Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "3b860eba-73e3-4d78-8bfb-53cd7f839542"}, "_deposit": {"id": "3392", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3392"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3392", "sets": ["1597824273898", "user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Data Security System based on Cryptography and Steganography", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Data security system is implemented by using two methods: cryptography and steganography. The effect of these two methods enhances the security of the data and intended to hide and cover the messages within one of the standard media, images. Encryption the data with a cryptography algorithm called Sosemanuk stream cipher. This encryption process is done with help of crypto-key, and the detection or reading of encrypted information is possible only having the key. After encryption, a part of the encrypted message (cipher) is hidden in Least Significant Bit of an image file using steganography algorithm. The technique used in this field replaces the LSB of image pixels with intended secret bits. The system can be used as a part to protect e-mail messages, credit card information, corporate data, etc."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Cryptography"}, {"interim": "Steganography"}, {"interim": "Data Security"}, {"interim": "Sosemanuk Stream Cipher"}, {"interim": "LSB"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-22"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "psc2010paper (209).pdf", "filesize": [{"value": "330 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 330000.0, "url": {"url": "https://meral.edu.mm/record/3392/files/psc2010paper (209).pdf"}, "version_id": "5e3108ab-18fe-4dbd-bb16-08136b6871bf"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Nwe, Aye Aye"}, {"subitem_authors_fullname": "Win, Myat Su"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2010-12-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1148"}, "item_title": "Data Security System based on Cryptography and Steganography", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003392", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-22"}, "publish_date": "2019-07-22", "publish_status": "0", "recid": "3392", "relation": {}, "relation_version_is_last": true, "title": ["Data Security System based on Cryptography and Steganography"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Data Security System based on Cryptography and Steganography

http://hdl.handle.net/20.500.12678/0000003392
http://hdl.handle.net/20.500.12678/0000003392
9d4dc08e-d965-4aa9-98b4-c7610f2e02e7
3b860eba-73e3-4d78-8bfb-53cd7f839542
None
Preview
Name / File License Actions
psc2010paper psc2010paper (209).pdf (330 Kb)
Publication type
Article
Upload type
Publication
Title
Title Data Security System based on Cryptography and Steganography
Language en
Publication date 2010-12-16
Authors
Nwe, Aye Aye
Win, Myat Su
Description
Data security system is implemented by using two methods: cryptography and steganography. The effect of these two methods enhances the security of the data and intended to hide and cover the messages within one of the standard media, images. Encryption the data with a cryptography algorithm called Sosemanuk stream cipher. This encryption process is done with help of crypto-key, and the detection or reading of encrypted information is possible only having the key. After encryption, a part of the encrypted message (cipher) is hidden in Least Significant Bit of an image file using steganography algorithm. The technique used in this field replaces the LSB of image pixels with intended secret bits. The system can be used as a part to protect e-mail messages, credit card information, corporate data, etc.
Keywords
Cryptography, Steganography, Data Security, Sosemanuk Stream Cipher, LSB
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/1148
Journal articles
Fifth Local Conference on Parallel and Soft Computing
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 10:04:17.375930
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL