Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "725d0ab9-0a89-4394-a2dd-d7c29392009a"}, "_deposit": {"id": "4901", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4901"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4901", "sets": ["1597824273898", "user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Improved Data Security Using Video Steganography with Time Limited Password", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "In the era of fast information interchange, videoSteganography and data hiding techniques havebecome essential tool for information security andsecret communications. Steganography is the scienceof embedding secret information into the cover mediawith the modification to the cover image, whichcannot be easily identified by human eyes.Hidingsecret information in video file is known as videosteganography. Because of security threats todaythrough modern malevolent technology, confidentialinformation is at risk such as medical records andbanking or financial data.This proposal aims toimprove security, robustness and payload capacityusing video file. Thus, to embed the secret imagebehind the video file transformation technique(discrete wavelt transform and arnold transform), toperform double key encryption steps, twist exchangeprocess will be used. Moreover, to extract encryptedkey behind the audio file random password with timelimitation system is also used for more authenticatedsystem."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-12"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "proceeding_total-pages-351-355.pdf", "filesize": [{"value": "2992 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 2992000.0, "url": {"url": "https://meral.edu.mm/record/4901/files/proceeding_total-pages-351-355.pdf"}, "version_id": "d0b5eddc-a822-4255-a93f-63e72a53f69d"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifteenth International Conference on Computer Applications(ICCA 2017)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Nyo, Hnin Lai"}, {"subitem_authors_fullname": "Hlaing, Aye Su"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2017-02-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/804"}, "item_title": "Improved Data Security Using Video Steganography with Time Limited Password", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004901", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-12"}, "publish_date": "2019-07-12", "publish_status": "0", "recid": "4901", "relation": {}, "relation_version_is_last": true, "title": ["Improved Data Security Using Video Steganography with Time Limited Password"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Improved Data Security Using Video Steganography with Time Limited Password

http://hdl.handle.net/20.500.12678/0000004901
http://hdl.handle.net/20.500.12678/0000004901
66b85ef6-9483-4a41-a566-8b73e378d5c0
725d0ab9-0a89-4394-a2dd-d7c29392009a
None
Preview
Name / File License Actions
proceeding_total-pages-351-355.pdf proceeding_total-pages-351-355.pdf (2992 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 15:28:41.015147
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL