{"created":"2020-09-01T10:08:56.902022+00:00","id":3430,"links":{},"metadata":{"_buckets":{"deposit":"1e30d299-c8e2-4cc3-b326-7046c7d32e55"},"_deposit":{"id":"3430","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3430"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3430","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Enhancing Security with the Combination of DCT & 3DES","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Information security is becoming more importantin data storage and transmission. Because of widelyused images in security process, it is the importantconfidential image data from unauthorized access.The original image was converted by using twodimensional transform and encryption 3DES withtwo keys. This system presented a transformationalgorithm based on the image cosine transformationand a well known encryption and decryptionalgorithm called 3DES. This paper also analyzed theimage encryption algorithms DCT and 3DES. Theoriginal image is encrypted after the transformationprocess. In this approach to reduce the computationalrequirements for huge volume of images andresulting high speed transformation and encryptionsystem."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"Image preprocessing"},{"interim":"Image processing"},{"interim":"3DES"},{"interim":"DCT and transmission"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-22"}],"displaytype":"preview","filename":"psc2010paper (233).pdf","filesize":[{"value":"592 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3430/files/psc2010paper (233).pdf"},"version_id":"08f2fc99-2f1f-421b-8cda-ad59128f953e"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Fifth Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Aung, Theint Theint Ei Htet"},{"subitem_authors_fullname":"Thein, Nilar"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2010-12-16"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1182"},"item_title":"Enhancing Security with the Combination of DCT & 3DES","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-22","publish_status":"0","recid":"3430","relation_version_is_last":true,"title":["Enhancing Security with the Combination of DCT & 3DES"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T05:56:51.694110+00:00"}