MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "0c50db75-a9ab-412c-87be-7c02cf96f79e"}, "_deposit": {"id": "4849", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4849"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4849", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Breaking the Steganographic Utility MP3Stego", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Steganography is the art and science of hiding information by embedding messages within other, seemingly harmless messages. In this paper, techniques are presented which aim at the breaking of steganography usage in digital audio data. The propose system enhances the audio steganalysis by breaking the steganographic utility. In this system, white noise is added to the audio signal and lowest bit of part2_3_length is changed by other bit. The propose scheme analyzes this algorithm by using MP3Stego. The performance of this system is calculated by Perceptual Evaluation of Speech Quality (PESQ) and Bit Error Rate (BER)."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "MP3Stego"}, {"interim": "Perceptual Evaluation of Speech Quality (PESQ)"}, {"interim": "Bit Error Rate (BER)"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-11"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "11059.pdf", "filesize": [{"value": "549 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 549000.0, "url": {"url": "https://meral.edu.mm/record/4849/files/11059.pdf"}, "version_id": "643fa379-7c59-4105-92fc-abfa9cf00e23"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Eleventh International Conference On Computer Applications (ICCA 2013)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Mya, Khin Than"}, {"subitem_authors_fullname": "Tint, Yawai"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2013-02-26"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/747"}, "item_title": "Breaking the Steganographic Utility MP3Stego", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "https://meral.edu.mm/records/4849", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-11"}, "publish_date": "2019-07-11", "publish_status": "0", "recid": "4849", "relation": {}, "relation_version_is_last": true, "title": ["Breaking the Steganographic Utility MP3Stego"], "weko_shared_id": -1}
Breaking the Steganographic Utility MP3Stego
https://meral.edu.mm/records/4849
https://meral.edu.mm/records/4849e793ad1c-2bbe-4513-b5db-8fed89935bd7
0c50db75-a9ab-412c-87be-7c02cf96f79e
Name / File | License | Actions |
---|---|---|
11059.pdf (549 Kb)
|
|
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Breaking the Steganographic Utility MP3Stego | |||||
Language | en | |||||
Publication date | 2013-02-26 | |||||
Authors | ||||||
Mya, Khin Than | ||||||
Tint, Yawai | ||||||
Description | ||||||
Steganography is the art and science of hiding information by embedding messages within other, seemingly harmless messages. In this paper, techniques are presented which aim at the breaking of steganography usage in digital audio data. The propose system enhances the audio steganalysis by breaking the steganographic utility. In this system, white noise is added to the audio signal and lowest bit of part2_3_length is changed by other bit. The propose scheme analyzes this algorithm by using MP3Stego. The performance of this system is calculated by Perceptual Evaluation of Speech Quality (PESQ) and Bit Error Rate (BER). | ||||||
Keywords | ||||||
MP3Stego, Perceptual Evaluation of Speech Quality (PESQ), Bit Error Rate (BER) | ||||||
Identifier | http://onlineresource.ucsy.edu.mm/handle/123456789/747 | |||||
Journal articles | ||||||
Eleventh International Conference On Computer Applications (ICCA 2013) | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |