-
RootNode
Item
{"_buckets": {"deposit": "a59ce50e-3e59-408d-b612-10812f50ef58"}, "_deposit": {"id": "3347", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3347"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3347", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Secure Image Encryption using BCH Error Correcting Code and Digital Signature", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "The development of communication technology,security is a major concern. The widely used imagein communication process is vital to protectimportant image data from unauthorized access. Inthis paper, the digital signature is added to theencoded image like additive noise. The encoding ofthe image is done by using Bose-ChaudhuriHochquenghem (BCH) code. At the receiver end,after the decryption of the image, the digitalsignature can be used to verify the authenticity of theimage. To generate the digital signature, the wellknownRivest-Shamir-Adleman (RSA) public keyalgorithm and MD5 Hash algorithm are used."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "BCH error correcting code"}, {"interim": "Digital signature"}, {"interim": "RSA public key encryption algorithm"}, {"interim": "MD5 hash algorithm"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-22"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "psc2010paper (172).pdf", "filesize": [{"value": "142 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 142000.0, "url": {"url": "https://meral.edu.mm/record/3347/files/psc2010paper (172).pdf"}, "version_id": "58d5c431-6bde-46ad-ac07-637c4665a26a"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Chit, Aye Myat Myat Mon"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2010-12-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1107"}, "item_title": "Secure Image Encryption using BCH Error Correcting Code and Digital Signature", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003347", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-22"}, "publish_date": "2019-07-22", "publish_status": "0", "recid": "3347", "relation": {}, "relation_version_is_last": true, "title": ["Secure Image Encryption using BCH Error Correcting Code and Digital Signature"], "weko_shared_id": -1}
Secure Image Encryption using BCH Error Correcting Code and Digital Signature
http://hdl.handle.net/20.500.12678/0000003347
http://hdl.handle.net/20.500.12678/000000334789559ef8-eb70-46af-9378-0c95a3fec643
a59ce50e-3e59-408d-b612-10812f50ef58
Name / File | License | Actions |
---|---|---|
![]() |
|
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Secure Image Encryption using BCH Error Correcting Code and Digital Signature | |||||
Language | en | |||||
Publication date | 2010-12-16 | |||||
Authors | ||||||
Chit, Aye Myat Myat Mon | ||||||
Description | ||||||
The development of communication technology,security is a major concern. The widely used imagein communication process is vital to protectimportant image data from unauthorized access. Inthis paper, the digital signature is added to theencoded image like additive noise. The encoding ofthe image is done by using Bose-ChaudhuriHochquenghem (BCH) code. At the receiver end,after the decryption of the image, the digitalsignature can be used to verify the authenticity of theimage. To generate the digital signature, the wellknownRivest-Shamir-Adleman (RSA) public keyalgorithm and MD5 Hash algorithm are used. | ||||||
Keywords | ||||||
BCH error correcting code, Digital signature, RSA public key encryption algorithm, MD5 hash algorithm | ||||||
Identifier | http://onlineresource.ucsy.edu.mm/handle/123456789/1107 | |||||
Journal articles | ||||||
Fifth Local Conference on Parallel and Soft Computing | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |