{"created":"2020-08-30T13:55:45.818027+00:00","id":3111,"links":{},"metadata":{"_buckets":{"deposit":"951c1406-106c-4ad1-abbc-f02c022af462"},"_deposit":{"id":"3111","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3111"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3111","sets":["1582963413512:1596119372420"]},"communities":["ytu"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"An Information Security System Based on Optimized Pixel Mapping Method","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"
In the field of communication system and internet, the information security is playing a crucial role. At the
\npresent time, communication through Internet is becoming popular and it should be accurate and secure. To
\nmake it reality, cryptography is very useful tool to protect the content of confidential data in many research
\nareas. Another one, steganography is also commonly used to hide the existence of data into cover media known
\nas text, image, audio and video. In this work, it is considered that the two most popular techniques
\n(Cryptography and Steganography) should be combined to develop the strong and robust security system. At
\nfirst, confidentiality and message authentication requirements are fulfilled with the help of Byte-Rotation
\nEncryption Algorithm (BREA) and Secure Hash Algorithm-512(SHA-512). On the other hand, a new data
\nhiding approach based on the optimization of Pixel Mapping Method (OPMM) also provides the system the
\nhigher embedding capacity with minimum degradation of stego image quality. To analyze the performance of
\nthe proposed OPMM, the comparison is also presented in terms of embedding capacity and Peak Signal to Noise
\nRatio (PSNR) values.