{"created":"2020-09-01T13:52:43.346932+00:00","id":3997,"links":{},"metadata":{"_buckets":{"deposit":"d36ed843-0e10-464e-94ef-adaeef79f1ff"},"_deposit":{"id":"3997","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3997"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3997","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Active Steganalysis of MP3Stego","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"The goal of steganalysis is to detect and/or estimatepotentially hidden information from observed data.Steganalysis not only plays a significant role ininformation countermeasures, but also can preventthe illicit use of steganography. This paper developsan active steganalysis system for detecting hiddenmessages, by estimating frames with hidden messageand message length in compressed audio filesproduced by MP3Stego. Principle ComponentAnalysis (PCA) is applied not only to estimateuncorrelated components but also help to detectwhether the received MP3 streams are steganographyor original. In this steganalysis system, hiddenmessages can be detected in the PCA (whitening)stage. Independent Component Analysis (ICA)attempts to separate a set of steganographic signalsfrom original signals. By analyzing the nature ofMP3 signals (frame header, side information), framewith secret message can be detected. The results ofempirical tests reach 97% and conclude thatdetection accuracy of the proposed steganalysissystem is convenient for MP3Stego embeddedcontents. Experiments shows that the proposedmethod can be used quite effectively to detectlocations of messages embedded using nature of MP3signal."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"Steganalysis"},{"interim":"MP3"},{"interim":"Principle Component Analysis (PCA)"},{"interim":"Independent Component Analysis (ICA)"},{"interim":"Part2_3_length"},{"interim":"Global_gain"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-03"}],"displaytype":"preview","filename":"12066.pdf","filesize":[{"value":"353 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3997/files/12066.pdf"},"version_id":"7636c596-9c5d-47da-85c3-ec022602ddfa"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Twelfth International Conference On Computer Applications (ICCA 2014)","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Tint, Yawai"},{"subitem_authors_fullname":"Mya, Khin Than"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2014-02-17"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/171"},"item_title":"Active Steganalysis of MP3Stego","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-03","publish_status":"0","recid":"3997","relation_version_is_last":true,"title":["Active Steganalysis of MP3Stego"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T01:14:00.173531+00:00"}