MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "ebc1c7b9-a37c-4d98-8416-cf7909db5034"}, "_deposit": {"id": "3429", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3429"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3429", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Embedding Algorithm for Data Hiding using Steganographic Technique by File Hybridization", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "The Internet as a whole does not use secure links, thus information in transit may be susceptible to interception as well. The important of reducing a chance of the information being detected during the transmission is being an issue now days. Some solution to be discussed is how to passing information in a manner that the very existence of the message is unknown in order to repel attention of the potential attacker. Besides hiding data for confidentiality, this approach of information hiding can be extended to copyright protection for digital media. In this paper, clarify what steganography is, the definition, the importance as well as the technique used in implementing steganography. It focuses on the Least Significant Bit (LSB) technique in hiding messages in an image. In this system discussed a new steganographic technique based on the file hybridization. In contrast to other methods of steganography where data embedding in image work on the principle of only one image file, the proposed method works on more than one image. The effectiveness of the proposed method is described pictorially and also has been shown that a multi-level of security of data can be achieved."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-22"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "psc2010paper (232).pdf", "filesize": [{"value": "362 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 362000.0, "url": {"url": "https://meral.edu.mm/record/3429/files/psc2010paper (232).pdf"}, "version_id": "8f8ed557-3fe2-407e-922f-352590bfccf6"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Soe, Akari Myint"}, {"subitem_authors_fullname": "Cho, Zarli"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2010-12-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1181"}, "item_title": "Embedding Algorithm for Data Hiding using Steganographic Technique by File Hybridization", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003429", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-22"}, "publish_date": "2019-07-22", "publish_status": "0", "recid": "3429", "relation": {}, "relation_version_is_last": true, "title": ["Embedding Algorithm for Data Hiding using Steganographic Technique by File Hybridization"], "weko_shared_id": -1}
Embedding Algorithm for Data Hiding using Steganographic Technique by File Hybridization
http://hdl.handle.net/20.500.12678/0000003429
http://hdl.handle.net/20.500.12678/000000342978c6ec2c-69f8-4839-96d7-c1c3de7b7527
ebc1c7b9-a37c-4d98-8416-cf7909db5034
Name / File | License | Actions |
---|---|---|
psc2010paper (232).pdf (362 Kb)
|
|