{"created":"2020-09-01T13:01:01.196922+00:00","id":3479,"links":{},"metadata":{"_buckets":{"deposit":"b1ecdb69-4674-4bc6-a7ad-bb43a13ab0e0"},"_deposit":{"id":"3479","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3479"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3479","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Secure Data Hiding in Digital Image using LSB Technique","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Nowadays, digital communication has become an essential part of infrastructure, a lot of applications are Internet-based and in some cases it is desired that communication be made secret. In a digital world, steganography is intended to protect information by hiding a message in a way detected from unwanted parties. This system uses a secret key stego graphic technique for hiding messages. They are embedded by using digital images by LSB Least Significant Bit method. In steganography, LSB techniques are commonly used to embed the information in the cover media. In this system, Stego1bit LSB technique is applied to have the quality of stego image close enough to original image. Linear Congruential Generator (LCG) is used to generate pseudo random numbers for secret key. The digital images are applied as cover media in this system. In typical, the size of cover image need to be large enough for hidden messages. Receiver can extract the original messages from the stego image with the secret key. This system can provide security for hiding information with stego graphic technique."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"steganography"},{"interim":"secret key stego"},{"interim":"LSB method"},{"interim":"stego image"},{"interim":"LCG"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-23"}],"displaytype":"preview","filename":"psc2010paper (28).pdf","filesize":[{"value":"182 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3479/files/psc2010paper (28).pdf"},"version_id":"07bc7143-e004-47a6-9572-e5f8afb0d080"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Fifth Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Than, Shwe Sin Myat"},{"subitem_authors_fullname":"Aye, Zin May"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2010-12-16"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1225"},"item_title":"Secure Data Hiding in Digital Image using LSB Technique","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-23","publish_status":"0","recid":"3479","relation_version_is_last":true,"title":["Secure Data Hiding in Digital Image using LSB Technique"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T00:57:48.993743+00:00"}