Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking


Index Link

Index Tree

  • RootNode

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "951c1406-106c-4ad1-abbc-f02c022af462"}, "_deposit": {"id": "3111", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3111"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3111", "sets": ["user-ytu"]}, "communities": ["ytu"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "An Information Security System Based on Optimized  Pixel Mapping Method", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "\u003cp\u003eIn\u0026nbsp; the\u0026nbsp; field\u0026nbsp; of\u0026nbsp; communication\u0026nbsp; system\u0026nbsp; and\u0026nbsp; internet,\u0026nbsp; the\u0026nbsp; information\u0026nbsp; security\u0026nbsp; is\u0026nbsp; playing\u0026nbsp; a\u0026nbsp; crucial\u0026nbsp; role.\u0026nbsp; At\u0026nbsp; the\u003cbr\u003e\npresent time, communication through Internet is becoming popular and it\u0026nbsp; should be accurate and secure. To\u003cbr\u003e\nmake\u0026nbsp; it reality, cryptography is very\u0026nbsp; useful tool to protect the content of confidential\u0026nbsp; data in\u0026nbsp; many research\u003cbr\u003e\nareas. Another one, steganography is also commonly used to hide the existence of data into cover media known\u003cbr\u003e\nas\u0026nbsp; text,\u0026nbsp; image,\u0026nbsp; audio\u0026nbsp; and\u0026nbsp; video.\u0026nbsp; In\u0026nbsp; this\u0026nbsp; work,\u0026nbsp; it\u0026nbsp; is\u0026nbsp; considered\u0026nbsp; that\u0026nbsp; the\u0026nbsp; two\u0026nbsp; most\u0026nbsp; popular\u0026nbsp; techniques\u003cbr\u003e\n(Cryptography and Steganography) should be combined to develop the strong and robust security system. At\u003cbr\u003e\nfirst,\u0026nbsp; confidentiality\u0026nbsp; and\u0026nbsp; message\u0026nbsp; authentication\u0026nbsp; requirements\u0026nbsp; are\u0026nbsp; fulfilled\u0026nbsp; with\u0026nbsp; the\u0026nbsp; help\u0026nbsp; of\u0026nbsp; Byte-Rotation\u003cbr\u003e\nEncryption\u0026nbsp; Algorithm\u0026nbsp; (BREA)\u0026nbsp; and\u0026nbsp; Secure\u0026nbsp; Hash\u0026nbsp; Algorithm-512(SHA-512).\u0026nbsp; On\u0026nbsp; the\u0026nbsp; other\u0026nbsp; hand,\u0026nbsp; a\u0026nbsp; new\u0026nbsp; data\u003cbr\u003e\nhiding approach based on the optimization of Pixel Mapping Method (OPMM) also provides the\u0026nbsp; system the\u003cbr\u003e\nhigher embedding capacity with minimum degradation of stego image quality. To analyze the performance of\u003cbr\u003e\nthe proposed OPMM, the comparison is also presented in terms of embedding capacity and Peak Signal to Noise\u003cbr\u003e\nRatio (PSNR) values.\u003c/p\u003e"}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Cryptography"}, {"interim": "Steganography"}, {"interim": "SHA-512"}, {"interim": "BREA"}, {"interim": "OPMM"}, {"interim": "Embedding Capacity"}, {"interim": "PSNR"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-04"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "An Information Security System Based on Optimized Pixel Mapping Method.pdf", "filesize": [{"value": "461 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "mimetype": "application/pdf", "size": 461000.0, "url": {"url": "https://meral.edu.mm/record/3111/files/An Information Security System Based on Optimized Pixel Mapping Method.pdf"}, "version_id": "d7f99678-fe65-42cb-978f-2ff9957f24fc"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "No 1", "subitem_journal_title": "American Scientific Research Journal for Engineering, Technology, and Sciences (ASRJETS)", "subitem_pages": "pp 222-239", "subitem_volume": "Volume 25"}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Su Mon Thu"}, {"subitem_authors_fullname": "Khin Myo Thant"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Journal article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2016-09-23"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "10.5281/zenodo.3268370"}, "item_title": "An Information Security System Based on Optimized  Pixel Mapping Method", "item_type_id": "21", "owner": "1", "path": ["1596119372420"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003111", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-04"}, "publish_date": "2019-07-04", "publish_status": "0", "recid": "3111", "relation": {}, "relation_version_is_last": true, "title": ["An Information Security System Based on Optimized  Pixel Mapping Method"], "weko_shared_id": -1}
  1. Yangon Technological University
  2. Department of Computer Engineering and Information Technology

An Information Security System Based on Optimized Pixel Mapping Method

http://hdl.handle.net/20.500.12678/0000003111
http://hdl.handle.net/20.500.12678/0000003111
e16d5c1f-7e81-4ebe-a9ad-5f071cce37b2
951c1406-106c-4ad1-abbc-f02c022af462
None
Preview
Name / File License Actions
An An Information Security System Based on Optimized Pixel Mapping Method.pdf (461 Kb)
Publication type
Journal article
Upload type
Publication
Title
Title An Information Security System Based on Optimized Pixel Mapping Method
Language en
Publication date 2016-09-23
Authors
Su Mon Thu
Khin Myo Thant
Description
<p>In&nbsp; the&nbsp; field&nbsp; of&nbsp; communication&nbsp; system&nbsp; and&nbsp; internet,&nbsp; the&nbsp; information&nbsp; security&nbsp; is&nbsp; playing&nbsp; a&nbsp; crucial&nbsp; role.&nbsp; At&nbsp; the<br>
present time, communication through Internet is becoming popular and it&nbsp; should be accurate and secure. To<br>
make&nbsp; it reality, cryptography is very&nbsp; useful tool to protect the content of confidential&nbsp; data in&nbsp; many research<br>
areas. Another one, steganography is also commonly used to hide the existence of data into cover media known<br>
as&nbsp; text,&nbsp; image,&nbsp; audio&nbsp; and&nbsp; video.&nbsp; In&nbsp; this&nbsp; work,&nbsp; it&nbsp; is&nbsp; considered&nbsp; that&nbsp; the&nbsp; two&nbsp; most&nbsp; popular&nbsp; techniques<br>
(Cryptography and Steganography) should be combined to develop the strong and robust security system. At<br>
first,&nbsp; confidentiality&nbsp; and&nbsp; message&nbsp; authentication&nbsp; requirements&nbsp; are&nbsp; fulfilled&nbsp; with&nbsp; the&nbsp; help&nbsp; of&nbsp; Byte-Rotation<br>
Encryption&nbsp; Algorithm&nbsp; (BREA)&nbsp; and&nbsp; Secure&nbsp; Hash&nbsp; Algorithm-512(SHA-512).&nbsp; On&nbsp; the&nbsp; other&nbsp; hand,&nbsp; a&nbsp; new&nbsp; data<br>
hiding approach based on the optimization of Pixel Mapping Method (OPMM) also provides the&nbsp; system the<br>
higher embedding capacity with minimum degradation of stego image quality. To analyze the performance of<br>
the proposed OPMM, the comparison is also presented in terms of embedding capacity and Peak Signal to Noise<br>
Ratio (PSNR) values.</p>
Keywords
Cryptography, Steganography, SHA-512, BREA, OPMM, Embedding Capacity, PSNR
Identifier 10.5281/zenodo.3268370
Journal articles
No 1
American Scientific Research Journal for Engineering, Technology, and Sciences (ASRJETS)
pp 222-239
Volume 25
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-08-30 13:55:49.473831
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL