{"created":"2020-09-01T10:05:19.121165+00:00","id":3400,"links":{},"metadata":{"_buckets":{"deposit":"3c51b893-e643-41ba-9afe-419842d4fea2"},"_deposit":{"id":"3400","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3400"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3400","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Customized and Secure Image Steganography through Least Significant Bit Replacement","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Steganography is the process of hiding a secret message within a larger one in such a way that someone can not know the presence or contents of hidden message. The purpose of Steganography is to maintain secret communication between two parties. The basic structure of Steganography is made up of three components: the “carrier”, the message, and the key. The carrier can be a painting, a digital image, an mp3 and even a TCP/IP packet among other things. It is the object that will „carry‟ hidden message. A key is used to decode/decipher/discover hidden message. This can be anything from a password, a pattern, a black-light, or even lemon juice. This system presents how Steganography is used in a modern context while a practical understanding of what Steganography is providing how to accomplish it. This paper describes the design of a data hiding structure using Steganography. In this paper, we focus on the use of Steganography within digital images using Least Significant Bit (LSB) substitution."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"Steganography"},{"interim":"LSB"},{"interim":"stego"},{"interim":"stegano"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-22"}],"displaytype":"preview","filename":"psc2010paper (216).pdf","filesize":[{"value":"399 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3400/files/psc2010paper (216).pdf"},"version_id":"bdc7cccc-464c-4e06-b27f-d1f82e2661ff"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Fifth Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Latt, Kyaw Zin"},{"subitem_authors_fullname":"Ko, Lin Min"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2010-12-16"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1155"},"item_title":"Customized and Secure Image Steganography through Least Significant Bit Replacement","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-22","publish_status":"0","recid":"3400","relation_version_is_last":true,"title":["Customized and Secure Image Steganography through Least Significant Bit Replacement"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T00:48:43.589440+00:00"}