{"created":"2020-09-01T14:52:44.484380+00:00","id":4469,"links":{},"metadata":{"_buckets":{"deposit":"8cf758d4-0d3e-404f-822a-d397bba159eb"},"_deposit":{"id":"4469","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4469"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4469","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"LSB-Based Random Byte Data Embedding","subitem_1551255648112":"en_US"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Due to advances in technologies, most of theinformation is kept electronically.Steganography and Cryptography are twopopular ways of sending vital information in asecret way. In this paper, an imagesteganography technique is proposed bycombining cryptography and steganography. Theproposed technique uses LSB-based dataembedding technique and RC4-liked keyed statevector to hide the encrypted message. Beforeembedding the secret message, RC4 encryptionalgorithm is also used for message encryption.After encrypting, the encrypted messages can beembedded according to state vector size. Thesecret messages can be randomly hidden in BMPimage file by using LSB technique. This systemcan protect the privacy of information.Moreover, this technique supports for dataintegrity and data confidentiality."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-11-13"}],"displaytype":"preview","filename":"10042.pdf","filesize":[{"value":"469 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4469/files/10042.pdf"},"version_id":"0d72bcde-abb2-4829-a204-d9657e0d54c3"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Tenth International Conference On Computer Applications (ICCA 2012)","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Zin, Wai Wai"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2012-02-28"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/2399"},"item_title":"LSB-Based Random Byte Data Embedding","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-11-13","publish_status":"0","recid":"4469","relation_version_is_last":true,"title":["LSB-Based Random Byte Data Embedding"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T01:58:47.723834+00:00"}