hiding capacity adaptively are major related research challenges about spatial domain techniques.


2016 ◽  
Vol 2 (1) ◽  
pp. 1-11 ◽  
Author(s):  
May Htet ◽  
Su Wai Phyo

In today’s electronic era, wealth of electronic information are accessing over the Internet. Several important information and private data transferring over the Internet are being hacked by attackers via latest communication technology. So, maintaining the security of secret data has been a great challenge. To tackle the security problem, cryptographic methods as well as steganographic techniques are essential. This paper focuses on hybrid security system using cryptographic algorithm and text steganographic technique to achieve a more robust security system. In this work, to overcome the limited data hiding capacity, suspiciousness, and data damaging effect due to modification, of traditional steganographic techniques, a new technique for information hiding in text file is proposed. The proposed approach conceals a message, without degrading cover, by using first, second, second last, and last letter of words of the cover text. Hence, from the embedding capacity point of view, its capacity depends on the similarity of characters of the words in cover text. In addition, as further improvement for security, secret message encryption is performed using Blowfish algorithm before hiding into the innocuous cover text. 


Cyber Crime ◽  
2013 ◽  
pp. 83-100
Author(s):  
Thomas M. Chen ◽  
Zhi (Judy) Fu

Most people are concerned about online privacy but may not be aware of the various ways that their personal information is collected during routine Web browsing. We review the types of personal information that may be collected voluntarily or involuntarily through the Web browser or disclosed by a Web server. We present a taxonomy of regulatory and technological approaches to protect privacy. All approaches to date have only been partial solutions. By its nature, the Web was designed to be an open system to facilitate data sharing, and hence Web privacy continues to be a challenging problem.


2016 ◽  
Vol 1 (1) ◽  
pp. 001
Author(s):  
Harry Setya Hadi

String searching is a common process in the processes that made the computer because the text is the main form of data storage. Boyer-Moore is the search string from right to left is considered the most efficient methods in practice, and matching string from the specified direction specifically an algorithm that has the best results theoretically. A system that is connected to a computer network that literally pick a web server that is accessed by multiple users in different parts of both good and bad aim. Any activity performed by the user, will be stored in Web server logs. With a log report contained in the web server can help a web server administrator to search the web request error. Web server log is a record of the activities of a web site that contains the data associated with the IP address, time of access, the page is opened, activities, and access methods. The amount of data contained in the resulting log is a log shed useful information.


Author(s):  
Jozef Kapusta ◽  
Michal Munk ◽  
Dominik Halvoník ◽  
Martin Drlík

If we are talking about user behavior analytics, we have to understand what the main source of valuable information is. One of these sources is definitely a web server. There are multiple places where we can extract the necessary data. The most common ways are to search for these data in access log, error log, custom log files of web server, proxy server log file, web browser log, browser cookies etc. A web server log is in its default form known as a Common Log File (W3C, 1995) and keeps information about IP address; date and time of visit; ac-cessed and referenced resource. There are standardized methodologies which contain several steps leading to extract new knowledge from provided data. Usu-ally, the first step is in each one of them to identify users, users’ sessions, page views, and clickstreams. This process is called pre-processing. Main goal of this stage is to receive unprocessed web server log file as input and after processing outputs meaningful representations which can be used in next phase. In this pa-per, we describe in detail user session identification which can be considered as most important part of data pre-processing. Our paper aims to compare the us-er/session identification using the STT with the identification of user/session us-ing cookies. This comparison was performed concerning the quality of the se-quential rules generated, i.e., a comparison was made regarding generation useful, trivial and inexplicable rules.


2009 ◽  
Vol 43 (1) ◽  
pp. 203-205 ◽  
Author(s):  
Chetan Kumar ◽  
K. Sekar

The identification of sequence (amino acids or nucleotides) motifs in a particular order in biological sequences has proved to be of interest. This paper describes a computing server,SSMBS, which can locate and display the occurrences of user-defined biologically important sequence motifs (a maximum of five) present in a specific order in protein and nucleotide sequences. While the server can efficiently locate motifs specified using regular expressions, it can also find occurrences of long and complex motifs. The computation is carried out by an algorithm developed using the concepts of quantifiers in regular expressions. The web server is available to users around the clock at http://dicsoft1.physics.iisc.ernet.in/ssmbs/.


Sign in / Sign up

Export Citation Format

Share Document