MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "ad3a0e60-3f3b-4517-8f9b-28199a2d5e51"}, "_deposit": {"id": "4416", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4416"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4416", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Image Encrypyion with Edge Detection", "subitem_1551255648112": "en_US"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Steganography is the technique of hiding thecommunication data by hiding data in another differentformat of data.Even though many different carrier fileformats can be used, digital images are the mostcommonly used format. For hiding encryption inimages, there exist a large variety of steganographytechniques; of which some are more complex thanothers and all of them have their respective strong andweak points. The proposed paper roughly explains andpresents the concepts of the combination ofcryptography and steganography techniques. Thispaper proposes 3 techniques for information hiding inRGB color images. (1)Canny Edge Detection forseparating am image into edge (2)Least Significant Bit(LSB) technique for hiding encrypted messages inedge, there is no much changes in the embedded image(3) Advance Encryption Standard (AES) for encryptionplain text to cipher message."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Image Processing"}, {"interim": "Steagnography and Cryptography"}, {"interim": "Canny Edge Detection"}, {"interim": "Least Significant Bit(LSB)"}, {"interim": "Advance Encryption Standard(AES)"}, {"interim": "Peak Signal to Noise Ratio(PSNR)"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-10-25"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "Image Encrypyion with Edge Detection.pdf", "filesize": [{"value": "720 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 720000.0, "url": {"url": "https://meral.edu.mm/record/4416/files/Image Encrypyion with Edge Detection.pdf"}, "version_id": "8f9e0cd5-cfb8-492d-95e9-8058fa2813f0"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Thirteenth International Conference On Computer Applications (ICCA 2015)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Wint, May Thu"}, {"subitem_authors_fullname": "Thein, Yadana"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2015-02-05"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/2350"}, "item_title": "Image Encrypyion with Edge Detection", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004416", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-10-25"}, "publish_date": "2019-10-25", "publish_status": "0", "recid": "4416", "relation": {}, "relation_version_is_last": true, "title": ["Image Encrypyion with Edge Detection"], "weko_shared_id": -1}
Image Encrypyion with Edge Detection
http://hdl.handle.net/20.500.12678/0000004416
http://hdl.handle.net/20.500.12678/0000004416400bbf86-663f-4f00-a75b-69f84958f114
ad3a0e60-3f3b-4517-8f9b-28199a2d5e51
Name / File | License | Actions |
---|---|---|
Image Encrypyion with Edge Detection.pdf (720 Kb)
|
|
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Image Encrypyion with Edge Detection | |||||
Language | en_US | |||||
Publication date | 2015-02-05 | |||||
Authors | ||||||
Wint, May Thu | ||||||
Thein, Yadana | ||||||
Description | ||||||
Steganography is the technique of hiding thecommunication data by hiding data in another differentformat of data.Even though many different carrier fileformats can be used, digital images are the mostcommonly used format. For hiding encryption inimages, there exist a large variety of steganographytechniques; of which some are more complex thanothers and all of them have their respective strong andweak points. The proposed paper roughly explains andpresents the concepts of the combination ofcryptography and steganography techniques. Thispaper proposes 3 techniques for information hiding inRGB color images. (1)Canny Edge Detection forseparating am image into edge (2)Least Significant Bit(LSB) technique for hiding encrypted messages inedge, there is no much changes in the embedded image(3) Advance Encryption Standard (AES) for encryptionplain text to cipher message. | ||||||
Keywords | ||||||
Image Processing, Steagnography and Cryptography, Canny Edge Detection, Least Significant Bit(LSB), Advance Encryption Standard(AES), Peak Signal to Noise Ratio(PSNR) | ||||||
Identifier | http://onlineresource.ucsy.edu.mm/handle/123456789/2350 | |||||
Journal articles | ||||||
Thirteenth International Conference On Computer Applications (ICCA 2015) | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |