Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "ef25ffb9-7854-4e23-abfe-788771693d85"}, "_deposit": {"id": "3365", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3365"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3365", "sets": ["1597824273898", "user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Secure Image Encryption based on Baker Chaos Function", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Image information is important, especially in thefield of military. When those images are transmittedover the communication channel, it needs theprivacy. There are a lot of image encryptionalgorithms. Because of storing large size of pixels,most of the functions are not appropriate for theimage encryption.This paper presents an alternative symmetrickeyencryption algorithm for securing images,namely Secure Image Encryption based on chaos.Generally, it comprises of three main components:(1) horizontal-vertical transformation function(HVT); (2) shift function (S), and (3) gray scalefunction (GS). HVT function is based on a twodimensionalchaotic map that utilized Baker’s mapalgorithm. GS function extends the algorithm tothree-dimension, whereby, the third dimension refersto the level of the grayscale of a pixel. This secureimage encryption applies to encrypt military images,such as Maps, Buildings, Army forces, etc."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-22"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "psc2010paper (186).pdf", "filesize": [{"value": "254 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 254000.0, "url": {"url": "https://meral.edu.mm/record/3365/files/psc2010paper (186).pdf"}, "version_id": "54a3aef0-0431-4b79-b455-761194858300"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Nandar, Saw Mya"}, {"subitem_authors_fullname": "Aye, Soe Soe"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2010-12-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1123"}, "item_title": "Secure Image Encryption based on Baker Chaos Function", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003365", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-22"}, "publish_date": "2019-07-22", "publish_status": "0", "recid": "3365", "relation": {}, "relation_version_is_last": true, "title": ["Secure Image Encryption based on Baker Chaos Function"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Secure Image Encryption based on Baker Chaos Function

http://hdl.handle.net/20.500.12678/0000003365
http://hdl.handle.net/20.500.12678/0000003365
3d5fcb5f-837b-4df8-a1c5-15625a9d09b8
ef25ffb9-7854-4e23-abfe-788771693d85
None
Preview
Name / File License Actions
psc2010paper psc2010paper (186).pdf (254 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 10:01:16.812241
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL