{"created":"2020-09-01T10:01:14.035707+00:00","id":3365,"links":{},"metadata":{"_buckets":{"deposit":"ef25ffb9-7854-4e23-abfe-788771693d85"},"_deposit":{"id":"3365","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3365"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3365","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Secure Image Encryption based on Baker Chaos Function","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Image information is important, especially in thefield of military. When those images are transmittedover the communication channel, it needs theprivacy. There are a lot of image encryptionalgorithms. Because of storing large size of pixels,most of the functions are not appropriate for theimage encryption.This paper presents an alternative symmetrickeyencryption algorithm for securing images,namely Secure Image Encryption based on chaos.Generally, it comprises of three main components:(1) horizontal-vertical transformation function(HVT); (2) shift function (S), and (3) gray scalefunction (GS). HVT function is based on a twodimensionalchaotic map that utilized Baker’s mapalgorithm. GS function extends the algorithm tothree-dimension, whereby, the third dimension refersto the level of the grayscale of a pixel. This secureimage encryption applies to encrypt military images,such as Maps, Buildings, Army forces, etc."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-22"}],"displaytype":"preview","filename":"psc2010paper (186).pdf","filesize":[{"value":"254 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3365/files/psc2010paper (186).pdf"},"version_id":"54a3aef0-0431-4b79-b455-761194858300"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Fifth Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Nandar, Saw Mya"},{"subitem_authors_fullname":"Aye, Soe Soe"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2010-12-16"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1123"},"item_title":"Secure Image Encryption based on Baker Chaos Function","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-22","publish_status":"0","recid":"3365","relation_version_is_last":true,"title":["Secure Image Encryption based on Baker Chaos Function"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2022-03-24T23:16:48.200452+00:00"}