Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "b5b284fc-299c-4c19-acee-e10969eacd3d"}, "_deposit": {"id": "4957", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4957"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4957", "sets": ["1597824273898", "user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Performance Analysis of DWT and 4-LSB for Information Hiding in Images (Steganography)", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Steganographic techniques allow one party tocommunicate information to another without a thirdparty knowing that the communication is occuring.Steganography works by replacing bits of useless orunused data in regular computer files with bits ofdifferent, invisible information. This paper presentsthe performance analysis for two steganographicalgorithms, DWT and 4-LSB algorithm. 4-LSBalgorithm works in spatial domain, where dimensioncan be any size. DWT algorithm works in frequencydomain, where there are two dimensions, time andfrequency. This system is implemented to hide imageand text in the container image. According toexperimental results, the similarity of extractedimage and secret image by 4-LSB is higher thanthose of DWT but steganography by DWT methodcan resist to attacks more than 4-LSB algorithm."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-12"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "psc2010paper (133).pdf", "filesize": [{"value": "238 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 238000.0, "url": {"url": "https://meral.edu.mm/record/4957/files/psc2010paper (133).pdf"}, "version_id": "4da6e5ea-593f-4b29-a50f-10e0cc799921"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Aung, Thazin"}, {"subitem_authors_fullname": "Tun, Ei Ei Soe"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2010-12-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/856"}, "item_title": "Performance Analysis of DWT and 4-LSB for Information Hiding in Images (Steganography)", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004957", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-12"}, "publish_date": "2019-07-12", "publish_status": "0", "recid": "4957", "relation": {}, "relation_version_is_last": true, "title": ["Performance Analysis of DWT and 4-LSB for Information Hiding in Images (Steganography)"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Performance Analysis of DWT and 4-LSB for Information Hiding in Images (Steganography)

http://hdl.handle.net/20.500.12678/0000004957
http://hdl.handle.net/20.500.12678/0000004957
9a802a0d-3030-4aa9-8fc8-a462ca7cf7d2
b5b284fc-299c-4c19-acee-e10969eacd3d
None
Preview
Name / File License Actions
psc2010paper psc2010paper (133).pdf (238 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 15:34:31.906129
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL