Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "12f41a08-9074-4d05-beba-227ea3aee47b"}, "_deposit": {"id": "3115", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3115"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3115", "sets": ["user-ytu"]}, "communities": ["ytu"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Performance Comparison of Proposed Embedding Method and Pixel  Mapping Method", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "\u003cp\u003eData hiding is one of the challenging issues in the\u003cbr\u003e\nfield of network security. Unlike cryptography, steganography\u003cbr\u003e\nis used to hide the existence of secret message by embedding\u003cbr\u003e\nthe\u0026nbsp; message\u0026nbsp; behind\u0026nbsp; any\u0026nbsp; cover\u0026nbsp; object\u0026nbsp; like\u0026nbsp; image,\u0026nbsp; text,\u0026nbsp; audio\u003cbr\u003e\nand video files. In many research areas, various information\u003cbr\u003e\nhiding\u0026nbsp; techniques\u0026nbsp; are\u0026nbsp; developed\u0026nbsp; in\u0026nbsp; order\u0026nbsp; to\u0026nbsp; meet\u0026nbsp; their\u003cbr\u003e\nsecurity requirements. This paper proposes a new embedding\u003cbr\u003e\nmethod by optimizing pixel mapping method (PMM) in order\u003cbr\u003e\nto obtain larger embedding capacity and produce stego image\u003cbr\u003e\nquality\u0026nbsp; with\u0026nbsp; minimum\u0026nbsp; degradation.\u0026nbsp; To\u0026nbsp; prove\u0026nbsp; the\u0026nbsp; better\u003cbr\u003e\nperformance\u0026nbsp; of\u0026nbsp; the\u0026nbsp; proposed\u0026nbsp; embedding\u0026nbsp; method,\u0026nbsp; the\u003cbr\u003e\ncomparison\u0026nbsp; analysis\u0026nbsp; between\u0026nbsp; proposed\u0026nbsp; embedding\u0026nbsp; method\u003cbr\u003e\nand PMM will be performed according to the values of Peak\u003cbr\u003e\nSignal to Noise Ratio (PSNR) and embedding capacity.\u003c/p\u003e"}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Data hiding"}, {"interim": "Steganography"}, {"interim": "Pixel mapping method (PMM)"}, {"interim": "Embedding capacity"}, {"interim": "PSNR"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-04"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "Performance Comparison of Proposed Embedding Method and Pixel Mapping Method.pdf", "filesize": [{"value": "294 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "mimetype": "application/pdf", "size": 294000.0, "url": {"url": "https://meral.edu.mm/record/3115/files/Performance Comparison of Proposed Embedding Method and Pixel Mapping Method.pdf"}, "version_id": "7e45a1e1-a2b8-4172-bd3f-2e8d48e320a7"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "ICSE", "subitem_c_date": "12-13 December, 2015", "subitem_conference_title": "International Conference on Science and Engineering", "subitem_part": "", "subitem_place": "Myanmar", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Su Mon Thu"}, {"subitem_authors_fullname": "Su Wai Phyo"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Conference paper"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2015-12-12"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "10.5281/zenodo.3268408"}, "item_title": "Performance Comparison of Proposed Embedding Method and Pixel  Mapping Method", "item_type_id": "21", "owner": "1", "path": ["1596119372420"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003115", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-04"}, "publish_date": "2019-07-04", "publish_status": "0", "recid": "3115", "relation": {}, "relation_version_is_last": true, "title": ["Performance Comparison of Proposed Embedding Method and Pixel  Mapping Method"], "weko_shared_id": -1}
  1. Yangon Technological University
  2. Department of Computer Engineering and Information Technology

Performance Comparison of Proposed Embedding Method and Pixel Mapping Method

http://hdl.handle.net/20.500.12678/0000003115
http://hdl.handle.net/20.500.12678/0000003115
6074e470-814d-4201-acf9-a776ad8a11d6
12f41a08-9074-4d05-beba-227ea3aee47b
None
Preview
Name / File License Actions
Performance Performance Comparison of Proposed Embedding Method and Pixel Mapping Method.pdf (294 Kb)
Publication type
Conference paper
Upload type
Publication
Title
Title Performance Comparison of Proposed Embedding Method and Pixel Mapping Method
Language en
Publication date 2015-12-12
Authors
Su Mon Thu
Su Wai Phyo
Description
<p>Data hiding is one of the challenging issues in the<br>
field of network security. Unlike cryptography, steganography<br>
is used to hide the existence of secret message by embedding<br>
the&nbsp; message&nbsp; behind&nbsp; any&nbsp; cover&nbsp; object&nbsp; like&nbsp; image,&nbsp; text,&nbsp; audio<br>
and video files. In many research areas, various information<br>
hiding&nbsp; techniques&nbsp; are&nbsp; developed&nbsp; in&nbsp; order&nbsp; to&nbsp; meet&nbsp; their<br>
security requirements. This paper proposes a new embedding<br>
method by optimizing pixel mapping method (PMM) in order<br>
to obtain larger embedding capacity and produce stego image<br>
quality&nbsp; with&nbsp; minimum&nbsp; degradation.&nbsp; To&nbsp; prove&nbsp; the&nbsp; better<br>
performance&nbsp; of&nbsp; the&nbsp; proposed&nbsp; embedding&nbsp; method,&nbsp; the<br>
comparison&nbsp; analysis&nbsp; between&nbsp; proposed&nbsp; embedding&nbsp; method<br>
and PMM will be performed according to the values of Peak<br>
Signal to Noise Ratio (PSNR) and embedding capacity.</p>
Keywords
Data hiding, Steganography, Pixel mapping method (PMM), Embedding capacity, PSNR
Identifier 10.5281/zenodo.3268408
Journal articles
Conference papers
ICSE
12-13 December, 2015
International Conference on Science and Engineering
Myanmar
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-08-30 13:56:17.653882
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL