Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "9a08e9ce-d047-4881-8e39-a337717cd168"}, "_deposit": {"id": "4260", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4260"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4260", "sets": ["1597824273898", "user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Video Steganalysis Based on Transform Domain", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Steganalysis, the method to detectsteganographically embedded hidden messages indigital data, has received an increasing interest inrecent years. Although significant research efforts havebeen devoted to develop steganalysis techniques forstill-images, video steganalysis remains largely anexplored area. This paper proposes a video steganalysismethod to detect the presence of hidden messages.Features are extracted from the histograms of thewavelet subbands and the statistical moment of thewavelet characteristic functions Co-Occurrences,water-filling features. K-Nearest Neighbor (K-NN) isutilized as the classifier."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "steganalysis"}, {"interim": "histogram characteristic function"}, {"interim": "statistical moment"}, {"interim": "exponential entropy"}, {"interim": "K-NN"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-03"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "9066.pdf", "filesize": [{"value": "77 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 77000.0, "url": {"url": "https://meral.edu.mm/record/4260/files/9066.pdf"}, "version_id": "ba186709-36ff-4827-8334-51ea0c1da3b5"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Ninth International Conference On Computer Applications (ICCA 2011)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Htet, Thu Thu"}, {"subitem_authors_fullname": "Mya, Khin Than"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2011-05-05"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/211"}, "item_title": "Video Steganalysis Based on Transform Domain", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004260", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-03"}, "publish_date": "2019-07-03", "publish_status": "0", "recid": "4260", "relation": {}, "relation_version_is_last": true, "title": ["Video Steganalysis Based on Transform Domain"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Video Steganalysis Based on Transform Domain

http://hdl.handle.net/20.500.12678/0000004260
http://hdl.handle.net/20.500.12678/0000004260
4b778f49-fffb-44a1-94c3-5b4a53eae309
9a08e9ce-d047-4881-8e39-a337717cd168
None
Preview
Name / File License Actions
9066.pdf 9066.pdf (77 Kb)
Publication type
Article
Upload type
Publication
Title
Title Video Steganalysis Based on Transform Domain
Language en
Publication date 2011-05-05
Authors
Htet, Thu Thu
Mya, Khin Than
Description
Steganalysis, the method to detectsteganographically embedded hidden messages indigital data, has received an increasing interest inrecent years. Although significant research efforts havebeen devoted to develop steganalysis techniques forstill-images, video steganalysis remains largely anexplored area. This paper proposes a video steganalysismethod to detect the presence of hidden messages.Features are extracted from the histograms of thewavelet subbands and the statistical moment of thewavelet characteristic functions Co-Occurrences,water-filling features. K-Nearest Neighbor (K-NN) isutilized as the classifier.
Keywords
steganalysis, histogram characteristic function, statistical moment, exponential entropy, K-NN
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/211
Journal articles
Ninth International Conference On Computer Applications (ICCA 2011)
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 14:25:37.853236
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL