{"created":"2020-09-01T15:26:26.417142+00:00","id":4874,"links":{},"metadata":{"_buckets":{"deposit":"2d57083f-c0b8-40dc-a3f5-20d14431f845"},"_deposit":{"id":"4874","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4874"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4874","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Palette-Based Image Steganography by Mapping Pixels to Letters","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"This paper is represented for informationsecurity by using image steganography method onpalette-based image. The palette image basedsteganography is used LSB encoding procedure.Steganograpyh is the art of hiding information inother information media when communication is takeplace. Many different file formats can be use, butdigital images are more popular usages. We proposethe encoding the message to an image and thedecoding this message by mapping pixels to letters.The result image is not different as in original image.So, the intruders can’t know the messages embeddedin the image until they get that image."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"Steganograhy"},{"interim":"LSB encoding"},{"interim":"Hiding data behind image"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-02"}],"displaytype":"preview","filename":"9021.pdf","filesize":[{"value":"119 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4874/files/9021.pdf"},"version_id":"85bfa617-ce3f-42bd-b0ac-2ad9ef025289"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Ninth International Conference On Computer Applications (ICCA 2011)","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Kyu, Khin Kyu"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2011-05-05"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/77"},"item_title":"Palette-Based Image Steganography by Mapping Pixels to Letters","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-02","publish_status":"0","recid":"4874","relation_version_is_last":true,"title":["Palette-Based Image Steganography by Mapping Pixels to Letters"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T02:35:17.186274+00:00"}