Index Link

  • RootNode

Item

{"_buckets": {"deposit": "a59ce50e-3e59-408d-b612-10812f50ef58"}, "_deposit": {"id": "3347", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3347"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3347", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Secure Image Encryption using BCH Error Correcting Code and Digital Signature", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "The development of communication technology,security is a major concern. The widely used imagein communication process is vital to protectimportant image data from unauthorized access. Inthis paper, the digital signature is added to theencoded image like additive noise. The encoding ofthe image is done by using Bose-ChaudhuriHochquenghem (BCH) code. At the receiver end,after the decryption of the image, the digitalsignature can be used to verify the authenticity of theimage. To generate the digital signature, the wellknownRivest-Shamir-Adleman (RSA) public keyalgorithm and MD5 Hash algorithm are used."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "BCH error correcting code"}, {"interim": "Digital signature"}, {"interim": "RSA public key encryption algorithm"}, {"interim": "MD5 hash algorithm"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-22"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "psc2010paper (172).pdf", "filesize": [{"value": "142 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 142000.0, "url": {"url": "https://meral.edu.mm/record/3347/files/psc2010paper (172).pdf"}, "version_id": "58d5c431-6bde-46ad-ac07-637c4665a26a"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Chit, Aye Myat Myat Mon"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2010-12-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1107"}, "item_title": "Secure Image Encryption using BCH Error Correcting Code and Digital Signature", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003347", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-22"}, "publish_date": "2019-07-22", "publish_status": "0", "recid": "3347", "relation": {}, "relation_version_is_last": true, "title": ["Secure Image Encryption using BCH Error Correcting Code and Digital Signature"], "weko_shared_id": -1}

Secure Image Encryption using BCH Error Correcting Code and Digital Signature

http://hdl.handle.net/20.500.12678/0000003347
89559ef8-eb70-46af-9378-0c95a3fec643
a59ce50e-3e59-408d-b612-10812f50ef58
None
Name / File License Actions
psc2010paper psc2010paper (172).pdf (142 Kb)
Publication type
Article
Upload type
Publication
Title
Title Secure Image Encryption using BCH Error Correcting Code and Digital Signature
Language en
Publication date 2010-12-16
Authors
Chit, Aye Myat Myat Mon
Description
The development of communication technology,security is a major concern. The widely used imagein communication process is vital to protectimportant image data from unauthorized access. Inthis paper, the digital signature is added to theencoded image like additive noise. The encoding ofthe image is done by using Bose-ChaudhuriHochquenghem (BCH) code. At the receiver end,after the decryption of the image, the digitalsignature can be used to verify the authenticity of theimage. To generate the digital signature, the wellknownRivest-Shamir-Adleman (RSA) public keyalgorithm and MD5 Hash algorithm are used.
Keywords
BCH error correcting code, Digital signature, RSA public key encryption algorithm, MD5 hash algorithm
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/1107
Journal articles
Fifth Local Conference on Parallel and Soft Computing
Conference papers
Books/reports/chapters
Thesis/dissertations
0
0
views
downloads
Views Downloads

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats