Index Link

  • RootNode

Item

{"_buckets": {"deposit": "3c51b893-e643-41ba-9afe-419842d4fea2"}, "_deposit": {"id": "3400", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3400"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3400", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Customized and Secure Image Steganography through Least Significant Bit Replacement", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Steganography is the process of hiding a secret message within a larger one in such a way that someone can not know the presence or contents of hidden message. The purpose of Steganography is to maintain secret communication between two parties. The basic structure of Steganography is made up of three components: the “carrier”, the message, and the key. The carrier can be a painting, a digital image, an mp3 and even a TCP/IP packet among other things. It is the object that will „carry‟ hidden message. A key is used to decode/decipher/discover hidden message. This can be anything from a password, a pattern, a black-light, or even lemon juice. This system presents how Steganography is used in a modern context while a practical understanding of what Steganography is providing how to accomplish it. This paper describes the design of a data hiding structure using Steganography. In this paper, we focus on the use of Steganography within digital images using Least Significant Bit (LSB) substitution."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Steganography"}, {"interim": "LSB"}, {"interim": "stego"}, {"interim": "stegano"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-22"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "psc2010paper (216).pdf", "filesize": [{"value": "399 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 399000.0, "url": {"url": "https://meral.edu.mm/record/3400/files/psc2010paper (216).pdf"}, "version_id": "bdc7cccc-464c-4e06-b27f-d1f82e2661ff"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Latt, Kyaw Zin"}, {"subitem_authors_fullname": "Ko, Lin Min"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2010-12-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1155"}, "item_title": "Customized and Secure Image Steganography through Least Significant Bit Replacement", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003400", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-22"}, "publish_date": "2019-07-22", "publish_status": "0", "recid": "3400", "relation": {}, "relation_version_is_last": true, "title": ["Customized and Secure Image Steganography through Least Significant Bit Replacement"], "weko_shared_id": -1}

Customized and Secure Image Steganography through Least Significant Bit Replacement

http://hdl.handle.net/20.500.12678/0000003400
7af55067-47d0-40c9-be23-389901b99e3b
3c51b893-e643-41ba-9afe-419842d4fea2
None
Name / File License Actions
psc2010paper psc2010paper (216).pdf (399 Kb)
Publication type
Article
Upload type
Publication
Title
Title Customized and Secure Image Steganography through Least Significant Bit Replacement
Language en
Publication date 2010-12-16
Authors
Latt, Kyaw Zin
Ko, Lin Min
Description
Steganography is the process of hiding a secret message within a larger one in such a way that someone can not know the presence or contents of hidden message. The purpose of Steganography is to maintain secret communication between two parties. The basic structure of Steganography is made up of three components: the “carrier”, the message, and the key. The carrier can be a painting, a digital image, an mp3 and even a TCP/IP packet among other things. It is the object that will „carry‟ hidden message. A key is used to decode/decipher/discover hidden message. This can be anything from a password, a pattern, a black-light, or even lemon juice. This system presents how Steganography is used in a modern context while a practical understanding of what Steganography is providing how to accomplish it. This paper describes the design of a data hiding structure using Steganography. In this paper, we focus on the use of Steganography within digital images using Least Significant Bit (LSB) substitution.
Keywords
Steganography, LSB, stego, stegano
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/1155
Journal articles
Fifth Local Conference on Parallel and Soft Computing
Conference papers
Books/reports/chapters
Thesis/dissertations
0
0
views
downloads
Views Downloads

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats