May Htet - Academia.edu (original) (raw)

Papers by May Htet

Research paper thumbnail of Extended Pollard's Rho Factorization Algorithm for Finding Factors in Composite Number

Research paper thumbnail of Data Hiding in Image Using Modified Minimum Reference Pixel-Based Steganographic Method with Random Pixel Block Selection Algorithm

Research paper thumbnail of A New Embedding Algorithm for Data Security

Nowadays, due to the incredible advance in information and communication technology, security of ... more Nowadays, due to the incredible advance in information and communication technology, security of information transferring through communication channel becomes a major concern. Cryptography and steganography are essential tools for information security. Therefore, in order to achieve more robust security system, this paper focuses on combination usage of cryptographic system and text steganographic technique. Traditionally, all of the steganographic techniques have limited information-hiding capacity. For this reason, this paper proposes a new embedding algorithm to hide a larger amount of secret text in cover text without degrading in the content of the cover. In addition, to enhance the security of secret message, it has been scrambled first through RC5 encryption algorithm before concealing into an innocuous cover text. The basic idea behind this paper is to provide a good, new efficient embedding method for hiding the data in text from hackers and sent to the receiver in a safer...

Research paper thumbnail of Information Security System Based on English and Myanmar Text Steganography

American Scientific Research Journal for Engineering, Technology, and Sciences, 2016

Due to the growth in frequent exchange of digital data over public channel, information security ... more Due to the growth in frequent exchange of digital data over public channel, information security plays an important role in daily part of communication. Hence, various techniques like steganography are applied in information security area for more efficient information security system. This paper proposes two new text steganographic approaches using two different languages which are based on Unicode standard for secure data transfer over the public channel. The main aim is to overcome the limited embedding capacity, suspiciousness, and data damaging effect due to modification of existing steganographic approaches. The first approach conceals a message, without degrading the cover, by using four specific characters of words of the English cover text. The second approach performs message hiding by using the three specific groups of characters of combined words in Myanmar cover text while maintaining the content of the cover. The structure and operation of the proposed approaches based...

Research paper thumbnail of Student Data Analysis System Using Artificial Neural Network and Fuzzy Inference System

Nowadays, the study on student data has been becoming more and more interesting and astonishing m... more Nowadays, the study on student data has been becoming more and more interesting and astonishing methodologies arose to address its wonder. This paper explores the conventional data mining models such as ‘Vanilla’ artificial neural network and fuzzy inference system ─ also, principal component analysis (PCA) for feature classes ─ and proposes a particular model for an available dataset. The principal components deliver the untold correlations between subjective and objective aspects of the data, and raise the feasibility for deep learning algorithm. Meanwhile, a simple fuzzy inference system is needed to express the linguistic variability of the principal components which are also fuzzy input parameters: objective aspect such as grades and extra-curricular activities, and subjective aspect, for instance, parents’ education and jobs. The system is implemented in Python 3.x with functional dependencies being Numpy, Pickle, Pandas, sklearn and seaborn.

Research paper thumbnail of Secure Data Hiding in Text File Using Proposed Text Steganographic Approach

Data hiding technique, so called Steganography, is one of the popular approaches used in data sec... more Data hiding technique, so called Steganography, is one of the popular approaches used in data security as it can even protect the presence of data on public channels by obscuring it inside some carrier files such as text, image, audio, and video. Often, text files are the most preferable medium for its faster communication and less memory usage. However, storing large amount of data in text file is more noticeable to adversaries due to less redundant data in a text file to replace with secret data. Hence, there is a tradeoff between security and data hiding capacity in text steganography. The main idea of this paper is to propose a new text steganographic approach with the purpose of providing high embedding capacity while maintaining the security by generating identical stego text to the original cover text and position file after embedding process. Since all the rest of security depends on the generated position file, it has been converted to unreadable format by using RC6 encrypt...

Research paper thumbnail of A Secure Used Car Trading System based on Blockchain Technology

Proceedings of the 21st International Conference on Information Integration and Web-based Applications & Services, 2019

Although Myanmar's car import policy led shocks in the automotive market due to the Policy ch... more Although Myanmar's car import policy led shocks in the automotive market due to the Policy changes to import left-hand drive (new car), many consumers in Myanmar still more desire using second-hand cars. Car history is essential in the used car market which is a popular business in Myanmar. Online car trading requires a reliable supplier which may grantee the integrity of car grading. This problem can be solved by using a pure decentralized mechanism called blockchain which has become a hot research area to achieve an open and safe environment. In this paper, the system is aimed to develop a blockchain-based car trading system that can speed up the verification of car information and currency transfers. Besides the proposed car trading system is not only reliable but also protects from the 51% attacks even if 51% of car owners, insurance companies and repair services in this cooperation are simultaneously compromised.

Research paper thumbnail of Prevention of Man-In-The-Middle Attack in Diffie-Hellman Key Exchange Algorithm using Proposed Hash Function

International Journal of Advances in Scientific Research and Engineering, 2019

The key exchange process is a very important feature for many parts in cryptography. In data encr... more The key exchange process is a very important feature for many parts in cryptography. In data encryption, symmetric encryption techniques need to share the same secret key securely between two parties before encryption and this is a challenging task for secure data transmission. Most symmetric key encryptions and key management systems widely use Diffie-Hellman Key Exchange (DHKE) algorithm for the purpose of key distribution because it has simple computation and supports forward security. However, there is no key authentication and Man-In-The-Middle (MITM) attack has occurred during the key generation process. To overcome this problem, a new hash function is proposed to get the public key integrity during the public key sharing process of DHKE algorithm. This hash function is created by using six bitwise operators and operated in a variable length of the rounds depending on message length. Thus, the proposed system improves the security of DHKE and grantees the user authentication requirements.

Research paper thumbnail of A Novel Text Steganographic Technique Using Specific Alphabets

Journal of Computer Science, 2016

In today’s electronic era, wealth of electronic information are accessing over the Internet. Seve... more In today’s electronic era, wealth of electronic information are accessing over the Internet. Several important information and private data transferring over the Internet are being hacked by attackers via latest communication technology. So, maintaining the security of secret data has been a great challenge. To tackle the security problem, cryptographic methods as well as steganographic techniques are essential. This paper focuses on hybrid security system using cryptographic algorithm and text steganographic technique to achieve a more robust security system. In this work, to overcome the limited data hiding capacity, suspiciousness, and data damaging effect due to modification, of traditional steganographic techniques, a new technique for information hiding in text file is proposed. The proposed approach conceals a message, without degrading cover, by using first, second, second last, and last letter of words of the cover text. Hence, from the embedding capacity point of view, its...

Research paper thumbnail of Blockchain based Digital Identity Management System: A Case Study of Myanmar

2020 International Conference on Advanced Information Technologies (ICAIT)

Although Blockchain technology is formerly invented for digital currencies such as Bitcoin, its a... more Although Blockchain technology is formerly invented for digital currencies such as Bitcoin, its applications have extended into such areas as fair voting, healthcare, banking, and digital identity. A blockchain ‘s data is cryptographically connected and distributed across multiple computers, making them nearly impossible to temper with. Hence, this paper considers the possible use of introducing blockchain technology for digital identity management system for the issue of digital identity (passport) in Myanmar. Through blockchain technology, all the passport offices in Myanmar will be connected to each other in decentralized environment and enough passport information of a person can be securely shared within peers. Therefore, the proposed system can hinder the illegal duplication of passports (different types) since a valid passport can be issued only once to a person (except passport loss, renewal and expired) and it is impossible for a person to apply more than one passport type in the decentralized system. In addition, in the proposed system, the authenticity of passport can also be verified after granting permission for international travel. Therefore, the proposed system can be effectively applied for the passport offices in Myanmar for verifying the passport application and its data authentication.

Research paper thumbnail of Extended Pollard's Rho Factorization Algorithm for Finding Factors in Composite Number

Research paper thumbnail of Data Hiding in Image Using Modified Minimum Reference Pixel-Based Steganographic Method with Random Pixel Block Selection Algorithm

Research paper thumbnail of A New Embedding Algorithm for Data Security

Nowadays, due to the incredible advance in information and communication technology, security of ... more Nowadays, due to the incredible advance in information and communication technology, security of information transferring through communication channel becomes a major concern. Cryptography and steganography are essential tools for information security. Therefore, in order to achieve more robust security system, this paper focuses on combination usage of cryptographic system and text steganographic technique. Traditionally, all of the steganographic techniques have limited information-hiding capacity. For this reason, this paper proposes a new embedding algorithm to hide a larger amount of secret text in cover text without degrading in the content of the cover. In addition, to enhance the security of secret message, it has been scrambled first through RC5 encryption algorithm before concealing into an innocuous cover text. The basic idea behind this paper is to provide a good, new efficient embedding method for hiding the data in text from hackers and sent to the receiver in a safer...

Research paper thumbnail of Information Security System Based on English and Myanmar Text Steganography

American Scientific Research Journal for Engineering, Technology, and Sciences, 2016

Due to the growth in frequent exchange of digital data over public channel, information security ... more Due to the growth in frequent exchange of digital data over public channel, information security plays an important role in daily part of communication. Hence, various techniques like steganography are applied in information security area for more efficient information security system. This paper proposes two new text steganographic approaches using two different languages which are based on Unicode standard for secure data transfer over the public channel. The main aim is to overcome the limited embedding capacity, suspiciousness, and data damaging effect due to modification of existing steganographic approaches. The first approach conceals a message, without degrading the cover, by using four specific characters of words of the English cover text. The second approach performs message hiding by using the three specific groups of characters of combined words in Myanmar cover text while maintaining the content of the cover. The structure and operation of the proposed approaches based...

Research paper thumbnail of Student Data Analysis System Using Artificial Neural Network and Fuzzy Inference System

Nowadays, the study on student data has been becoming more and more interesting and astonishing m... more Nowadays, the study on student data has been becoming more and more interesting and astonishing methodologies arose to address its wonder. This paper explores the conventional data mining models such as ‘Vanilla’ artificial neural network and fuzzy inference system ─ also, principal component analysis (PCA) for feature classes ─ and proposes a particular model for an available dataset. The principal components deliver the untold correlations between subjective and objective aspects of the data, and raise the feasibility for deep learning algorithm. Meanwhile, a simple fuzzy inference system is needed to express the linguistic variability of the principal components which are also fuzzy input parameters: objective aspect such as grades and extra-curricular activities, and subjective aspect, for instance, parents’ education and jobs. The system is implemented in Python 3.x with functional dependencies being Numpy, Pickle, Pandas, sklearn and seaborn.

Research paper thumbnail of Secure Data Hiding in Text File Using Proposed Text Steganographic Approach

Data hiding technique, so called Steganography, is one of the popular approaches used in data sec... more Data hiding technique, so called Steganography, is one of the popular approaches used in data security as it can even protect the presence of data on public channels by obscuring it inside some carrier files such as text, image, audio, and video. Often, text files are the most preferable medium for its faster communication and less memory usage. However, storing large amount of data in text file is more noticeable to adversaries due to less redundant data in a text file to replace with secret data. Hence, there is a tradeoff between security and data hiding capacity in text steganography. The main idea of this paper is to propose a new text steganographic approach with the purpose of providing high embedding capacity while maintaining the security by generating identical stego text to the original cover text and position file after embedding process. Since all the rest of security depends on the generated position file, it has been converted to unreadable format by using RC6 encrypt...

