MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "3c51b893-e643-41ba-9afe-419842d4fea2"}, "_deposit": {"id": "3400", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3400"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3400", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Customized and Secure Image Steganography through Least Significant Bit Replacement", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Steganography is the process of hiding a secret message within a larger one in such a way that someone can not know the presence or contents of hidden message. The purpose of Steganography is to maintain secret communication between two parties. The basic structure of Steganography is made up of three components: the “carrier”, the message, and the key. The carrier can be a painting, a digital image, an mp3 and even a TCP/IP packet among other things. It is the object that will „carry‟ hidden message. A key is used to decode/decipher/discover hidden message. This can be anything from a password, a pattern, a black-light, or even lemon juice. This system presents how Steganography is used in a modern context while a practical understanding of what Steganography is providing how to accomplish it. This paper describes the design of a data hiding structure using Steganography. In this paper, we focus on the use of Steganography within digital images using Least Significant Bit (LSB) substitution."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Steganography"}, {"interim": "LSB"}, {"interim": "stego"}, {"interim": "stegano"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-22"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "psc2010paper (216).pdf", "filesize": [{"value": "399 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 399000.0, "url": {"url": "https://meral.edu.mm/record/3400/files/psc2010paper (216).pdf"}, "version_id": "bdc7cccc-464c-4e06-b27f-d1f82e2661ff"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Latt, Kyaw Zin"}, {"subitem_authors_fullname": "Ko, Lin Min"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2010-12-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1155"}, "item_title": "Customized and Secure Image Steganography through Least Significant Bit Replacement", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003400", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-22"}, "publish_date": "2019-07-22", "publish_status": "0", "recid": "3400", "relation": {}, "relation_version_is_last": true, "title": ["Customized and Secure Image Steganography through Least Significant Bit Replacement"], "weko_shared_id": -1}
Customized and Secure Image Steganography through Least Significant Bit Replacement
http://hdl.handle.net/20.500.12678/0000003400
http://hdl.handle.net/20.500.12678/00000034007af55067-47d0-40c9-be23-389901b99e3b
3c51b893-e643-41ba-9afe-419842d4fea2
Name / File | License | Actions |
---|---|---|
![]() |
|
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Customized and Secure Image Steganography through Least Significant Bit Replacement | |||||
Language | en | |||||
Publication date | 2010-12-16 | |||||
Authors | ||||||
Latt, Kyaw Zin | ||||||
Ko, Lin Min | ||||||
Description | ||||||
Steganography is the process of hiding a secret message within a larger one in such a way that someone can not know the presence or contents of hidden message. The purpose of Steganography is to maintain secret communication between two parties. The basic structure of Steganography is made up of three components: the “carrier”, the message, and the key. The carrier can be a painting, a digital image, an mp3 and even a TCP/IP packet among other things. It is the object that will „carry‟ hidden message. A key is used to decode/decipher/discover hidden message. This can be anything from a password, a pattern, a black-light, or even lemon juice. This system presents how Steganography is used in a modern context while a practical understanding of what Steganography is providing how to accomplish it. This paper describes the design of a data hiding structure using Steganography. In this paper, we focus on the use of Steganography within digital images using Least Significant Bit (LSB) substitution. | ||||||
Keywords | ||||||
Steganography, LSB, stego, stegano | ||||||
Identifier | http://onlineresource.ucsy.edu.mm/handle/123456789/1155 | |||||
Journal articles | ||||||
Fifth Local Conference on Parallel and Soft Computing | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |