{"created":"2020-09-01T15:34:28.751406+00:00","id":4957,"links":{},"metadata":{"_buckets":{"deposit":"b5b284fc-299c-4c19-acee-e10969eacd3d"},"_deposit":{"id":"4957","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4957"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4957","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Performance Analysis of DWT and 4-LSB for Information Hiding in Images (Steganography)","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Steganographic techniques allow one party tocommunicate information to another without a thirdparty knowing that the communication is occuring.Steganography works by replacing bits of useless orunused data in regular computer files with bits ofdifferent, invisible information. This paper presentsthe performance analysis for two steganographicalgorithms, DWT and 4-LSB algorithm. 4-LSBalgorithm works in spatial domain, where dimensioncan be any size. DWT algorithm works in frequencydomain, where there are two dimensions, time andfrequency. This system is implemented to hide imageand text in the container image. According toexperimental results, the similarity of extractedimage and secret image by 4-LSB is higher thanthose of DWT but steganography by DWT methodcan resist to attacks more than 4-LSB algorithm."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-12"}],"displaytype":"preview","filename":"psc2010paper (133).pdf","filesize":[{"value":"238 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4957/files/psc2010paper (133).pdf"},"version_id":"4da6e5ea-593f-4b29-a50f-10e0cc799921"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Fifth Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Aung, Thazin"},{"subitem_authors_fullname":"Tun, Ei Ei Soe"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2010-12-16"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/856"},"item_title":"Performance Analysis of DWT and 4-LSB for Information Hiding in Images (Steganography)","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-12","publish_status":"0","recid":"4957","relation_version_is_last":true,"title":["Performance Analysis of DWT and 4-LSB for Information Hiding in Images (Steganography)"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2022-03-24T23:17:09.175374+00:00"}