{"created":"2020-09-01T14:05:43.528198+00:00","id":4089,"links":{},"metadata":{"_buckets":{"deposit":"d372ca47-a53b-452a-83fe-617f8bbee99f"},"_deposit":{"id":"4089","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4089"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4089","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Encrypting and Decrypting Photos Using Cat Chaotic Map","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Digital image encryption/decryption is to transform a meaningful image into a meaningless or disordered image in order to enhance the power to resist invalid attack and in turn enhance the security. This paper presents a new scheme of digital image encryption based on the cat chaotic mapping. In this system, a cat chaotic mapping is used to disorder the pixel coordinates of the digital image and then perform exclusive OR operation between certain pixel value of the digital image and a chaotic value that is dependent on the encryption parameters, the iterative time and the coordinates. In addition, the statistical characteristics of the encrypted digital image can be uniformed by diffusion technique of Cat Chaotic Map. Hence this system is easy to realize, has satisfied scrambling effect, and can be used as pretreatment for digital image hiding and disguising."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-08-05"}],"displaytype":"preview","filename":"55207.pdf","filesize":[{"value":"403 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4089/files/55207.pdf"},"version_id":"eab7d64a-9a10-4707-a035-adb957b22954"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Fourth Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Khaing, Thal Ei"},{"subitem_authors_fullname":"Oo, May Phyo"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2009-12-30"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1793"},"item_title":"Encrypting and Decrypting Photos Using Cat Chaotic Map","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-08-05","publish_status":"0","recid":"4089","relation_version_is_last":true,"title":["Encrypting and Decrypting Photos Using Cat Chaotic Map"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T04:00:06.558918+00:00"}