{"created":"2020-09-01T14:25:36.436952+00:00","id":4260,"links":{},"metadata":{"_buckets":{"deposit":"9a08e9ce-d047-4881-8e39-a337717cd168"},"_deposit":{"id":"4260","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4260"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4260","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Video Steganalysis Based on Transform Domain","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Steganalysis, the method to detectsteganographically embedded hidden messages indigital data, has received an increasing interest inrecent years. Although significant research efforts havebeen devoted to develop steganalysis techniques forstill-images, video steganalysis remains largely anexplored area. This paper proposes a video steganalysismethod to detect the presence of hidden messages.Features are extracted from the histograms of thewavelet subbands and the statistical moment of thewavelet characteristic functions Co-Occurrences,water-filling features. K-Nearest Neighbor (K-NN) isutilized as the classifier."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"steganalysis"},{"interim":"histogram characteristic function"},{"interim":"statistical moment"},{"interim":"exponential entropy"},{"interim":"K-NN"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-03"}],"displaytype":"preview","filename":"9066.pdf","filesize":[{"value":"77 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4260/files/9066.pdf"},"version_id":"ba186709-36ff-4827-8334-51ea0c1da3b5"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Ninth International Conference On Computer Applications (ICCA 2011)","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Htet, Thu Thu"},{"subitem_authors_fullname":"Mya, Khin Than"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2011-05-05"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/211"},"item_title":"Video Steganalysis Based on Transform Domain","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-03","publish_status":"0","recid":"4260","relation_version_is_last":true,"title":["Video Steganalysis Based on Transform Domain"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2022-03-24T23:12:18.374076+00:00"}