Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "b5295d1c-7011-41f3-ae1f-7bca183ad9ea"}, "_deposit": {"id": "3344", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3344"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3344", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Message Concealment in Digital Image based on Steganography", "subitem_1551255648112": "es"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "With the development of computer and expandingits use in different areas of life and work, the issue ofinformation security has become increasinglyimportant. The art of sending and displaying thehidden information has received more attention andfaced many challenges. Digital steganographyexploits the use of a host data to hide a piece ofinformation in such a way that it is imperceptible toa human observer. Wavelet transform that mapintegers to integers allow perfect reconstruction ofthe original image. In this paper, the steganographytechniques are used to conceal the message in thedigital images. Hence, this system embeds themessage bitstream into the LSB\u0027s of the integerwavelet coefficients of a true-color image. And thissystem also applies the RSA algorithm to get moreauthentication and protecting content owner’s right.In this proposed system, the original and stegoimagesare difficult to segregate by the human eyes.The performance of the proposed system is evaluatedusing the peak signal to noise ratio (PSNR)."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Steganography"}, {"interim": "Integer Wavelet Transform (IWT)"}, {"interim": "RSA Cryptosystem"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-22"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "psc2010paper (168).pdf", "filesize": [{"value": "212 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 212000.0, "url": {"url": "https://meral.edu.mm/record/3344/files/psc2010paper (168).pdf"}, "version_id": "d4459367-f0b8-4ba2-a12e-b7c59c59ed89"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Zin, Moh Moh Myint"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2010-12-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1104"}, "item_title": "Message Concealment in Digital Image based on Steganography", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003344", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-22"}, "publish_date": "2019-07-22", "publish_status": "0", "recid": "3344", "relation": {}, "relation_version_is_last": true, "title": ["Message Concealment in Digital Image based on Steganography"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Message Concealment in Digital Image based on Steganography

http://hdl.handle.net/20.500.12678/0000003344
http://hdl.handle.net/20.500.12678/0000003344
01ef0e0d-2ef3-4c08-8986-a07e675683cc
b5295d1c-7011-41f3-ae1f-7bca183ad9ea
None
Preview
Name / File License Actions
psc2010paper psc2010paper (168).pdf (212 Kb)
Publication type
Article
Upload type
Publication
Title
Title Message Concealment in Digital Image based on Steganography
Language es
Publication date 2010-12-16
Authors
Zin, Moh Moh Myint
Description
With the development of computer and expandingits use in different areas of life and work, the issue ofinformation security has become increasinglyimportant. The art of sending and displaying thehidden information has received more attention andfaced many challenges. Digital steganographyexploits the use of a host data to hide a piece ofinformation in such a way that it is imperceptible toa human observer. Wavelet transform that mapintegers to integers allow perfect reconstruction ofthe original image. In this paper, the steganographytechniques are used to conceal the message in thedigital images. Hence, this system embeds themessage bitstream into the LSB's of the integerwavelet coefficients of a true-color image. And thissystem also applies the RSA algorithm to get moreauthentication and protecting content owner’s right.In this proposed system, the original and stegoimagesare difficult to segregate by the human eyes.The performance of the proposed system is evaluatedusing the peak signal to noise ratio (PSNR).
Keywords
Steganography, Integer Wavelet Transform (IWT), RSA Cryptosystem
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/1104
Journal articles
Fifth Local Conference on Parallel and Soft Computing
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 09:58:56.308733
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL