The words contained in this file might help you see if this file matches what you are looking for:
...Journal of theoretical and applied information technology th november vol no ongoing jatit lls issn www org e mp video steganography using least significant bit lsb substitution advanced encryption standard aes putu ari sri lestari eka ningsih gusti made arya sasmita ni ika marini mandenni departement udayana university bali indonesia mail arisrilestari gmail com aryasasmita it unud ac id yahoo abstract data transmission over the internet is vulnerable for attacked therefore additional security required one protocol which used protect this research as host cover media jpeg image embedded an was to before into encrypted then stored per array those bits were by modifying bytes in first still encoded sample found atoms container stco co stsc stsz stts dan mdat metadata thus could be mapping position all samples process did not touched color spaces quality can measured peak signal noise ratio psnr value a software called qualify stego scored its that indicated had excellent played well at ...