Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "3722280f-867a-42ae-875e-4826ba950399"}, "_deposit": {"id": "4181", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4181"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4181", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Image Encryption based on AES Stream Cipher in Counter Mode", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "With the first evolution of digital data exchange, information security is becoming more important in data storage and transmission. Because of widely using images in industrial process, it is important to protect the confidential image data from unauthorized access. In this paper, we intend to develop software based image encryption system by applying AES in Counter Mode (AES-CTR) with an explicit initialization vector (IV). IV generation includes incrementing a counter for each packet and linear feedback shift registers (LFSRs). AES-CTR uses the AES block cipher to create stream cipher. AES-CTR uses the only AES encrypt operation for both encryption and decryption, making AES-CTR implementations smaller than implementations of many other AES modes. It is an attractive encryption algorithm for high-speed networking and improving the security of images from unauthorized access."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Advanced Encryption Standard (AES)"}, {"interim": "Counter (CTR) Mode"}, {"interim": "Image"}, {"interim": "Initialization Vector (IV)"}, {"interim": "Linear Feedback Shift Register (LFSR)"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-08-06"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "55330.pdf", "filesize": [{"value": "549 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 549000.0, "url": {"url": "https://meral.edu.mm/record/4181/files/55330.pdf"}, "version_id": "e4eb831e-e9f2-46f4-9f16-0268d2251469"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fourth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Khaing, May Thet"}, {"subitem_authors_fullname": "Aye, Zin May"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2009-12-30"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1877"}, "item_title": "Image Encryption based on AES Stream Cipher in Counter Mode", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004181", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-08-06"}, "publish_date": "2019-08-06", "publish_status": "0", "recid": "4181", "relation": {}, "relation_version_is_last": true, "title": ["Image Encryption based on AES Stream Cipher in Counter Mode"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Image Encryption based on AES Stream Cipher in Counter Mode

http://hdl.handle.net/20.500.12678/0000004181
http://hdl.handle.net/20.500.12678/0000004181
eed870a8-b8fd-4fee-8023-ecee417f6be7
3722280f-867a-42ae-875e-4826ba950399
None
Preview
Name / File License Actions
55330.pdf 55330.pdf (549 Kb)
Publication type
Article
Upload type
Publication
Title
Title Image Encryption based on AES Stream Cipher in Counter Mode
Language en
Publication date 2009-12-30
Authors
Khaing, May Thet
Aye, Zin May
Description
With the first evolution of digital data exchange, information security is becoming more important in data storage and transmission. Because of widely using images in industrial process, it is important to protect the confidential image data from unauthorized access. In this paper, we intend to develop software based image encryption system by applying AES in Counter Mode (AES-CTR) with an explicit initialization vector (IV). IV generation includes incrementing a counter for each packet and linear feedback shift registers (LFSRs). AES-CTR uses the AES block cipher to create stream cipher. AES-CTR uses the only AES encrypt operation for both encryption and decryption, making AES-CTR implementations smaller than implementations of many other AES modes. It is an attractive encryption algorithm for high-speed networking and improving the security of images from unauthorized access.
Keywords
Advanced Encryption Standard (AES), Counter (CTR) Mode, Image, Initialization Vector (IV), Linear Feedback Shift Register (LFSR)
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/1877
Journal articles
Fourth Local Conference on Parallel and Soft Computing
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 14:18:01.991339
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL