English  |  正體中文  |  简体中文  |  Items with full text/Total items : 94286/110023 (86%)
Visitors : 21709656      Online Users : 263
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    ASIA unversity > 資訊學院 > 會議論文 >  Item 310904400/5960


    Please use this identifier to cite or link to this item: http://asiair.asia.edu.tw/ir/handle/310904400/5960


    Title: Data Hiding in Emails and Applications by Unused ASCII Control Codes
    Authors: Shi Lee;Wen-Hsiang Tsai
    Contributors: Dept. of Computer Science, National Chiao Tung University;Dept. of Computer Science and Information Engineering, Asia University
    Date: 2007-12-20
    Issue Date: 2009-12-15
    Publisher: 亞洲大學資訊學院;中華電腦學會
    Abstract: A new technique for data hiding in emails via Outlook Express and IE is proposed. Secret data are encoded by special ASCII control codes and embed-ded into cover emails by inserting the data into email text line ends. These special codes were found out by a systematic test of all the ASCII codes on various email server software systems and standards. They are invisible to the user when displayed, achieving the effect of steganography. The proposed data en-coding technique is a combination of five coding rules found in this study. The inserted codes will not change the meanings of the sentences in the cover email, neither causing any noticeable difference to the reader. Furthermore, hidden data can be extracted from a stego-email completely to recover the original email text content. Also described are two applica-tions of the proposed data hiding technique, namely, covert communication via emails and authentication of emails. In the former application, security is en-hanced by the use of a secret key, and in the latter, an authentication signal is generated from the cover email for email fidelity checking. Good experimental results show the feasibility of the proposed method.
    Relation: 2007NCS全國計算機會議 12-20~21
    Appears in Collections:[資訊學院] 會議論文

    Files in This Item:

    There are no files associated with this item.



    All items in ASIAIR are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback