Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "b1ecdb69-4674-4bc6-a7ad-bb43a13ab0e0"}, "_deposit": {"id": "3479", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3479"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3479", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Secure Data Hiding in Digital Image using LSB Technique", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Nowadays, digital communication has become an essential part of infrastructure, a lot of applications are Internet-based and in some cases it is desired that communication be made secret. In a digital world, steganography is intended to protect information by hiding a message in a way detected from unwanted parties. This system uses a secret key stego graphic technique for hiding messages. They are embedded by using digital images by LSB Least Significant Bit method. In steganography, LSB techniques are commonly used to embed the information in the cover media. In this system, Stego1bit LSB technique is applied to have the quality of stego image close enough to original image. Linear Congruential Generator (LCG) is used to generate pseudo random numbers for secret key. The digital images are applied as cover media in this system. In typical, the size of cover image need to be large enough for hidden messages. Receiver can extract the original messages from the stego image with the secret key. This system can provide security for hiding information with stego graphic technique."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "steganography"}, {"interim": "secret key stego"}, {"interim": "LSB method"}, {"interim": "stego image"}, {"interim": "LCG"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-23"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "psc2010paper (28).pdf", "filesize": [{"value": "182 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 182000.0, "url": {"url": "https://meral.edu.mm/record/3479/files/psc2010paper (28).pdf"}, "version_id": "07bc7143-e004-47a6-9572-e5f8afb0d080"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifth  Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Than, Shwe Sin Myat"}, {"subitem_authors_fullname": "Aye, Zin May"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2010-12-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1225"}, "item_title": "Secure Data Hiding in Digital Image using LSB Technique", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003479", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-23"}, "publish_date": "2019-07-23", "publish_status": "0", "recid": "3479", "relation": {}, "relation_version_is_last": true, "title": ["Secure Data Hiding in Digital Image using LSB Technique"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Secure Data Hiding in Digital Image using LSB Technique

http://hdl.handle.net/20.500.12678/0000003479
http://hdl.handle.net/20.500.12678/0000003479
344eaece-a943-4fe3-9a9b-06929889f2fe
b1ecdb69-4674-4bc6-a7ad-bb43a13ab0e0
None
Preview
Name / File License Actions
psc2010paper psc2010paper (28).pdf (182 Kb)
Publication type
Article
Upload type
Publication
Title
Title Secure Data Hiding in Digital Image using LSB Technique
Language en
Publication date 2010-12-16
Authors
Than, Shwe Sin Myat
Aye, Zin May
Description
Nowadays, digital communication has become an essential part of infrastructure, a lot of applications are Internet-based and in some cases it is desired that communication be made secret. In a digital world, steganography is intended to protect information by hiding a message in a way detected from unwanted parties. This system uses a secret key stego graphic technique for hiding messages. They are embedded by using digital images by LSB Least Significant Bit method. In steganography, LSB techniques are commonly used to embed the information in the cover media. In this system, Stego1bit LSB technique is applied to have the quality of stego image close enough to original image. Linear Congruential Generator (LCG) is used to generate pseudo random numbers for secret key. The digital images are applied as cover media in this system. In typical, the size of cover image need to be large enough for hidden messages. Receiver can extract the original messages from the stego image with the secret key. This system can provide security for hiding information with stego graphic technique.
Keywords
steganography, secret key stego, LSB method, stego image, LCG
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/1225
Journal articles
Fifth Local Conference on Parallel and Soft Computing
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 13:01:04.055707
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL