{"created":"2020-09-01T09:59:07.795577+00:00","id":3347,"links":{},"metadata":{"_buckets":{"deposit":"a59ce50e-3e59-408d-b612-10812f50ef58"},"_deposit":{"id":"3347","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3347"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3347","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Secure Image Encryption using BCH Error Correcting Code and Digital Signature","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"The development of communication technology,security is a major concern. The widely used imagein communication process is vital to protectimportant image data from unauthorized access. Inthis paper, the digital signature is added to theencoded image like additive noise. The encoding ofthe image is done by using Bose-ChaudhuriHochquenghem (BCH) code. At the receiver end,after the decryption of the image, the digitalsignature can be used to verify the authenticity of theimage. To generate the digital signature, the wellknownRivest-Shamir-Adleman (RSA) public keyalgorithm and MD5 Hash algorithm are used."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"BCH error correcting code"},{"interim":"Digital signature"},{"interim":"RSA public key encryption algorithm"},{"interim":"MD5 hash algorithm"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-22"}],"displaytype":"preview","filename":"psc2010paper (172).pdf","filesize":[{"value":"142 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3347/files/psc2010paper (172).pdf"},"version_id":"58d5c431-6bde-46ad-ac07-637c4665a26a"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Fifth Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Chit, Aye Myat Myat Mon"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2010-12-16"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1107"},"item_title":"Secure Image Encryption using BCH Error Correcting Code and Digital Signature","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-22","publish_status":"0","recid":"3347","relation_version_is_last":true,"title":["Secure Image Encryption using BCH Error Correcting Code and Digital Signature"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T06:02:30.356644+00:00"}