MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "3b860eba-73e3-4d78-8bfb-53cd7f839542"}, "_deposit": {"id": "3392", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3392"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3392", "sets": ["1597824273898", "user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Data Security System based on Cryptography and Steganography", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Data security system is implemented by using two methods: cryptography and steganography. The effect of these two methods enhances the security of the data and intended to hide and cover the messages within one of the standard media, images. Encryption the data with a cryptography algorithm called Sosemanuk stream cipher. This encryption process is done with help of crypto-key, and the detection or reading of encrypted information is possible only having the key. After encryption, a part of the encrypted message (cipher) is hidden in Least Significant Bit of an image file using steganography algorithm. The technique used in this field replaces the LSB of image pixels with intended secret bits. The system can be used as a part to protect e-mail messages, credit card information, corporate data, etc."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Cryptography"}, {"interim": "Steganography"}, {"interim": "Data Security"}, {"interim": "Sosemanuk Stream Cipher"}, {"interim": "LSB"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-22"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "psc2010paper (209).pdf", "filesize": [{"value": "330 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 330000.0, "url": {"url": "https://meral.edu.mm/record/3392/files/psc2010paper (209).pdf"}, "version_id": "5e3108ab-18fe-4dbd-bb16-08136b6871bf"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Nwe, Aye Aye"}, {"subitem_authors_fullname": "Win, Myat Su"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2010-12-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1148"}, "item_title": "Data Security System based on Cryptography and Steganography", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003392", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-22"}, "publish_date": "2019-07-22", "publish_status": "0", "recid": "3392", "relation": {}, "relation_version_is_last": true, "title": ["Data Security System based on Cryptography and Steganography"], "weko_shared_id": -1}
Data Security System based on Cryptography and Steganography
http://hdl.handle.net/20.500.12678/0000003392
http://hdl.handle.net/20.500.12678/00000033929d4dc08e-d965-4aa9-98b4-c7610f2e02e7
3b860eba-73e3-4d78-8bfb-53cd7f839542
Name / File | License | Actions |
---|---|---|
psc2010paper (209).pdf (330 Kb)
|
|
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Data Security System based on Cryptography and Steganography | |||||
Language | en | |||||
Publication date | 2010-12-16 | |||||
Authors | ||||||
Nwe, Aye Aye | ||||||
Win, Myat Su | ||||||
Description | ||||||
Data security system is implemented by using two methods: cryptography and steganography. The effect of these two methods enhances the security of the data and intended to hide and cover the messages within one of the standard media, images. Encryption the data with a cryptography algorithm called Sosemanuk stream cipher. This encryption process is done with help of crypto-key, and the detection or reading of encrypted information is possible only having the key. After encryption, a part of the encrypted message (cipher) is hidden in Least Significant Bit of an image file using steganography algorithm. The technique used in this field replaces the LSB of image pixels with intended secret bits. The system can be used as a part to protect e-mail messages, credit card information, corporate data, etc. | ||||||
Keywords | ||||||
Cryptography, Steganography, Data Security, Sosemanuk Stream Cipher, LSB | ||||||
Identifier | http://onlineresource.ucsy.edu.mm/handle/123456789/1148 | |||||
Journal articles | ||||||
Fifth Local Conference on Parallel and Soft Computing | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |