Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "1585f3d6-bcbd-47f4-9d94-296e15bb825d"}, "_deposit": {"id": "4071", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4071"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4071", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Secure Image Encryption Based on Visual Cryptography", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Information security is a major issue today for any company or individual who conducts business electronically. It is of utmost important that mechanisms are set up to ensure information and data security. Cryptography is one of the technological means to provide security to data being transmitted on information and communications systems. In this paper we consider a new type of cryptographic scheme; encryption is used to securely transmit data in open networks. The increasing use of digital techniques for transmitting and storing images, integrity as well as the authenticity of image has become a major concern. Visual cryptography is a cryptographic technique which allows visual information to be encrypted. Visual cryptography can be seen as a one-time pad system. Then, it cannot be reused. This system presents a 2 out of 2 schemes based on visual cryptography of image encryption. Visual cryptography is a powerful technique which combines the notions of perfect ciphers and secret sharing in cryptography. Visual cryptography can decode concealed images without any cryptographic computation."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-08-05"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "55174.pdf", "filesize": [{"value": "218 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 218000.0, "url": {"url": "https://meral.edu.mm/record/4071/files/55174.pdf"}, "version_id": "cb300e99-e825-4941-99f6-38fe0fd50154"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fourth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Aung, Cho Cho"}, {"subitem_authors_fullname": "Mya, Khin Than"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2009-12-30"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1777"}, "item_title": "Secure Image Encryption Based on Visual Cryptography", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004071", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-08-05"}, "publish_date": "2019-08-05", "publish_status": "0", "recid": "4071", "relation": {}, "relation_version_is_last": true, "title": ["Secure Image Encryption Based on Visual Cryptography"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Secure Image Encryption Based on Visual Cryptography

http://hdl.handle.net/20.500.12678/0000004071
http://hdl.handle.net/20.500.12678/0000004071
fe6d8e36-3d57-496b-b482-c4d95e1c638a
1585f3d6-bcbd-47f4-9d94-296e15bb825d
None
Preview
Name / File License Actions
55174.pdf 55174.pdf (218 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 14:03:00.052186
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL