<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd" xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>00000ctmaa22000003a 4500</leader>
  <controlfield tag="001">UP-1685675941123940357</controlfield>
  <controlfield tag="003">Buklod</controlfield>
  <controlfield tag="005">20160908103616.0</controlfield>
  <controlfield tag="006">aa    rb   |||1 u|</controlfield>
  <controlfield tag="007">ta</controlfield>
  <controlfield tag="008">160908s        xx     d     r    |||| u|</controlfield>
  <datafield tag="035" ind1=" " ind2=" ">
   <subfield code="a">(iLib)UPTAC-00018460479</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
   <subfield code="a">UPVTC</subfield>
  </datafield>
  <datafield tag="041" ind1="0" ind2=" ">
   <subfield code="a">eng</subfield>
  </datafield>
  <datafield tag="090" ind1=" " ind2="0">
   <subfield code="a">LG 993.5 2016 C66 T36</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
   <subfield code="a">Tan, Edrian Jay Z.</subfield>
   <subfield code="e">author.</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
   <subfield code="a">Steganography using Optimal Least Significant Bit with greedy algorithm</subfield>
   <subfield code="c">Edrian Jay Z. Tan; John D. Ultra, adviser.</subfield>
  </datafield>
  <datafield tag="264" ind1=" " ind2="1">
   <subfield code="c">2016.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
   <subfield code="a">[8], 47 leaves</subfield>
   <subfield code="b">illustrations.</subfield>
  </datafield>
  <datafield tag="500" ind1=" " ind2=" ">
   <subfield code="a">Undergraduate thesis (B.S. Computer Science) -- University of the Philippines, Tacloban.</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
   <subfield code="a">In steganography, the robustness of the stego object is an important criterion in evaluating a technique. Maintaining this property gets harder as the size of the secret message increases, making the stego object less robust and susceptible to attacks from third parties. Numerous ways to increase the imperceptibility and security of the stego object have been studied. In this paper, the Optimal Least Significant Bit (OLSB) technique was used to embed secret messages into a digital image. A greedy algorithm was used to find the optimal substitution vector for a specific embedding of a secret message to a cover image. The greedy algorithm was compared to an implementation of an improved Bat algorithm and showed satisfactory results based on the quality of the output substitution vectors and its average running time.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Steganography.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Optimal Least Significant Bit (OLSB).</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Greedy algorithm.</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
   <subfield code="a">Ultra, John D.</subfield>
   <subfield code="e">adviser.</subfield>
  </datafield>
  <datafield tag="905" ind1=" " ind2=" ">
   <subfield code="a">FI</subfield>
  </datafield>
  <datafield tag="905" ind1=" " ind2=" ">
   <subfield code="a">UP</subfield>
  </datafield>
  <datafield tag="852" ind1="0" ind2=" ">
   <subfield code="a">UPTAC</subfield>
   <subfield code="b">UPTAC</subfield>
   <subfield code="h">LG 993.5 2016 C66</subfield>
   <subfield code="i">T36</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
   <subfield code="a">Thesis</subfield>
  </datafield>
 </record>
</collection>
