Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "c8c18335-810e-4e23-bb5b-4a47edbe02ed"}, "_deposit": {"id": "3363", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3363"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3363", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Data Encryption by Using Vigenere Algorithm with Stegonargaphic Technique", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "In the current computing community, securedata transfer is limited due to its attack made ondata communication. Solutions which came to therescue are cryptography and steganography.Cryptography is often used in situations where theexistence of the message is clear, but the meaningof the message is obscured. In particular, thesender transforms the message into a form thatonly the intended recipient of the message candecrypt and read. Steganography is often used insituations where the actual existence of themessage needs to be obscured. This paper isintended to ensure secure data transfer between thesource and destination by providing double layer ofprotection using both cryptography andsteganography. To implements both cryptographyand steganography, the message was encryptedbefore it is hidden inside a cover image. In thispaper, the encryption was done by using vigenereencryption method and the ciphered message wasembedded by using LSB algorithm."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-22"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "psc2010paper (185).pdf", "filesize": [{"value": "585 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 585000.0, "url": {"url": "https://meral.edu.mm/record/3363/files/psc2010paper (185).pdf"}, "version_id": "ab754b62-d8e2-42e9-bd95-e547fa979a8f"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Hlaing, Htike Ayar"}, {"subitem_authors_fullname": "Aye, Soe Soe"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2010-12-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1121"}, "item_title": "Data Encryption by Using Vigenere Algorithm with Stegonargaphic Technique", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003363", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-22"}, "publish_date": "2019-07-22", "publish_status": "0", "recid": "3363", "relation": {}, "relation_version_is_last": true, "title": ["Data Encryption by Using Vigenere Algorithm with Stegonargaphic Technique"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Data Encryption by Using Vigenere Algorithm with Stegonargaphic Technique

http://hdl.handle.net/20.500.12678/0000003363
http://hdl.handle.net/20.500.12678/0000003363
abb7cab1-d9b9-4078-b3ee-a0ecfa0e51d7
c8c18335-810e-4e23-bb5b-4a47edbe02ed
None
Preview
Name / File License Actions
psc2010paper psc2010paper (185).pdf (585 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 10:00:58.265130
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL