Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "e1987691-a259-4a23-9e74-20a02e135cb5"}, "_deposit": {"id": "3945", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3945"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3945", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Secure Image Encryption Using Block-based and Blowfish Symmetric Algorithms", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Encryption is used to securely transmit data inopen networks. It can also be defined as the process ofobscuring information to make it unreasonable without specialknowledge. Encryption is the process of transformation theimages to ensure its security. Most of the available encryptionalgorithms are mainly used for textual data and may not besuitable for multimedia data such as images. This systempresents a block-based transformation algorithm based on thecombination of image transformation and a well knownencryption and decryption algorithm called Blowfish. Theoriginal image is divided into a random number of blocks andthen shuffle within the image. The generated image is encryptedusing the blowfish encryption algorithm. From the results, thecorrelation between image elements was significantly decreasedby using the proposed technique. It takes a variable-length key,from 32 bits to 448 bits. Blowfish is a fast cryptographicsoftware algorithm and symmetric and symmetric block cipher."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-08-02"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "Secure Image Encryption Using Block.pdf", "filesize": [{"value": "11 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 11000.0, "url": {"url": "https://meral.edu.mm/record/3945/files/Secure Image Encryption Using Block.pdf"}, "version_id": "c44e460d-0f9c-47a0-8cc9-6bafac9f3fd9"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Third Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Htet, Yi Mon"}, {"subitem_authors_fullname": "Mya, Khin Than"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2009-08-03"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1662"}, "item_title": "Secure Image Encryption Using Block-based and Blowfish Symmetric Algorithms", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003945", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-08-02"}, "publish_date": "2019-08-02", "publish_status": "0", "recid": "3945", "relation": {}, "relation_version_is_last": true, "title": ["Secure Image Encryption Using Block-based and Blowfish Symmetric Algorithms"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Secure Image Encryption Using Block-based and Blowfish Symmetric Algorithms

http://hdl.handle.net/20.500.12678/0000003945
http://hdl.handle.net/20.500.12678/0000003945
50c31a8f-f10a-469b-b0d3-207c767f9e2c
e1987691-a259-4a23-9e74-20a02e135cb5
None
Preview
Name / File License Actions
Secure Secure Image Encryption Using Block.pdf (11 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 13:48:03.610263
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL