Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "1e30d299-c8e2-4cc3-b326-7046c7d32e55"}, "_deposit": {"id": "3430", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3430"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3430", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Enhancing Security with the Combination of DCT \u0026amp; 3DES", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Information security is becoming more importantin data storage and transmission. Because of widelyused images in security process, it is the importantconfidential image data from unauthorized access.The original image was converted by using twodimensional transform and encryption 3DES withtwo keys. This system presented a transformationalgorithm based on the image cosine transformationand a well known encryption and decryptionalgorithm called 3DES. This paper also analyzed theimage encryption algorithms DCT and 3DES. Theoriginal image is encrypted after the transformationprocess. In this approach to reduce the computationalrequirements for huge volume of images andresulting high speed transformation and encryptionsystem."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Image preprocessing"}, {"interim": "Image processing"}, {"interim": "3DES"}, {"interim": "DCT and transmission"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-22"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "psc2010paper (233).pdf", "filesize": [{"value": "592 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 592000.0, "url": {"url": "https://meral.edu.mm/record/3430/files/psc2010paper (233).pdf"}, "version_id": "08f2fc99-2f1f-421b-8cda-ad59128f953e"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Aung, Theint Theint Ei Htet"}, {"subitem_authors_fullname": "Thein, Nilar"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2010-12-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1182"}, "item_title": "Enhancing Security with the Combination of DCT \u0026amp; 3DES", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003430", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-22"}, "publish_date": "2019-07-22", "publish_status": "0", "recid": "3430", "relation": {}, "relation_version_is_last": true, "title": ["Enhancing Security with the Combination of DCT \u0026amp; 3DES"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Enhancing Security with the Combination of DCT & 3DES

http://hdl.handle.net/20.500.12678/0000003430
http://hdl.handle.net/20.500.12678/0000003430
47b80a30-e2c8-4721-a97d-e4e3db120244
1e30d299-c8e2-4cc3-b326-7046c7d32e55
None
Preview
Name / File License Actions
psc2010paper psc2010paper (233).pdf (592 Kb)
Publication type
Article
Upload type
Publication
Title
Title Enhancing Security with the Combination of DCT & 3DES
Language en
Publication date 2010-12-16
Authors
Aung, Theint Theint Ei Htet
Thein, Nilar
Description
Information security is becoming more importantin data storage and transmission. Because of widelyused images in security process, it is the importantconfidential image data from unauthorized access.The original image was converted by using twodimensional transform and encryption 3DES withtwo keys. This system presented a transformationalgorithm based on the image cosine transformationand a well known encryption and decryptionalgorithm called 3DES. This paper also analyzed theimage encryption algorithms DCT and 3DES. Theoriginal image is encrypted after the transformationprocess. In this approach to reduce the computationalrequirements for huge volume of images andresulting high speed transformation and encryptionsystem.
Keywords
Image preprocessing, Image processing, 3DES, DCT and transmission
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/1182
Journal articles
Fifth Local Conference on Parallel and Soft Computing
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 10:09:02.558120
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL