{"created":"2020-09-01T13:47:59.264200+00:00","id":3944,"links":{},"metadata":{"_buckets":{"deposit":"cee73886-9263-40f4-97e3-b3e4ab634c81"},"_deposit":{"id":"3944","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3944"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3944","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Secure Image Encryption for Military Images based on Baker’s Chaotic Mapping","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Nowadays, Image information is important,especially in the field of military. When those images aretransmitted over the communication channel, it needs theprivacy. Therefore, Image encryption plays important role.There are a lot of image encryption algorithms alreadypresented. Because of storing large size of pixels, most of thefunctions are not appropriate for the image encryption. Thissystem will present an alternative symmetric-key encryptionalgorithm for securing images, namely Secure Image Encryptionbased on chaos. Generally, it comprises of three maincomponents: (1) horizontal vertical transformation function(HVT); (2) Shift function(S), and (3) grayscale function (GS)HVT function is based on a two-dimensional chaotic map thatutilized Baker’s map algorithm. GS function extends thealgorithm to three-dimension, whereby, the third dimensionrefers to the level of the grayscale of a pixel. This secure imageencryption will be applied to encrypt military images, such asMaps, Buildings, Arm forces, etc."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-08-02"}],"displaytype":"preview","filename":"Secure Image Encryption for Military Images based on Baker.pdf","filesize":[{"value":"8 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3944/files/Secure Image Encryption for Military Images based on Baker.pdf"},"version_id":"72b731e2-1c9a-4ccd-a560-40d6f6f34a05"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Third Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Htet, Lwin"},{"subitem_authors_fullname":"Win, Su Thawda"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2009-08-03"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1661"},"item_title":"Secure Image Encryption for Military Images based on Baker’s Chaotic Mapping","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-08-02","publish_status":"0","recid":"3944","relation_version_is_last":true,"title":["Secure Image Encryption for Military Images based on Baker’s Chaotic Mapping"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T00:50:00.502804+00:00"}