{"created":"2020-09-01T13:11:49.231027+00:00","id":3603,"links":{},"metadata":{"_buckets":{"deposit":"eb277939-2017-4d68-98e0-bcbf9f6851da"},"_deposit":{"id":"3603","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3603"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3603","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Embedding the Secret Message in Audio File by Using TEA Cryptography and Steganography","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Steganography is the art of hidden information in other information when communication is taking place. Many different carrier file format can be used, but audio waves are the most difficult and more secure because audio file is not noticeable if the information is embedded. In the cryptography, the structure of a message is changed to meaningless and unintelligible unless the decryption key is available. Steganography does not alter the structure of the secret message, but hides it inside a cover. For hiding secret information in audio, different applications have different requirements of the steganography technique used. This paper will show data hiding in audio file by using the combination of the Steganographic algorithm and Cryptographic algorithm."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-25"}],"displaytype":"preview","filename":"Embedding the Secret Message in Audio File by Using TEA Cryptography and Steganography.pdf","filesize":[{"value":"7 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3603/files/Embedding the Secret Message in Audio File by Using TEA Cryptography and Steganography.pdf"},"version_id":"c90cb066-af5a-448b-88e3-e71413308218"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Sixth Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Thaung, Thein Than"},{"subitem_authors_fullname":"Htike, Win Win"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2011-12-29"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1338"},"item_title":"Embedding the Secret Message in Audio File by Using TEA Cryptography and Steganography","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-25","publish_status":"0","recid":"3603","relation_version_is_last":true,"title":["Embedding the Secret Message in Audio File by Using TEA Cryptography and Steganography"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T06:15:53.068469+00:00"}