<?xml version="1.0" encoding="UTF-8"?>
<item xmlns="http://omeka.org/schemas/omeka-xml/v5" itemId="19745" public="1" featured="0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://omeka.org/schemas/omeka-xml/v5 http://omeka.org/schemas/omeka-xml/v5/omeka-xml-5-0.xsd" uri="https://archives.christuniversity.in/items/show/19745?output=omeka-xml" accessDate="2026-04-14T16:01:01+00:00">
  <collection collectionId="16">
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="51377">
                <text>Conference Papers</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </collection>
  <itemType itemTypeId="28">
    <name>Conference Paper</name>
    <description>Faculty Publications- Conference Papers</description>
  </itemType>
  <elementSetContainer>
    <elementSet elementSetId="1">
      <name>Dublin Core</name>
      <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
      <elementContainer>
        <element elementId="50">
          <name>Title</name>
          <description>A name given to the resource</description>
          <elementTextContainer>
            <elementText elementTextId="172032">
              <text>A Comparative Analysis of LSB &amp;amp; DCT Based Steganographic Techniques: Confidentiality, Contemporary State, and Future Challenges</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="49">
          <name>Subject</name>
          <description>The topic of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="172033">
              <text>Data Hiding; Data Security; Image Steganography; Imperceptibility; Information Hiding; LSB insertion; Steganalysis</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="41">
          <name>Description</name>
          <description>An account of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="172034">
              <text>In order to maintain anonymity and security, the steganography is the technique of cloaking confidential data within what seems like harmless digital material. Several steganographic methods have been established devised over time, but those centered around the discrete cosine transformation (DCT) and the least significant bit (LSB) have drawn the most consideration. In this study, two common steganographic methods are compared and contrasted with an emphasis on the secrecy they can keep, the usage they are now receiving, and any potential difficulties in the future. As an alternative, the DCT-based method uses the frequency domain properties of cover media to obfuscate hidden information. Since it spreads the concealed information across several frequency coefficients, it provides greater security than LSB-based techniques. The resilience and imperceptibility of the concealed data are improved by a variety of DCT-based algorithms, such as the modified quantization and matrix encoding approaches, which we explore in detail. We also give a general summary of both approaches'current state in terms of their application, constraints, and areas in which they may be used. We evaluate the benefits and drawbacks of each approach, considering elements like payload size, computing difficulty, and detection resistance.   2023 IEEE.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="39">
          <name>Creator</name>
          <description>An entity primarily responsible for making the resource</description>
          <elementTextContainer>
            <elementText elementTextId="172035">
              <text>Upreti K.; Verma A.; Parashar J.; Vats P.; Verma A.; Singh J.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="48">
          <name>Source</name>
          <description>A related resource from which the described resource is derived</description>
          <elementTextContainer>
            <elementText elementTextId="172036">
              <text>Proceedings of International Conference on Contemporary Computing and Informatics, IC3I 2023, pp. 1581-1588.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="45">
          <name>Publisher</name>
          <description>An entity responsible for making the resource available</description>
          <elementTextContainer>
            <elementText elementTextId="172037">
              <text>Institute of Electrical and Electronics Engineers Inc.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="40">
          <name>Date</name>
          <description>A point or period of time associated with an event in the lifecycle of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="172038">
              <text>2023-01-01</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="43">
          <name>Identifier</name>
          <description>An unambiguous reference to the resource within a given context</description>
          <elementTextContainer>
            <elementText elementTextId="172039">
              <text>&lt;a href="https://doi.org/10.1109/IC3I59117.2023.10398132" target="_blank" rel="noreferrer noopener"&gt;https://doi.org/10.1109/IC3I59117.2023.10398132&lt;/a&gt;
&lt;br /&gt;&lt;br /&gt;&lt;a href="https://www.scopus.com/inward/record.uri?eid=2-s2.0-85185227418&amp;amp;doi=10.1109%2FIC3I59117.2023.10398132&amp;amp;partnerID=40&amp;amp;md5=bf8c1aa7c896198eb7b3f2b6a71444d5" target="_blank" rel="noreferrer noopener"&gt;https://www.scopus.com/inward/record.uri?eid=2-s2.0-85185227418&amp;amp;doi=10.1109%2fIC3I59117.2023.10398132&amp;amp;partnerID=40&amp;amp;md5=bf8c1aa7c896198eb7b3f2b6a71444d5&lt;/a&gt;</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="47">
          <name>Rights</name>
          <description>Information about rights held in and over the resource</description>
          <elementTextContainer>
            <elementText elementTextId="172040">
              <text>Restricted Access</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="46">
          <name>Relation</name>
          <description>A related resource</description>
          <elementTextContainer>
            <elementText elementTextId="172041">
              <text>ISBN: 979-835030448-0</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="42">
          <name>Format</name>
          <description>The file format, physical medium, or dimensions of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="172042">
              <text>Online</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="44">
          <name>Language</name>
          <description>A language of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="172043">
              <text>English</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="51">
          <name>Type</name>
          <description>The nature or genre of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="172044">
              <text>Conference paper</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="38">
          <name>Coverage</name>
          <description>The spatial or temporal topic of the resource, the spatial applicability of the resource, or the jurisdiction under which the resource is relevant</description>
          <elementTextContainer>
            <elementText elementTextId="172045">
              <text>Upreti K., CHRIST (Deemed to Be University) Delhi NCR, Department of Computer Science, Ghaziabad, India; Verma A., Department of Computer Science &amp;amp; Engineering ADGITM, New Delhi, India; Parashar J., Department of Computer Science &amp;amp; Engineering ADGITM, New Delhi, India; Vats P., SCSE Manipal University Jaipur Jaipur, Department of CSE, Rajasthan, India; Verma A., KIET Group of Institutions Delhi -NCR, Department of Computer Applications, Ghaziabad, India; Singh J., School of CSE and Technology, Bennett University Greater, Noida, India</text>
            </elementText>
          </elementTextContainer>
        </element>
      </elementContainer>
    </elementSet>
  </elementSetContainer>
</item>
