MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "3722280f-867a-42ae-875e-4826ba950399"}, "_deposit": {"id": "4181", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4181"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4181", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Image Encryption based on AES Stream Cipher in Counter Mode", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "With the first evolution of digital data exchange, information security is becoming more important in data storage and transmission. Because of widely using images in industrial process, it is important to protect the confidential image data from unauthorized access. In this paper, we intend to develop software based image encryption system by applying AES in Counter Mode (AES-CTR) with an explicit initialization vector (IV). IV generation includes incrementing a counter for each packet and linear feedback shift registers (LFSRs). AES-CTR uses the AES block cipher to create stream cipher. AES-CTR uses the only AES encrypt operation for both encryption and decryption, making AES-CTR implementations smaller than implementations of many other AES modes. It is an attractive encryption algorithm for high-speed networking and improving the security of images from unauthorized access."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Advanced Encryption Standard (AES)"}, {"interim": "Counter (CTR) Mode"}, {"interim": "Image"}, {"interim": "Initialization Vector (IV)"}, {"interim": "Linear Feedback Shift Register (LFSR)"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-08-06"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "55330.pdf", "filesize": [{"value": "549 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 549000.0, "url": {"url": "https://meral.edu.mm/record/4181/files/55330.pdf"}, "version_id": "e4eb831e-e9f2-46f4-9f16-0268d2251469"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fourth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Khaing, May Thet"}, {"subitem_authors_fullname": "Aye, Zin May"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2009-12-30"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1877"}, "item_title": "Image Encryption based on AES Stream Cipher in Counter Mode", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004181", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-08-06"}, "publish_date": "2019-08-06", "publish_status": "0", "recid": "4181", "relation": {}, "relation_version_is_last": true, "title": ["Image Encryption based on AES Stream Cipher in Counter Mode"], "weko_shared_id": -1}
Image Encryption based on AES Stream Cipher in Counter Mode
http://hdl.handle.net/20.500.12678/0000004181
http://hdl.handle.net/20.500.12678/0000004181eed870a8-b8fd-4fee-8023-ecee417f6be7
3722280f-867a-42ae-875e-4826ba950399
Name / File | License | Actions |
---|---|---|
55330.pdf (549 Kb)
|
|
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Image Encryption based on AES Stream Cipher in Counter Mode | |||||
Language | en | |||||
Publication date | 2009-12-30 | |||||
Authors | ||||||
Khaing, May Thet | ||||||
Aye, Zin May | ||||||
Description | ||||||
With the first evolution of digital data exchange, information security is becoming more important in data storage and transmission. Because of widely using images in industrial process, it is important to protect the confidential image data from unauthorized access. In this paper, we intend to develop software based image encryption system by applying AES in Counter Mode (AES-CTR) with an explicit initialization vector (IV). IV generation includes incrementing a counter for each packet and linear feedback shift registers (LFSRs). AES-CTR uses the AES block cipher to create stream cipher. AES-CTR uses the only AES encrypt operation for both encryption and decryption, making AES-CTR implementations smaller than implementations of many other AES modes. It is an attractive encryption algorithm for high-speed networking and improving the security of images from unauthorized access. | ||||||
Keywords | ||||||
Advanced Encryption Standard (AES), Counter (CTR) Mode, Image, Initialization Vector (IV), Linear Feedback Shift Register (LFSR) | ||||||
Identifier | http://onlineresource.ucsy.edu.mm/handle/123456789/1877 | |||||
Journal articles | ||||||
Fourth Local Conference on Parallel and Soft Computing | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |