Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "7571d962-001f-4416-90aa-11be070ea43c"}, "_deposit": {"id": "3587", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3587"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3587", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Audio Steganography based on Bit Modification", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Steganography is the technique of hiding confidential information within any media. Embedding convert audio message in cover speech utterances for secure communication is considered. Information embedding by bit modification of host samples is a widespread method in audio message embedding. For addition of security, the convert audio message is represented in compressed form with possibly encryption and/or encoding. To embed the information, one significant bit in each samples of a given cover utterance is modified with the data bits and a key. At the receiving side, the same key is applied to retrieve the embedded message. To study the usefulness of the proposed method, the experiments are carried out with clean utterances including speech signals from TIMIT databases as cover signals and a variety of convert messages."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-25"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "Audio Steganography based on Bit Modification.pdf", "filesize": [{"value": "6 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 6000.0, "url": {"url": "https://meral.edu.mm/record/3587/files/Audio Steganography based on Bit Modification.pdf"}, "version_id": "4c787667-49f9-4693-bb78-87ac1ad0445c"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Sixth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Soe, Thinzar"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2011-12-29"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1323"}, "item_title": "Audio Steganography based on Bit Modification", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003587", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-25"}, "publish_date": "2019-07-25", "publish_status": "0", "recid": "3587", "relation": {}, "relation_version_is_last": true, "title": ["Audio Steganography based on Bit Modification"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Audio Steganography based on Bit Modification

http://hdl.handle.net/20.500.12678/0000003587
http://hdl.handle.net/20.500.12678/0000003587
cdef0ae8-21ab-4592-8df3-fee87ebf232c
7571d962-001f-4416-90aa-11be070ea43c
None
Preview
Name / File License Actions
Audio Audio Steganography based on Bit Modification.pdf (6 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 13:10:55.138686
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL