{"created":"2020-08-30T13:55:39.985801+00:00","id":3110,"links":{},"metadata":{"_buckets":{"deposit":"e97539d4-2ebf-4f2e-ac91-d81daa504a1d"},"_deposit":{"id":"3110","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3110"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3110","sets":["1582963413512:1596119372420"]},"communities":["ytu"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Multimedia Encryption using Tools in System Engineering","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"

 This paper proposes an image encryption scheme based on chaotic maps.  In this
\nmethod, the dynamical S-box obtained by iterating chaotic maps is used.  A sequence of
\npseudo-random bytes generated from two dimensional cat map is used to index the entry of
\nthe S-box. The output 8 bits (0-255) of the S-box are XOR-ed with the plaintext to produce
\nthe  ciphertext  and  XOR-ed  with  the  ciphertext  to  produce  the  plaintext.      Standard
\nstatistical tests of this scheme are performed.

"}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"encryption"},{"interim":"multimedia"},{"interim":"chaos"},{"interim":"system engineering"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-04"}],"displaytype":"preview","filename":"Multimedia Encyption using Tools in System Engineering.pdf","filesize":[{"value":"309 Kb"}],"format":"application/pdf","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3110/files/Multimedia Encyption using Tools in System Engineering.pdf"},"version_id":"bc874bca-de3e-4c5d-82c6-04f6fad40890"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"ASAEM","subitem_c_date":"10-14 October, 2005","subitem_conference_title":"5th Asian Symposium on Applied Electromagnetic and Mechanics (ASAEM)","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Su Su Maung"},{"subitem_authors_fullname":"Kitdakorn Klomkarn"},{"subitem_authors_fullname":"Noriyuki Komine"},{"subitem_authors_fullname":"Pitikhate Sooraksa"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Conference paper"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2005-10-10"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"10.5281/zenodo.3268368"},"item_title":"Multimedia Encryption using Tools in System Engineering","item_type_id":"21","owner":"1","path":["1596119372420"],"publish_date":"2019-07-04","publish_status":"0","recid":"3110","relation_version_is_last":true,"title":["Multimedia Encryption using Tools in System Engineering"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T05:45:19.657532+00:00"}