Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "ad3a0e60-3f3b-4517-8f9b-28199a2d5e51"}, "_deposit": {"id": "4416", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4416"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4416", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Image Encrypyion with Edge Detection", "subitem_1551255648112": "en_US"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Steganography is the technique of hiding thecommunication data by hiding data in another differentformat of data.Even though many different carrier fileformats can be used, digital images are the mostcommonly used format. For hiding encryption inimages, there exist a large variety of steganographytechniques; of which some are more complex thanothers and all of them have their respective strong andweak points. The proposed paper roughly explains andpresents the concepts of the combination ofcryptography and steganography techniques. Thispaper proposes 3 techniques for information hiding inRGB color images. (1)Canny Edge Detection forseparating am image into edge (2)Least Significant Bit(LSB) technique for hiding encrypted messages inedge, there is no much changes in the embedded image(3) Advance Encryption Standard (AES) for encryptionplain text to cipher message."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Image Processing"}, {"interim": "Steagnography and Cryptography"}, {"interim": "Canny Edge Detection"}, {"interim": "Least Significant Bit(LSB)"}, {"interim": "Advance Encryption Standard(AES)"}, {"interim": "Peak Signal to Noise Ratio(PSNR)"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-10-25"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "Image Encrypyion with Edge Detection.pdf", "filesize": [{"value": "720 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 720000.0, "url": {"url": "https://meral.edu.mm/record/4416/files/Image Encrypyion with Edge Detection.pdf"}, "version_id": "8f9e0cd5-cfb8-492d-95e9-8058fa2813f0"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Thirteenth International Conference On Computer Applications (ICCA 2015)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Wint, May Thu"}, {"subitem_authors_fullname": "Thein, Yadana"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2015-02-05"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/2350"}, "item_title": "Image Encrypyion with Edge Detection", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004416", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-10-25"}, "publish_date": "2019-10-25", "publish_status": "0", "recid": "4416", "relation": {}, "relation_version_is_last": true, "title": ["Image Encrypyion with Edge Detection"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Image Encrypyion with Edge Detection

http://hdl.handle.net/20.500.12678/0000004416
http://hdl.handle.net/20.500.12678/0000004416
400bbf86-663f-4f00-a75b-69f84958f114
ad3a0e60-3f3b-4517-8f9b-28199a2d5e51
None
Preview
Name / File License Actions
Image Image Encrypyion with Edge Detection.pdf (720 Kb)
Publication type
Article
Upload type
Publication
Title
Title Image Encrypyion with Edge Detection
Language en_US
Publication date 2015-02-05
Authors
Wint, May Thu
Thein, Yadana
Description
Steganography is the technique of hiding thecommunication data by hiding data in another differentformat of data.Even though many different carrier fileformats can be used, digital images are the mostcommonly used format. For hiding encryption inimages, there exist a large variety of steganographytechniques; of which some are more complex thanothers and all of them have their respective strong andweak points. The proposed paper roughly explains andpresents the concepts of the combination ofcryptography and steganography techniques. Thispaper proposes 3 techniques for information hiding inRGB color images. (1)Canny Edge Detection forseparating am image into edge (2)Least Significant Bit(LSB) technique for hiding encrypted messages inedge, there is no much changes in the embedded image(3) Advance Encryption Standard (AES) for encryptionplain text to cipher message.
Keywords
Image Processing, Steagnography and Cryptography, Canny Edge Detection, Least Significant Bit(LSB), Advance Encryption Standard(AES), Peak Signal to Noise Ratio(PSNR)
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/2350
Journal articles
Thirteenth International Conference On Computer Applications (ICCA 2015)
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 14:44:40.355783
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL