{"created":"2020-09-01T15:15:11.551572+00:00","id":4665,"links":{},"metadata":{"_buckets":{"deposit":"79af6afa-3e1c-4ad6-bf31-2465d763308a"},"_deposit":{"id":"4665","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4665"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4665","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Implementation of Secured Image Encryption Using Chaotic Logistic Map: Comparative Study","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Nowadays, image information is routinelyused in many applications. This paper presentscomparative study for image encryption basedon Chaotic Logistic Map with external secret keyof both 80 bit and 256 bit with different logisticmaps. Security is critical issue when images aresent from journalist to editor via communicationchannel. To apply image security on this mediasystem, journalist encrypts and sends cipherimage to editor and only authorized editor candecrypt cipher image. Chaotic Logistic Map with80 bit is implemented in web based systembecause of its randomness, less correlation andunpredictable behavior in long term that aresecure and safe. Chaotic Logistic encryptionscheme provides good combination of highlysecured, fast processing, efficient and secure wayfor image encryption. Correlation coefficient,NPCR (change rate of the number of pixels ofciphered image) and histogram are analyzed toprove security of algorithm used in this system."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-03"}],"displaytype":"preview","filename":"201644.pdf","filesize":[{"value":"1038 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4665/files/201644.pdf"},"version_id":"65f44b7b-9910-4677-8bee-67444042f1f0"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Fourteenth International Conference On Computer Applications (ICCA 2016)","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Hlaing, Wut Yee Pwint"},{"subitem_authors_fullname":"Aye, Zin May"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2016-02-25"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/321"},"item_title":"Implementation of Secured Image Encryption Using Chaotic Logistic Map: Comparative Study","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-03","publish_status":"0","recid":"4665","relation_version_is_last":true,"title":["Implementation of Secured Image Encryption Using Chaotic Logistic Map: Comparative Study"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T02:22:19.933954+00:00"}