MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "951c1406-106c-4ad1-abbc-f02c022af462"}, "_deposit": {"id": "3111", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3111"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3111", "sets": ["user-ytu"]}, "communities": ["ytu"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "An Information Security System Based on Optimized Pixel Mapping Method", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "\u003cp\u003eIn\u0026nbsp; the\u0026nbsp; field\u0026nbsp; of\u0026nbsp; communication\u0026nbsp; system\u0026nbsp; and\u0026nbsp; internet,\u0026nbsp; the\u0026nbsp; information\u0026nbsp; security\u0026nbsp; is\u0026nbsp; playing\u0026nbsp; a\u0026nbsp; crucial\u0026nbsp; role.\u0026nbsp; At\u0026nbsp; the\u003cbr\u003e\npresent time, communication through Internet is becoming popular and it\u0026nbsp; should be accurate and secure. To\u003cbr\u003e\nmake\u0026nbsp; it reality, cryptography is very\u0026nbsp; useful tool to protect the content of confidential\u0026nbsp; data in\u0026nbsp; many research\u003cbr\u003e\nareas. Another one, steganography is also commonly used to hide the existence of data into cover media known\u003cbr\u003e\nas\u0026nbsp; text,\u0026nbsp; image,\u0026nbsp; audio\u0026nbsp; and\u0026nbsp; video.\u0026nbsp; In\u0026nbsp; this\u0026nbsp; work,\u0026nbsp; it\u0026nbsp; is\u0026nbsp; considered\u0026nbsp; that\u0026nbsp; the\u0026nbsp; two\u0026nbsp; most\u0026nbsp; popular\u0026nbsp; techniques\u003cbr\u003e\n(Cryptography and Steganography) should be combined to develop the strong and robust security system. At\u003cbr\u003e\nfirst,\u0026nbsp; confidentiality\u0026nbsp; and\u0026nbsp; message\u0026nbsp; authentication\u0026nbsp; requirements\u0026nbsp; are\u0026nbsp; fulfilled\u0026nbsp; with\u0026nbsp; the\u0026nbsp; help\u0026nbsp; of\u0026nbsp; Byte-Rotation\u003cbr\u003e\nEncryption\u0026nbsp; Algorithm\u0026nbsp; (BREA)\u0026nbsp; and\u0026nbsp; Secure\u0026nbsp; Hash\u0026nbsp; Algorithm-512(SHA-512).\u0026nbsp; On\u0026nbsp; the\u0026nbsp; other\u0026nbsp; hand,\u0026nbsp; a\u0026nbsp; new\u0026nbsp; data\u003cbr\u003e\nhiding approach based on the optimization of Pixel Mapping Method (OPMM) also provides the\u0026nbsp; system the\u003cbr\u003e\nhigher embedding capacity with minimum degradation of stego image quality. To analyze the performance of\u003cbr\u003e\nthe proposed OPMM, the comparison is also presented in terms of embedding capacity and Peak Signal to Noise\u003cbr\u003e\nRatio (PSNR) values.\u003c/p\u003e"}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Cryptography"}, {"interim": "Steganography"}, {"interim": "SHA-512"}, {"interim": "BREA"}, {"interim": "OPMM"}, {"interim": "Embedding Capacity"}, {"interim": "PSNR"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-04"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "An Information Security System Based on Optimized Pixel Mapping Method.pdf", "filesize": [{"value": "461 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "mimetype": "application/pdf", "size": 461000.0, "url": {"url": "https://meral.edu.mm/record/3111/files/An Information Security System Based on Optimized Pixel Mapping Method.pdf"}, "version_id": "d7f99678-fe65-42cb-978f-2ff9957f24fc"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "No 1", "subitem_journal_title": "American Scientific Research Journal for Engineering, Technology, and Sciences (ASRJETS)", "subitem_pages": "pp 222-239", "subitem_volume": "Volume 25"}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Su Mon Thu"}, {"subitem_authors_fullname": "Khin Myo Thant"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Journal article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2016-09-23"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "10.5281/zenodo.3268370"}, "item_title": "An Information Security System Based on Optimized Pixel Mapping Method", "item_type_id": "21", "owner": "1", "path": ["1596119372420"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003111", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-04"}, "publish_date": "2019-07-04", "publish_status": "0", "recid": "3111", "relation": {}, "relation_version_is_last": true, "title": ["An Information Security System Based on Optimized Pixel Mapping Method"], "weko_shared_id": -1}
An Information Security System Based on Optimized Pixel Mapping Method
http://hdl.handle.net/20.500.12678/0000003111
http://hdl.handle.net/20.500.12678/0000003111e16d5c1f-7e81-4ebe-a9ad-5f071cce37b2
951c1406-106c-4ad1-abbc-f02c022af462
Name / File | License | Actions |
---|---|---|
![]() |
|
Publication type | ||||||
---|---|---|---|---|---|---|
Journal article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | An Information Security System Based on Optimized Pixel Mapping Method | |||||
Language | en | |||||
Publication date | 2016-09-23 | |||||
Authors | ||||||
Su Mon Thu | ||||||
Khin Myo Thant | ||||||
Description | ||||||
<p>In the field of communication system and internet, the information security is playing a crucial role. At the<br> present time, communication through Internet is becoming popular and it should be accurate and secure. To<br> make it reality, cryptography is very useful tool to protect the content of confidential data in many research<br> areas. Another one, steganography is also commonly used to hide the existence of data into cover media known<br> as text, image, audio and video. In this work, it is considered that the two most popular techniques<br> (Cryptography and Steganography) should be combined to develop the strong and robust security system. At<br> first, confidentiality and message authentication requirements are fulfilled with the help of Byte-Rotation<br> Encryption Algorithm (BREA) and Secure Hash Algorithm-512(SHA-512). On the other hand, a new data<br> hiding approach based on the optimization of Pixel Mapping Method (OPMM) also provides the system the<br> higher embedding capacity with minimum degradation of stego image quality. To analyze the performance of<br> the proposed OPMM, the comparison is also presented in terms of embedding capacity and Peak Signal to Noise<br> Ratio (PSNR) values.</p> |
||||||
Keywords | ||||||
Cryptography, Steganography, SHA-512, BREA, OPMM, Embedding Capacity, PSNR | ||||||
Identifier | 10.5281/zenodo.3268370 | |||||
Journal articles | ||||||
No 1 | ||||||
American Scientific Research Journal for Engineering, Technology, and Sciences (ASRJETS) | ||||||
pp 222-239 | ||||||
Volume 25 | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |