Research on Information Hiding Based on XML Tag Attributes

2013 ◽  
Vol 846-847 ◽  
pp. 1668-1671
Author(s):  
Xiao Feng Wang

This paper introduces the current information hiding method based on XML, Analyzes their advantages and disadvantages. According to the characteristics which the change of XML document tag attributes order does not affect the document uses, I propose a more subtle and easier method to achieve information hiding. Experimental results show that: the method is correct, has strong concealment and robustness.

2013 ◽  
Vol 850-851 ◽  
pp. 483-486
Author(s):  
Xiao Feng Wang

This paper designs and implements an information hiding algorithms by using the equivalent characteristics of attributes and sub-elements in the XML document. Experimental results show that the algorithm has large information hiding capacity, better hiding features and robustness.


2021 ◽  
Vol 48 (4) ◽  
Author(s):  
Zainab N. Sultani ◽  
◽  
Ban N. Dhannoon ◽  

Hiding the presence of data during communication has become a pressing concern in this overly digitalized world as a consequence of illegitimate access. These concerns have led to cryptography and steganography techniques as methods for securing data. This paper presents a modified information hiding technique based on an indirect least significant bit. Instead of saving each bit of the secret message in the least significant bit (LSB) of the cover media, each bit of the secret message is compared to a mask bit in the cover media. The result is saved in the cover media’s LSB. In this paper, two steganography schemas are designed in which the cover media are image and audio, while the secret message is a text file. A simple encryption technique is used to transform the secret message into an unreadable format before the hiding process begins. The experimental results indicate that the proposed algorithm achieves promising performance


2011 ◽  
Vol 101-102 ◽  
pp. 60-66
Author(s):  
Yi Jui Chiu ◽  
Khai Shoon Leong ◽  
Luh Maan Chang

The purpose of this paper is to assess technologies used in the monitoring of nano-particles that are available commercially and under research. The goal of the assessment is to propose a new device based on the technologies assessed. The assessment is performed based on information obtained from literatures review of articles and brochures, and from communications with representatives of the manufacturers of the counters. Two types of nano-particles counters were assessed; counters that are currently commercially available are the condensation particle counter (CPC), the scanning mobility particle spectrometer (SMPS). A description of how each counter works is given, and the advantages and disadvantages are highlighted. Experimental results showed that the performance of capillary had been installed and cleaned. The SMPS mean diameter fell within the range of the NIST standard. The sample offered well distribution in 300 and 400 nm.


Author(s):  
Béatrice Bouchou ◽  
Denio Duarte ◽  
Mírian Halfeld Ferrari ◽  
Martin A. Musicante

The XML Messaging Protocol, a part of the Web service protocol stack, is responsible for encoding messages in a common XML format (or type), so that they can be understood at either end of a network connection. The evolution of an XML type may be required in order to reflect new communication needs, materialized by slightly different XML messages. For instance, due to a service evolution, it might be interesting to extend a type in order to allow the reception of more information, when it is available, instead of always disregarding it. The authors’ proposal consists in a conservative XML schema evolution. The framework is as follows: administrators enter updates performed on a valid XML document in order to specify new documents expected to be valid, and the system computes new types accepting both such documents and previously valid ones. Changing the type is mainly changing regular expressions that define element content models. They present the algorithm that implements this approach, its properties and experimental results.


2018 ◽  
Vol 2 (3) ◽  
Author(s):  
Rajalingam B ◽  
Priya R

Medical image fusion is one the most significant and useful disease analytic techniques. This research paper proposed and examines some of the hybrid multimodality medical image fusion methods and discusses the most essential advantages and disadvantages of these methods to develop hybrid multimodal image fusion algorithms that improve the feature of merged multimodality therapeutic image. Computed Tomography, Magnetic Resonance Imaging, Positron Emission Tomography and Single Photon Emission Computed Tomography are the input multimodal therapeutic images used for fusion process. An experimental results of proposed all hybrid fusion techniques provides the best fused multimodal medical images of highest quality, highest details, shortest processing time, and best visualization. Both traditional and hybrid multimodal medical image fusion algorithms are evaluated using several quality metrics. Compared with other existing techniques the proposed technique experimental results demonstrate the better processing performance and results in both subjective and objective evaluation criteria. This is favorable, especially for helping in accurate clinical disease analysis.