Research paper thumbnail of A Secure Used Car Trading System based on Blockchain Technology

Proceedings of the 21st International Conference on Information Integration and Web-based Applications & Services, 2019

Although Myanmar's car import policy led shocks in the automotive market due to the Policy ch... more Although Myanmar's car import policy led shocks in the automotive market due to the Policy changes to import left-hand drive (new car), many consumers in Myanmar still more desire using second-hand cars. Car history is essential in the used car market which is a popular business in Myanmar. Online car trading requires a reliable supplier which may grantee the integrity of car grading. This problem can be solved by using a pure decentralized mechanism called blockchain which has become a hot research area to achieve an open and safe environment. In this paper, the system is aimed to develop a blockchain-based car trading system that can speed up the verification of car information and currency transfers. Besides the proposed car trading system is not only reliable but also protects from the 51% attacks even if 51% of car owners, insurance companies and repair services in this cooperation are simultaneously compromised.

Research paper thumbnail of Prevention of Man-In-The-Middle Attack in Diffie-Hellman Key Exchange Algorithm using Proposed Hash Function

International Journal of Advances in Scientific Research and Engineering, 2019

The key exchange process is a very important feature for many parts in cryptography. In data encr... more The key exchange process is a very important feature for many parts in cryptography. In data encryption, symmetric encryption techniques need to share the same secret key securely between two parties before encryption and this is a challenging task for secure data transmission. Most symmetric key encryptions and key management systems widely use Diffie-Hellman Key Exchange (DHKE) algorithm for the purpose of key distribution because it has simple computation and supports forward security. However, there is no key authentication and Man-In-The-Middle (MITM) attack has occurred during the key generation process. To overcome this problem, a new hash function is proposed to get the public key integrity during the public key sharing process of DHKE algorithm. This hash function is created by using six bitwise operators and operated in a variable length of the rounds depending on message length. Thus, the proposed system improves the security of DHKE and grantees the user authentication requirements.

Research paper thumbnail of A Novel Text Steganographic Technique Using Specific Alphabets

Journal of Computer Science, 2016

In today’s electronic era, wealth of electronic information are accessing over the Internet. Seve... more In today’s electronic era, wealth of electronic information are accessing over the Internet. Several important information and private data transferring over the Internet are being hacked by attackers via latest communication technology. So, maintaining the security of secret data has been a great challenge. To tackle the security problem, cryptographic methods as well as steganographic techniques are essential. This paper focuses on hybrid security system using cryptographic algorithm and text steganographic technique to achieve a more robust security system. In this work, to overcome the limited data hiding capacity, suspiciousness, and data damaging effect due to modification, of traditional steganographic techniques, a new technique for information hiding in text file is proposed. The proposed approach conceals a message, without degrading cover, by using first, second, second last, and last letter of words of the cover text. Hence, from the embedding capacity point of view, its...

Research paper thumbnail of Blockchain based Digital Identity Management System: A Case Study of Myanmar

2020 International Conference on Advanced Information Technologies (ICAIT)

Although Blockchain technology is formerly invented for digital currencies such as Bitcoin, its a... more Although Blockchain technology is formerly invented for digital currencies such as Bitcoin, its applications have extended into such areas as fair voting, healthcare, banking, and digital identity. A blockchain ‘s data is cryptographically connected and distributed across multiple computers, making them nearly impossible to temper with. Hence, this paper considers the possible use of introducing blockchain technology for digital identity management system for the issue of digital identity (passport) in Myanmar. Through blockchain technology, all the passport offices in Myanmar will be connected to each other in decentralized environment and enough passport information of a person can be securely shared within peers. Therefore, the proposed system can hinder the illegal duplication of passports (different types) since a valid passport can be issued only once to a person (except passport loss, renewal and expired) and it is impossible for a person to apply more than one passport type in the decentralized system. In addition, in the proposed system, the authenticity of passport can also be verified after granting permission for international travel. Therefore, the proposed system can be effectively applied for the passport offices in Myanmar for verifying the passport application and its data authentication.