Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "eb277939-2017-4d68-98e0-bcbf9f6851da"}, "_deposit": {"id": "3603", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3603"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3603", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Embedding the Secret Message in Audio File by Using TEA Cryptography and Steganography", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Steganography is the art of hidden information in other information when communication is taking place. Many different carrier file format can be used, but audio waves are the most difficult and more secure because audio file is not noticeable if the information is embedded. In the cryptography, the structure of a message is changed to meaningless and unintelligible unless the decryption key is available. Steganography does not alter the structure of the secret message, but hides it inside a cover. For hiding secret information in audio, different applications have different requirements of the steganography technique used. This paper will show data hiding in audio file by using the combination of the Steganographic algorithm and Cryptographic algorithm."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-25"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "Embedding the Secret Message in Audio File by Using TEA Cryptography and Steganography.pdf", "filesize": [{"value": "7 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 7000.0, "url": {"url": "https://meral.edu.mm/record/3603/files/Embedding the Secret Message in Audio File by Using TEA Cryptography and Steganography.pdf"}, "version_id": "c90cb066-af5a-448b-88e3-e71413308218"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Sixth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Thaung, Thein Than"}, {"subitem_authors_fullname": "Htike, Win Win"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2011-12-29"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1338"}, "item_title": "Embedding the Secret Message in Audio File by Using TEA Cryptography and Steganography", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003603", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-25"}, "publish_date": "2019-07-25", "publish_status": "0", "recid": "3603", "relation": {}, "relation_version_is_last": true, "title": ["Embedding the Secret Message in Audio File by Using TEA Cryptography and Steganography"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Embedding the Secret Message in Audio File by Using TEA Cryptography and Steganography

http://hdl.handle.net/20.500.12678/0000003603
http://hdl.handle.net/20.500.12678/0000003603
1270888e-6270-4745-b487-6287b8926f73
eb277939-2017-4d68-98e0-bcbf9f6851da
None
Preview
Name / File License Actions
Embedding Embedding the Secret Message in Audio File by Using TEA Cryptography and Steganography.pdf (7 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 13:11:50.138292
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL