MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "b1ecdb69-4674-4bc6-a7ad-bb43a13ab0e0"}, "_deposit": {"id": "3479", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3479"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3479", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Secure Data Hiding in Digital Image using LSB Technique", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Nowadays, digital communication has become an essential part of infrastructure, a lot of applications are Internet-based and in some cases it is desired that communication be made secret. In a digital world, steganography is intended to protect information by hiding a message in a way detected from unwanted parties. This system uses a secret key stego graphic technique for hiding messages. They are embedded by using digital images by LSB Least Significant Bit method. In steganography, LSB techniques are commonly used to embed the information in the cover media. In this system, Stego1bit LSB technique is applied to have the quality of stego image close enough to original image. Linear Congruential Generator (LCG) is used to generate pseudo random numbers for secret key. The digital images are applied as cover media in this system. In typical, the size of cover image need to be large enough for hidden messages. Receiver can extract the original messages from the stego image with the secret key. This system can provide security for hiding information with stego graphic technique."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "steganography"}, {"interim": "secret key stego"}, {"interim": "LSB method"}, {"interim": "stego image"}, {"interim": "LCG"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-23"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "psc2010paper (28).pdf", "filesize": [{"value": "182 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 182000.0, "url": {"url": "https://meral.edu.mm/record/3479/files/psc2010paper (28).pdf"}, "version_id": "07bc7143-e004-47a6-9572-e5f8afb0d080"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Than, Shwe Sin Myat"}, {"subitem_authors_fullname": "Aye, Zin May"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2010-12-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1225"}, "item_title": "Secure Data Hiding in Digital Image using LSB Technique", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003479", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-23"}, "publish_date": "2019-07-23", "publish_status": "0", "recid": "3479", "relation": {}, "relation_version_is_last": true, "title": ["Secure Data Hiding in Digital Image using LSB Technique"], "weko_shared_id": -1}
Secure Data Hiding in Digital Image using LSB Technique
http://hdl.handle.net/20.500.12678/0000003479
http://hdl.handle.net/20.500.12678/0000003479344eaece-a943-4fe3-9a9b-06929889f2fe
b1ecdb69-4674-4bc6-a7ad-bb43a13ab0e0
Name / File | License | Actions |
---|---|---|
psc2010paper (28).pdf (182 Kb)
|
|
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Secure Data Hiding in Digital Image using LSB Technique | |||||
Language | en | |||||
Publication date | 2010-12-16 | |||||
Authors | ||||||
Than, Shwe Sin Myat | ||||||
Aye, Zin May | ||||||
Description | ||||||
Nowadays, digital communication has become an essential part of infrastructure, a lot of applications are Internet-based and in some cases it is desired that communication be made secret. In a digital world, steganography is intended to protect information by hiding a message in a way detected from unwanted parties. This system uses a secret key stego graphic technique for hiding messages. They are embedded by using digital images by LSB Least Significant Bit method. In steganography, LSB techniques are commonly used to embed the information in the cover media. In this system, Stego1bit LSB technique is applied to have the quality of stego image close enough to original image. Linear Congruential Generator (LCG) is used to generate pseudo random numbers for secret key. The digital images are applied as cover media in this system. In typical, the size of cover image need to be large enough for hidden messages. Receiver can extract the original messages from the stego image with the secret key. This system can provide security for hiding information with stego graphic technique. | ||||||
Keywords | ||||||
steganography, secret key stego, LSB method, stego image, LCG | ||||||
Identifier | http://onlineresource.ucsy.edu.mm/handle/123456789/1225 | |||||
Journal articles | ||||||
Fifth Local Conference on Parallel and Soft Computing | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |