MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "9a08e9ce-d047-4881-8e39-a337717cd168"}, "_deposit": {"id": "4260", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4260"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4260", "sets": ["1597824273898", "user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Video Steganalysis Based on Transform Domain", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Steganalysis, the method to detectsteganographically embedded hidden messages indigital data, has received an increasing interest inrecent years. Although significant research efforts havebeen devoted to develop steganalysis techniques forstill-images, video steganalysis remains largely anexplored area. This paper proposes a video steganalysismethod to detect the presence of hidden messages.Features are extracted from the histograms of thewavelet subbands and the statistical moment of thewavelet characteristic functions Co-Occurrences,water-filling features. K-Nearest Neighbor (K-NN) isutilized as the classifier."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "steganalysis"}, {"interim": "histogram characteristic function"}, {"interim": "statistical moment"}, {"interim": "exponential entropy"}, {"interim": "K-NN"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-03"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "9066.pdf", "filesize": [{"value": "77 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 77000.0, "url": {"url": "https://meral.edu.mm/record/4260/files/9066.pdf"}, "version_id": "ba186709-36ff-4827-8334-51ea0c1da3b5"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Ninth International Conference On Computer Applications (ICCA 2011)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Htet, Thu Thu"}, {"subitem_authors_fullname": "Mya, Khin Than"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2011-05-05"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/211"}, "item_title": "Video Steganalysis Based on Transform Domain", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004260", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-03"}, "publish_date": "2019-07-03", "publish_status": "0", "recid": "4260", "relation": {}, "relation_version_is_last": true, "title": ["Video Steganalysis Based on Transform Domain"], "weko_shared_id": -1}
Video Steganalysis Based on Transform Domain
http://hdl.handle.net/20.500.12678/0000004260
http://hdl.handle.net/20.500.12678/00000042604b778f49-fffb-44a1-94c3-5b4a53eae309
9a08e9ce-d047-4881-8e39-a337717cd168
Name / File | License | Actions |
---|---|---|
![]() |
|
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Video Steganalysis Based on Transform Domain | |||||
Language | en | |||||
Publication date | 2011-05-05 | |||||
Authors | ||||||
Htet, Thu Thu | ||||||
Mya, Khin Than | ||||||
Description | ||||||
Steganalysis, the method to detectsteganographically embedded hidden messages indigital data, has received an increasing interest inrecent years. Although significant research efforts havebeen devoted to develop steganalysis techniques forstill-images, video steganalysis remains largely anexplored area. This paper proposes a video steganalysismethod to detect the presence of hidden messages.Features are extracted from the histograms of thewavelet subbands and the statistical moment of thewavelet characteristic functions Co-Occurrences,water-filling features. K-Nearest Neighbor (K-NN) isutilized as the classifier. | ||||||
Keywords | ||||||
steganalysis, histogram characteristic function, statistical moment, exponential entropy, K-NN | ||||||
Identifier | http://onlineresource.ucsy.edu.mm/handle/123456789/211 | |||||
Journal articles | ||||||
Ninth International Conference On Computer Applications (ICCA 2011) | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |