MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "7d8f1503-7104-4da3-81f6-4f5adb98f211"}, "_deposit": {"id": "3098", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3098"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3098", "sets": ["user-ytu"]}, "communities": ["ytu"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Data Embedding Approach For Message Authentication System", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "\u003cp\u003eThe demand for effective information security schemes is increasing day by day with the exponential growth of internet. Therefore, cryptographic algorithms are widely used in many research areas to fulfill the security requirements. Among the security requirements, message authentication plays an important role to prevent message alternation and modification from unauthorized party. Due to attack made on Today\u0026rsquo;s data communication, effective steganographic techniques are also developed using various carriers such as image, audio, video, etc. So, this work proposes security system by integrating cryptographic one-way hash function (SHA-512) and image steganographic approach to meet confidentiality and message authentication requirements. The basic idea behind this paper is to provide a good embedding method based on Pixel Mapping Method (PMM) for data hiding in image to achieve better embedding capacity with minimum degradation of image quality. The performance analysis of proposed embedding approach and PMM is made according to the comparative study of embedding capacity and Peak Signal to Noise Ratio (PSNR) values.\u003cbr\u003e\n\u0026nbsp;\u003c/p\u003e"}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Message Authentication"}, {"interim": "Confidentiality"}, {"interim": "SHA-512"}, {"interim": "PMM"}, {"interim": "PSNR"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-06-28"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "DATA EMBEDDING APPROACH FOR MESSAGE AUTHENTICATION SYSTEM.pdf", "filesize": [{"value": "684 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "mimetype": "application/pdf", "size": 684000.0, "url": {"url": "https://meral.edu.mm/record/3098/files/DATA EMBEDDING APPROACH FOR MESSAGE AUTHENTICATION SYSTEM.pdf"}, "version_id": "ba2e130d-5aa9-449a-97fa-c6ff81f26386"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "Issue-8", "subitem_journal_title": "International Journal of Advances in Electronics and Computer Science", "subitem_pages": "pp. 92-97", "subitem_volume": "Vol. 3"}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Su Mon Thu"}, {"subitem_authors_fullname": "Su Wai Phyo"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Journal article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2016-10-18"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "10.5281/zenodo.3069444"}, "item_title": "Data Embedding Approach For Message Authentication System", "item_type_id": "21", "owner": "1", "path": ["1596119372420"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003098", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-06-28"}, "publish_date": "2019-06-28", "publish_status": "0", "recid": "3098", "relation": {}, "relation_version_is_last": true, "title": ["Data Embedding Approach For Message Authentication System"], "weko_shared_id": -1}
Data Embedding Approach For Message Authentication System
http://hdl.handle.net/20.500.12678/0000003098
http://hdl.handle.net/20.500.12678/0000003098e20612b5-cf52-44f8-8851-73ae84a0f312
7d8f1503-7104-4da3-81f6-4f5adb98f211
Name / File | License | Actions |
---|---|---|
![]() |
|
Publication type | ||||||
---|---|---|---|---|---|---|
Journal article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Data Embedding Approach For Message Authentication System | |||||
Language | en | |||||
Publication date | 2016-10-18 | |||||
Authors | ||||||
Su Mon Thu | ||||||
Su Wai Phyo | ||||||
Description | ||||||
<p>The demand for effective information security schemes is increasing day by day with the exponential growth of internet. Therefore, cryptographic algorithms are widely used in many research areas to fulfill the security requirements. Among the security requirements, message authentication plays an important role to prevent message alternation and modification from unauthorized party. Due to attack made on Today’s data communication, effective steganographic techniques are also developed using various carriers such as image, audio, video, etc. So, this work proposes security system by integrating cryptographic one-way hash function (SHA-512) and image steganographic approach to meet confidentiality and message authentication requirements. The basic idea behind this paper is to provide a good embedding method based on Pixel Mapping Method (PMM) for data hiding in image to achieve better embedding capacity with minimum degradation of image quality. The performance analysis of proposed embedding approach and PMM is made according to the comparative study of embedding capacity and Peak Signal to Noise Ratio (PSNR) values.<br> </p> |
||||||
Keywords | ||||||
Message Authentication, Confidentiality, SHA-512, PMM, PSNR | ||||||
Identifier | 10.5281/zenodo.3069444 | |||||
Journal articles | ||||||
Issue-8 | ||||||
International Journal of Advances in Electronics and Computer Science | ||||||
pp. 92-97 | ||||||
Vol. 3 | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |