Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "7d8f1503-7104-4da3-81f6-4f5adb98f211"}, "_deposit": {"id": "3098", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3098"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3098", "sets": ["user-ytu"]}, "communities": ["ytu"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Data Embedding Approach For Message Authentication System", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "\u003cp\u003eThe demand for effective information security schemes is increasing day by day with the exponential growth of internet. Therefore, cryptographic algorithms are widely used in many research areas to fulfill the security requirements. Among the security requirements, message authentication plays an important role to prevent message alternation and modification from unauthorized party. Due to attack made on Today\u0026rsquo;s data communication, effective steganographic techniques are also developed using various carriers such as image, audio, video, etc. So, this work proposes security system by integrating cryptographic one-way hash function (SHA-512) and image steganographic approach to meet confidentiality and message authentication requirements. The basic idea behind this paper is to provide a good embedding method based on Pixel Mapping Method (PMM) for data hiding in image to achieve better embedding capacity with minimum degradation of image quality. The performance analysis of proposed embedding approach and PMM is made according to the comparative study of embedding capacity and Peak Signal to Noise Ratio (PSNR) values.\u003cbr\u003e\n\u0026nbsp;\u003c/p\u003e"}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Message Authentication"}, {"interim": "Confidentiality"}, {"interim": "SHA-512"}, {"interim": "PMM"}, {"interim": "PSNR"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-06-28"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "DATA EMBEDDING APPROACH FOR MESSAGE AUTHENTICATION SYSTEM.pdf", "filesize": [{"value": "684 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "mimetype": "application/pdf", "size": 684000.0, "url": {"url": "https://meral.edu.mm/record/3098/files/DATA EMBEDDING APPROACH FOR MESSAGE AUTHENTICATION SYSTEM.pdf"}, "version_id": "ba2e130d-5aa9-449a-97fa-c6ff81f26386"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "Issue-8", "subitem_journal_title": "International Journal of Advances in Electronics and Computer Science", "subitem_pages": "pp. 92-97", "subitem_volume": "Vol. 3"}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Su Mon Thu"}, {"subitem_authors_fullname": "Su Wai Phyo"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Journal article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2016-10-18"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "10.5281/zenodo.3069444"}, "item_title": "Data Embedding Approach For Message Authentication System", "item_type_id": "21", "owner": "1", "path": ["1596119372420"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003098", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-06-28"}, "publish_date": "2019-06-28", "publish_status": "0", "recid": "3098", "relation": {}, "relation_version_is_last": true, "title": ["Data Embedding Approach For Message Authentication System"], "weko_shared_id": -1}
  1. Yangon Technological University
  2. Department of Computer Engineering and Information Technology

Data Embedding Approach For Message Authentication System

http://hdl.handle.net/20.500.12678/0000003098
http://hdl.handle.net/20.500.12678/0000003098
e20612b5-cf52-44f8-8851-73ae84a0f312
7d8f1503-7104-4da3-81f6-4f5adb98f211
None
Preview
Name / File License Actions
DATA DATA EMBEDDING APPROACH FOR MESSAGE AUTHENTICATION SYSTEM.pdf (684 Kb)
Publication type
Journal article
Upload type
Publication
Title
Title Data Embedding Approach For Message Authentication System
Language en
Publication date 2016-10-18
Authors
Su Mon Thu
Su Wai Phyo
Description
<p>The demand for effective information security schemes is increasing day by day with the exponential growth of internet. Therefore, cryptographic algorithms are widely used in many research areas to fulfill the security requirements. Among the security requirements, message authentication plays an important role to prevent message alternation and modification from unauthorized party. Due to attack made on Today&rsquo;s data communication, effective steganographic techniques are also developed using various carriers such as image, audio, video, etc. So, this work proposes security system by integrating cryptographic one-way hash function (SHA-512) and image steganographic approach to meet confidentiality and message authentication requirements. The basic idea behind this paper is to provide a good embedding method based on Pixel Mapping Method (PMM) for data hiding in image to achieve better embedding capacity with minimum degradation of image quality. The performance analysis of proposed embedding approach and PMM is made according to the comparative study of embedding capacity and Peak Signal to Noise Ratio (PSNR) values.<br>
&nbsp;</p>
Keywords
Message Authentication, Confidentiality, SHA-512, PMM, PSNR
Identifier 10.5281/zenodo.3069444
Journal articles
Issue-8
International Journal of Advances in Electronics and Computer Science
pp. 92-97
Vol. 3
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-08-30 13:53:59.125065
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL