MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "1585f3d6-bcbd-47f4-9d94-296e15bb825d"}, "_deposit": {"id": "4071", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4071"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4071", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Secure Image Encryption Based on Visual Cryptography", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Information security is a major issue today for any company or individual who conducts business electronically. It is of utmost important that mechanisms are set up to ensure information and data security. Cryptography is one of the technological means to provide security to data being transmitted on information and communications systems. In this paper we consider a new type of cryptographic scheme; encryption is used to securely transmit data in open networks. The increasing use of digital techniques for transmitting and storing images, integrity as well as the authenticity of image has become a major concern. Visual cryptography is a cryptographic technique which allows visual information to be encrypted. Visual cryptography can be seen as a one-time pad system. Then, it cannot be reused. This system presents a 2 out of 2 schemes based on visual cryptography of image encryption. Visual cryptography is a powerful technique which combines the notions of perfect ciphers and secret sharing in cryptography. Visual cryptography can decode concealed images without any cryptographic computation."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-08-05"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "55174.pdf", "filesize": [{"value": "218 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 218000.0, "url": {"url": "https://meral.edu.mm/record/4071/files/55174.pdf"}, "version_id": "cb300e99-e825-4941-99f6-38fe0fd50154"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fourth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Aung, Cho Cho"}, {"subitem_authors_fullname": "Mya, Khin Than"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2009-12-30"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1777"}, "item_title": "Secure Image Encryption Based on Visual Cryptography", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004071", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-08-05"}, "publish_date": "2019-08-05", "publish_status": "0", "recid": "4071", "relation": {}, "relation_version_is_last": true, "title": ["Secure Image Encryption Based on Visual Cryptography"], "weko_shared_id": -1}
Secure Image Encryption Based on Visual Cryptography
http://hdl.handle.net/20.500.12678/0000004071
http://hdl.handle.net/20.500.12678/0000004071fe6d8e36-3d57-496b-b482-c4d95e1c638a
1585f3d6-bcbd-47f4-9d94-296e15bb825d
Name / File | License | Actions |
---|---|---|
55174.pdf (218 Kb)
|
|