MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "cee73886-9263-40f4-97e3-b3e4ab634c81"}, "_deposit": {"id": "3944", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3944"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3944", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Secure Image Encryption for Military Images based on Baker’s Chaotic Mapping", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Nowadays, Image information is important,especially in the field of military. When those images aretransmitted over the communication channel, it needs theprivacy. Therefore, Image encryption plays important role.There are a lot of image encryption algorithms alreadypresented. Because of storing large size of pixels, most of thefunctions are not appropriate for the image encryption. Thissystem will present an alternative symmetric-key encryptionalgorithm for securing images, namely Secure Image Encryptionbased on chaos. Generally, it comprises of three maincomponents: (1) horizontal vertical transformation function(HVT); (2) Shift function(S), and (3) grayscale function (GS)HVT function is based on a two-dimensional chaotic map thatutilized Baker’s map algorithm. GS function extends thealgorithm to three-dimension, whereby, the third dimensionrefers to the level of the grayscale of a pixel. This secure imageencryption will be applied to encrypt military images, such asMaps, Buildings, Arm forces, etc."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-08-02"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "Secure Image Encryption for Military Images based on Baker.pdf", "filesize": [{"value": "8 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 8000.0, "url": {"url": "https://meral.edu.mm/record/3944/files/Secure Image Encryption for Military Images based on Baker.pdf"}, "version_id": "72b731e2-1c9a-4ccd-a560-40d6f6f34a05"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Third Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Htet, Lwin"}, {"subitem_authors_fullname": "Win, Su Thawda"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2009-08-03"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1661"}, "item_title": "Secure Image Encryption for Military Images based on Baker’s Chaotic Mapping", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003944", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-08-02"}, "publish_date": "2019-08-02", "publish_status": "0", "recid": "3944", "relation": {}, "relation_version_is_last": true, "title": ["Secure Image Encryption for Military Images based on Baker’s Chaotic Mapping"], "weko_shared_id": -1}
Secure Image Encryption for Military Images based on Baker’s Chaotic Mapping
http://hdl.handle.net/20.500.12678/0000003944
http://hdl.handle.net/20.500.12678/0000003944d2e8a0ef-80e8-41fa-bb5f-11fdcce8ea17
cee73886-9263-40f4-97e3-b3e4ab634c81
Name / File | License | Actions |
---|---|---|
Secure Image Encryption for Military Images based on Baker.pdf (8 Kb)
|
|