2014 ◽  
Author(s):  
Q.. Feng ◽  
S.. Li ◽  
Y.. Su ◽  
Y.. Liu ◽  
X.. Han

Abstract The existence of edge water has both advantages and disadvantages for the development of offshore heavy oil reservoir. On one hand, edge water invasion could supplement the reservoir pressure which is in favor of the oil production, while on the other hand, the asymmetrical invasion of the edge water could result in the quick increase of water cut for production wells and the consequent low oil recovery efficiency. For the purpose of better understanding edge water drive laws of offshore heavy oil reservoir and their effects on remaining oil distribution, several two dimensional visible physical models with different well-types, which are based on geological features and development characteristics of a certain offshore heavy oil reservoir in China, have been built to make the investigation. The experimental results are analyzed and shown as follows. Firstly, edge water mainly encroaches through areas with the maximum pressure gradient in homogeneous reservoir. But for heterogeneous reservoir, edge water would encroach through both high permeability section and areas with maximum pressure gradient. Meanwhile, compared with heterogeneous reservoir, there is more obvious water/oil front and higher reserve recovery degree in homogeneous reservoir under the same conditions. Secondly, the degree of reserve recovery obtained by double vertical wells is much higher than that obtained by single vertical well. So, increasing the number of production well is conducive to the improvement of reservoir recovery degree. Lastly, the recovery efficiency for horizontal well is much higher than that of the vertical well. In addition, Suizhong 36-1 Oilfield, an offshore heavy oil reservoir with edge water drive, has been numerical simulated. The simulated results of edge water drive laws are consistent with the experimental results, which could provide a useful guidance for the development of offshore heavy oil reservoir with edge-water drive.


1996 ◽  
Vol 07 (01) ◽  
pp. 125-151 ◽  
Author(s):  
K. I. KANG ◽  
I. GLESK ◽  
P. R. PRUCNAL

The operating principle of the utilization of resonant optical nonlinearities in recently demonstrated ultra-fast all-optical interferometric switching devices is presented. Optimum switching windows expected from these devices are investigated with a simple theoretical analysis. The experimental results of these devices are presented along with the nonlinear optical properties of a semiconductor optical amplifier. The information from the experimental results of the nonlinear optical properties are used to address a problem associated with a saturation of the semiconductor optical amplifier by an incoming ultra-high bit rate data stream. We also discuss the advantages and disadvantages in different operation modes — same or different wavelengths for the control and data signals. Finally, we discuss the relative advantages and disadvantages among these devices.


2013 ◽  
Vol 347-350 ◽  
pp. 3596-3599
Author(s):  
Lin Ping Feng ◽  
Yu Qiang Wu ◽  
Shuang Pan ◽  
Xi Bin Wang

For uninhabited flying vehicle, it is a key prerequisite of truly autonomous mobile vehicles to simultaneously localize and accurately map its surroundings. Kalman filter-based algorithms require time quadratic in the number of landmarks to incorporate each sensor observation. This paper presents an algorithm so called FastSLAM that recursively estimates the full posterior distribution over robot pose and landmark locations, but scales logarithmically with the number of landmarks in the map. FastSLAM factors the posterior into a product of conditional landmark distributions and a distribution over UAV paths. The algorithm has been tested in UAV environments. Experimental results demonstrate the advantages and disadvantages of the FastSLAM algorithm for UAV.


2013 ◽  
pp. 400-434
Author(s):  
Victor Pomponiu ◽  
Davide Cavagnino ◽  
Alessandro Basso ◽  
Annamaria Vernone

Information hiding techniques are acquiring an always increasing importance, due to the widespread diffusion of multimedia contents. Several schemes have been devised in the fields of steganography and digital watermarking, exploiting the properties of different domains. In this chapter, the authors focus on the SVD transform, with the aim of providing an exhaustive overview (more than 100 papers are analyzed) on those steganography and watermarking techniques leveraging on the important properties of such a transform. The large number of algorithms operating in the image, video and audio contexts is first classified by means of a general approach, then analyzed, to highlight the advantages and disadvantages of each method. The authors also give a detailed discussion about the applicability of each reviewed and compared data hiding scheme, in order to identify the most appropriate candidates for practical applications.


2012 ◽  
Vol 263-266 ◽  
pp. 1360-1363
Author(s):  
Da Jie Fu

XML has become one of the general data exchange formats in the current Web application programs, with a wide range of applications in e-commerce, e-books, mobile communications and other fields. XML data storage technology is the key technology for XML applications, and an effective XML data storage, retrieval and management mechanism is a strong driving force for the development of XML. At present, XML data storage technology is generally divided into two categories, which are storage technologies based on a file system and based on a database. In this paper, the technical characteristics of the two XML document storage modes have been discussed, and their advantages and disadvantages have also been analyzed and compared.


Sign in / Sign up

Export Citation Format

Share Document