{"created":"2020-09-01T13:47:46.328509+00:00","id":3940,"links":{},"metadata":{"_buckets":{"deposit":"7051e825-675e-44cb-803c-bf533f35b138"},"_deposit":{"id":"3940","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3940"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3940","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Secret Message Hiding in BMP Image","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Secure exchange of secret messages over publicchannel plays a very important role of secret communication.The use of Steganography is much less threatening than the useof cryptography because after encoding stego documents andfavor documents are not noticeable changes. In this paper, wefocus on Steganography and by hiding the important message indigital images and send to the other hand. In this system, weemploy Least Significant Bits (4-LBS) , a direct substitutionmethod, to avoid detecting visually by the third party. We focuson hiding text messages in a Bitmap (BMP) image. In this paper,we analyze the processing time of encoding and decoding, thelimitation of characters that were embedded in cover Images.We also analyze the capacity of characters embedded inGrayscale and RGB Images. By using this system , we can safelyexchange secret messages over public channel."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-08-02"}],"displaytype":"preview","filename":"Secret Message Hiding in BMP Image.pdf","filesize":[{"value":"10 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3940/files/Secret Message Hiding in BMP Image.pdf"},"version_id":"aa19de85-8f03-4fb6-8ec0-1e73c0dadc90"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Third Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Moe, Hlwan"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2009-08-03"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1658"},"item_title":"Secret Message Hiding in BMP Image","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-08-02","publish_status":"0","recid":"3940","relation_version_is_last":true,"title":["Secret Message Hiding in BMP Image"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2022-03-24T23:17:04.258772+00:00"}