Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "ccf02dfc-11a7-41f0-aa7c-eaa4ebb53263"}, "_deposit": {"id": "4761", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4761"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4761", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Combining Cryptography and Steganography for Efficient Secure Image Transmission", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "The security of data transferring is accepted asthe challenging problem all over the world. In thissystem, the image file of any kinds of format isencrypted by using S-DES (Simplified Data EncryptionStandard) in Cryptography, and then the cipher isembedded into the innocuous cover image file by usingLSB (Least Significant Bit) in Steganography. Since SDESis a standard education algorithm providing atradeoff between encryption speed and security that isrequired for image encryption, encryption anddecryption process of this system is extremely fast. Tobe more secure, cover image file is used to hide theobtained cipher. As this system takes the advantage ofboth techniques, image transferring is moreconfidential. In this paper, the system implementsSDES and LSB."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-02"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "1.Combining Cryptography and Steganography for Efficient Sec.pdf", "filesize": [{"value": "209 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 209000.0, "url": {"url": "https://meral.edu.mm/record/4761/files/1.Combining Cryptography and Steganography for Efficient Sec.pdf"}, "version_id": "aa3ceae1-4d12-4470-b155-5cc42d182f6b"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Thirteenth International Conferences on Computer Applications(ICCA 2015)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Win, Khin Cho"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2015-02-05"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/57"}, "item_title": "Combining Cryptography and Steganography for Efficient Secure Image Transmission", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004761", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-02"}, "publish_date": "2019-07-02", "publish_status": "0", "recid": "4761", "relation": {}, "relation_version_is_last": true, "title": ["Combining Cryptography and Steganography for Efficient Secure Image Transmission"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Combining Cryptography and Steganography for Efficient Secure Image Transmission

http://hdl.handle.net/20.500.12678/0000004761
http://hdl.handle.net/20.500.12678/0000004761
50a67818-14f2-4c69-a426-8c96e83cc5d9
ccf02dfc-11a7-41f0-aa7c-eaa4ebb53263
None
Preview
Name / File License Actions
1.Combining 1.Combining Cryptography and Steganography for Efficient Sec.pdf (209 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 15:20:05.481041
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL