{"created":"2020-09-01T12:58:38.311279+00:00","id":3458,"links":{},"metadata":{"_buckets":{"deposit":"c9fea375-d0f0-4f99-a740-832fb407b39f"},"_deposit":{"id":"3458","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3458"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3458","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Performance Comparison of Chaotic Cat Map and Modified Chaotic Cat Map Encryption","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Nowadays, Image information is routinely used in many applications. When those images are transmitted over the communication channel, it needs the privacy. Therefore, Image encryption plays an important role in protecting images. This paper presents an image encryption based on chaotic algorithm for securing images. In this system, chaotic maps are used to disorder the pixel coordinates of the digital image and then perform exclusive OR operation between certain pixel value of the digital image and chaotic value. The implementations of Cat chaotic map and Modified Cat Chaotic map encryption algorithm are presented for different types of image files such as jpeg, bmp, gif and so on. Finally, the computational running times to analyze the encryption time and decryption time of the two algorithms are compared."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-23"}],"displaytype":"preview","filename":"psc2010paper (23).pdf","filesize":[{"value":"290 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3458/files/psc2010paper (23).pdf"},"version_id":"638d691c-4752-422f-b3bd-835e7c565db3"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Fifth Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Myint, Moe Moe"},{"subitem_authors_fullname":"Kyu, Khin Kyu"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2010-12-16"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1206"},"item_title":"Performance Comparison of Chaotic Cat Map and Modified Chaotic Cat Map Encryption","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-23","publish_status":"0","recid":"3458","relation_version_is_last":true,"title":["Performance Comparison of Chaotic Cat Map and Modified Chaotic Cat Map Encryption"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T06:09:23.870664+00:00"}