{"created":"2020-09-01T15:24:13.831890+00:00","id":4849,"links":{},"metadata":{"_buckets":{"deposit":"0c50db75-a9ab-412c-87be-7c02cf96f79e"},"_deposit":{"id":"4849","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4849"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4849","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Breaking the Steganographic Utility MP3Stego","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Steganography is the art and science of hiding information by embedding messages within other, seemingly harmless messages. In this paper, techniques are presented which aim at the breaking of steganography usage in digital audio data. The propose system enhances the audio steganalysis by breaking the steganographic utility. In this system, white noise is added to the audio signal and lowest bit of part2_3_length is changed by other bit. The propose scheme analyzes this algorithm by using MP3Stego. The performance of this system is calculated by Perceptual Evaluation of Speech Quality (PESQ) and Bit Error Rate (BER)."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"MP3Stego"},{"interim":"Perceptual Evaluation of Speech Quality (PESQ)"},{"interim":"Bit Error Rate (BER)"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-11"}],"displaytype":"preview","filename":"11059.pdf","filesize":[{"value":"549 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4849/files/11059.pdf"},"version_id":"643fa379-7c59-4105-92fc-abfa9cf00e23"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Eleventh International Conference On Computer Applications (ICCA 2013)","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Mya, Khin Than"},{"subitem_authors_fullname":"Tint, Yawai"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2013-02-26"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/747"},"item_title":"Breaking the Steganographic Utility MP3Stego","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-11","publish_status":"0","recid":"4849","relation_version_is_last":true,"title":["Breaking the Steganographic Utility MP3Stego"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T01:13:41.482766+00:00"}