{"created":"2020-08-30T13:55:45.818027+00:00","id":3111,"links":{},"metadata":{"_buckets":{"deposit":"951c1406-106c-4ad1-abbc-f02c022af462"},"_deposit":{"id":"3111","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3111"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3111","sets":["1582963413512:1596119372420"]},"communities":["ytu"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"An Information Security System Based on Optimized Pixel Mapping Method","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"

In  the  field  of  communication  system  and  internet,  the  information  security  is  playing  a  crucial  role.  At  the
\npresent time, communication through Internet is becoming popular and it  should be accurate and secure. To
\nmake  it reality, cryptography is very  useful tool to protect the content of confidential  data in  many research
\nareas. Another one, steganography is also commonly used to hide the existence of data into cover media known
\nas  text,  image,  audio  and  video.  In  this  work,  it  is  considered  that  the  two  most  popular  techniques
\n(Cryptography and Steganography) should be combined to develop the strong and robust security system. At
\nfirst,  confidentiality  and  message  authentication  requirements  are  fulfilled  with  the  help  of  Byte-Rotation
\nEncryption  Algorithm  (BREA)  and  Secure  Hash  Algorithm-512(SHA-512).  On  the  other  hand,  a  new  data
\nhiding approach based on the optimization of Pixel Mapping Method (OPMM) also provides the  system the
\nhigher embedding capacity with minimum degradation of stego image quality. To analyze the performance of
\nthe proposed OPMM, the comparison is also presented in terms of embedding capacity and Peak Signal to Noise
\nRatio (PSNR) values.

"}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"Cryptography"},{"interim":"Steganography"},{"interim":"SHA-512"},{"interim":"BREA"},{"interim":"OPMM"},{"interim":"Embedding Capacity"},{"interim":"PSNR"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-04"}],"displaytype":"preview","filename":"An Information Security System Based on Optimized Pixel Mapping Method.pdf","filesize":[{"value":"461 Kb"}],"format":"application/pdf","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3111/files/An Information Security System Based on Optimized Pixel Mapping Method.pdf"},"version_id":"d7f99678-fe65-42cb-978f-2ff9957f24fc"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"No 1","subitem_journal_title":"American Scientific Research Journal for Engineering, Technology, and Sciences (ASRJETS)","subitem_pages":"pp 222-239","subitem_volume":"Volume 25"}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Su Mon Thu"},{"subitem_authors_fullname":"Khin Myo Thant"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Journal article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2016-09-23"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"10.5281/zenodo.3268370"},"item_title":"An Information Security System Based on Optimized Pixel Mapping Method","item_type_id":"21","owner":"1","path":["1596119372420"],"publish_date":"2019-07-04","publish_status":"0","recid":"3111","relation_version_is_last":true,"title":["An Information Security System Based on Optimized Pixel Mapping Method"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T05:39:49.399412+00:00"}