Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "64e485b2-9ba9-4fbc-bed1-70989be1bb79"}, "_deposit": {"created_by": 71, "id": "7420", "owner": "71", "owners": [71], "owners_ext": {"displayname": "Kay_Thwe", "username": "kay_thwe"}, "pid": {"revision_id": 0, "type": "depid", "value": "7420"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/00007420", "sets": ["user-miit"]}, "communities": ["miit"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "An Overview of Hiding Information using Steganography Methods with Cryptography", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "In this paper, several Steganographic techniques were discussed. Steganography technique includes text, image, audio, and video. Text Steganography, in this technique the secret message that has to be sent is hidden inside another cover text file. The hidden text file is transmitted from sender to receiver. Image steganography, commonly used technique in which the image or a message hidden inside another cover image by altering some color change in the image using LSB(Least Significant Bit) and transmitted from sender to receiver ,difficult for human eye to detect those changes. Audio Steganography, in this technique the secret message or audio that has to be sent is hidden inside another cover audio file and transmitted from sender to receiver. Video Steganography, secret message or video that has to be sent is hidden inside another cover video file and transmitted from sender to receiver."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Steganography, Crptography, Secret message, plaintext, ciphertext"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2021-01-12"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "An Overview of Hiding Information using Steganography Methods with Cryptography.pdf", "filesize": [{"value": "511 KB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "mimetype": "application/pdf", "size": 511000.0, "url": {"url": "https://meral.edu.mm/record/7420/files/An Overview of Hiding Information using Steganography Methods with Cryptography.pdf"}, "version_id": "33556e5a-045d-4388-9356-959fa97e6462"}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "FICCSI", "subitem_c_date": "26-02-2020", "subitem_conference_title": "First International Conference on Computational Science and Intelligence", "subitem_website": "http://ksrcas.edu/uploads/FICCSI20/"}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Maheshwari A"}, {"subitem_authors_fullname": "Padma S"}, {"subitem_authors_fullname": "Shrivastava D P"}, {"subitem_authors_fullname": "Dimitrios A. Karras"}, {"subitem_authors_fullname": "Phyu Phyu Khaing"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Conference paper"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2020-02-26"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://ksrcas.edu/uploads/FICCSI20/"}, "item_title": "An Overview of Hiding Information using Steganography Methods with Cryptography", "item_type_id": "21", "owner": "71", "path": ["1582963674932", "1597397050488"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000007420", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2021-01-12"}, "publish_date": "2021-01-12", "publish_status": "0", "recid": "7420", "relation": {}, "relation_version_is_last": true, "title": ["An Overview of Hiding Information using Steganography Methods with Cryptography"], "weko_shared_id": -1}
  1. Myanmar Institute of Information Technology
  1. Myanmar Institute of Information Technology
  2. Faculty of Information Science

An Overview of Hiding Information using Steganography Methods with Cryptography

http://hdl.handle.net/20.500.12678/0000007420
http://hdl.handle.net/20.500.12678/0000007420
a6678af8-894e-4333-84e2-ba70154f0f9f
64e485b2-9ba9-4fbc-bed1-70989be1bb79
None
Preview
Name / File License Actions
An An Overview of Hiding Information using Steganography Methods with Cryptography.pdf (511 KB)
Publication type
Conference paper
Upload type
Publication
Title
Title An Overview of Hiding Information using Steganography Methods with Cryptography
Language en
Publication date 2020-02-26
Authors
Maheshwari A
Padma S
Shrivastava D P
Dimitrios A. Karras
Phyu Phyu Khaing
Description
In this paper, several Steganographic techniques were discussed. Steganography technique includes text, image, audio, and video. Text Steganography, in this technique the secret message that has to be sent is hidden inside another cover text file. The hidden text file is transmitted from sender to receiver. Image steganography, commonly used technique in which the image or a message hidden inside another cover image by altering some color change in the image using LSB(Least Significant Bit) and transmitted from sender to receiver ,difficult for human eye to detect those changes. Audio Steganography, in this technique the secret message or audio that has to be sent is hidden inside another cover audio file and transmitted from sender to receiver. Video Steganography, secret message or video that has to be sent is hidden inside another cover video file and transmitted from sender to receiver.
Keywords
Steganography, Crptography, Secret message, plaintext, ciphertext
Identifier http://ksrcas.edu/uploads/FICCSI20/
Conference papers
FICCSI
26-02-2020
First International Conference on Computational Science and Intelligence
http://ksrcas.edu/uploads/FICCSI20/
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2021-01-12 09:47:11.951222
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL