Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "79af6afa-3e1c-4ad6-bf31-2465d763308a"}, "_deposit": {"id": "4665", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4665"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4665", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Implementation of Secured Image Encryption Using Chaotic Logistic Map: Comparative Study", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Nowadays, image information is routinelyused in many applications. This paper presentscomparative study for image encryption basedon Chaotic Logistic Map with external secret keyof both 80 bit and 256 bit with different logisticmaps. Security is critical issue when images aresent from journalist to editor via communicationchannel. To apply image security on this mediasystem, journalist encrypts and sends cipherimage to editor and only authorized editor candecrypt cipher image. Chaotic Logistic Map with80 bit is implemented in web based systembecause of its randomness, less correlation andunpredictable behavior in long term that aresecure and safe. Chaotic Logistic encryptionscheme provides good combination of highlysecured, fast processing, efficient and secure wayfor image encryption. Correlation coefficient,NPCR (change rate of the number of pixels ofciphered image) and histogram are analyzed toprove security of algorithm used in this system."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-03"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "201644.pdf", "filesize": [{"value": "1038 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 1038000.0, "url": {"url": "https://meral.edu.mm/record/4665/files/201644.pdf"}, "version_id": "65f44b7b-9910-4677-8bee-67444042f1f0"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fourteenth International Conference On Computer Applications (ICCA 2016)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Hlaing, Wut Yee Pwint"}, {"subitem_authors_fullname": "Aye, Zin May"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2016-02-25"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/321"}, "item_title": "Implementation of Secured Image Encryption Using Chaotic Logistic Map: Comparative Study", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004665", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-03"}, "publish_date": "2019-07-03", "publish_status": "0", "recid": "4665", "relation": {}, "relation_version_is_last": true, "title": ["Implementation of Secured Image Encryption Using Chaotic Logistic Map: Comparative Study"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Implementation of Secured Image Encryption Using Chaotic Logistic Map: Comparative Study

http://hdl.handle.net/20.500.12678/0000004665
http://hdl.handle.net/20.500.12678/0000004665
b479c45b-683d-49d9-8226-166bbe3e52d4
79af6afa-3e1c-4ad6-bf31-2465d763308a
None
Preview
Name / File License Actions
201644.pdf 201644.pdf (1038 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 15:15:12.394454
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL