{"created":"2020-09-01T15:20:03.193356+00:00","id":4761,"links":{},"metadata":{"_buckets":{"deposit":"ccf02dfc-11a7-41f0-aa7c-eaa4ebb53263"},"_deposit":{"id":"4761","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4761"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4761","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Combining Cryptography and Steganography for Efficient Secure Image Transmission","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"The security of data transferring is accepted asthe challenging problem all over the world. In thissystem, the image file of any kinds of format isencrypted by using S-DES (Simplified Data EncryptionStandard) in Cryptography, and then the cipher isembedded into the innocuous cover image file by usingLSB (Least Significant Bit) in Steganography. Since SDESis a standard education algorithm providing atradeoff between encryption speed and security that isrequired for image encryption, encryption anddecryption process of this system is extremely fast. Tobe more secure, cover image file is used to hide theobtained cipher. As this system takes the advantage ofboth techniques, image transferring is moreconfidential. In this paper, the system implementsSDES and LSB."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-02"}],"displaytype":"preview","filename":"1.Combining Cryptography and Steganography for Efficient Sec.pdf","filesize":[{"value":"209 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4761/files/1.Combining Cryptography and Steganography for Efficient Sec.pdf"},"version_id":"aa3ceae1-4d12-4470-b155-5cc42d182f6b"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Thirteenth International Conferences on Computer Applications(ICCA 2015)","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Win, Khin Cho"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2015-02-05"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/57"},"item_title":"Combining Cryptography and Steganography for Efficient Secure Image Transmission","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-02","publish_status":"0","recid":"4761","relation_version_is_last":true,"title":["Combining Cryptography and Steganography for Efficient Secure Image Transmission"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T06:20:30.055210+00:00"}