Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking


Index Link

Index Tree

  • RootNode
    • Co-operative College, Mandalay
    • Cooperative College, Phaunggyi
    • Co-operative University, Sagaing
    • Co-operative University, Thanlyin
    • Dagon University
    • Kyaukse University
    • Laquarware Technological college
    • Mandalay Technological University
    • Mandalay University of Distance Education
    • Mandalay University of Foreign Languages
    • Maubin University
    • Mawlamyine University
    • Meiktila University
    • Mohnyin University
    • Myanmar Institute of Information Technology
    • Myanmar Maritime University
    • National Management Degree College
    • Naypyitaw State Academy
    • Pathein University
    • Sagaing University
    • Sagaing University of Education
    • Taunggyi University
    • Technological University, Hmawbi
    • Technological University (Kyaukse)
    • Technological University Mandalay
    • University of Computer Studies, Mandalay
    • University of Computer Studies Maubin
    • University of Computer Studies, Meikhtila
    • University of Computer Studies Pathein
    • University of Computer Studies, Taungoo
    • University of Computer Studies, Yangon
    • University of Dental Medicine Mandalay
    • University of Dental Medicine, Yangon
    • University of Information Technology
    • University of Mandalay
    • University of Medicine 1
    • University of Medicine 2
    • University of Medicine Mandalay
    • University of Myitkyina
    • University of Public Health, Yangon
    • University of Veterinary Science
    • University of Yangon
    • West Yangon University
    • Yadanabon University
    • Yangon Technological University
    • Yangon University of Distance Education
    • Yangon University of Economics
    • Yangon University of Education
    • Yangon University of Foreign Languages
    • Yezin Agricultural University
    • New Index

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "71cbb19e-84c9-48f6-aec8-44bcb4deb1d2"}, "_deposit": {"id": "4922", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4922"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4922", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Image Encryption / Decryption System based on Permutation and Blowfish Algorithm", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Internet and networks applications are growing very fast , so the needs to protect such a applications are increased. Data encryption / decryption is used to securely transmit data in open networks . Each type of data has its own features , therefore, different techniques should be used to protect confidential image data from unauthorized access. This system presents a new permutation technique based on the combination of image permutation and a well known encryption and decryption algorithm called Blowfish ,a symmetric block cipher. Blowfish is a fast cryptographic software algorithm, using the operations of addition, XOR and look-up tables. In addition, Permutation process is also added in this system to be difficult predicting the value of pixel from the values of its neighbors. In this system, the original image is divided into 4 pixel × 4 pixels blocks, which are rearranged into a permuted image using a permutation pro Blowfish algorithm ."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Image Encryption"}, {"interim": "Image Correlation"}, {"interim": "Permutation"}, {"interim": "symmetric algorithm"}, {"interim": "Blowfish algorithm"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-12"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "psc2010paper (16).pdf", "filesize": [{"value": "349 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 349000.0, "url": {"url": "https://meral.edu.mm/record/4922/files/psc2010paper (16).pdf"}, "version_id": "4769e73c-da77-40e8-b822-f948b8362d0b"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Thu, May Phyo"}, {"subitem_authors_fullname": "Htike, Thin Thin"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2010-12-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/824"}, "item_title": "Image Encryption / Decryption System based on Permutation and Blowfish Algorithm", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004922", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-12"}, "publish_date": "2019-07-12", "publish_status": "0", "recid": "4922", "relation": {}, "relation_version_is_last": true, "title": ["Image Encryption / Decryption System based on Permutation and Blowfish Algorithm"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Image Encryption / Decryption System based on Permutation and Blowfish Algorithm

http://hdl.handle.net/20.500.12678/0000004922
http://hdl.handle.net/20.500.12678/0000004922
5fdaffa4-f0a1-43c3-8194-8786c2b7f586
71cbb19e-84c9-48f6-aec8-44bcb4deb1d2
None
Preview
Name / File License Actions
psc2010paper psc2010paper (16).pdf (349 Kb)
Publication type
Article
Upload type
Publication
Title
Title Image Encryption / Decryption System based on Permutation and Blowfish Algorithm
Language en
Publication date 2010-12-16
Authors
Thu, May Phyo
Htike, Thin Thin
Description
Internet and networks applications are growing very fast , so the needs to protect such a applications are increased. Data encryption / decryption is used to securely transmit data in open networks . Each type of data has its own features , therefore, different techniques should be used to protect confidential image data from unauthorized access. This system presents a new permutation technique based on the combination of image permutation and a well known encryption and decryption algorithm called Blowfish ,a symmetric block cipher. Blowfish is a fast cryptographic software algorithm, using the operations of addition, XOR and look-up tables. In addition, Permutation process is also added in this system to be difficult predicting the value of pixel from the values of its neighbors. In this system, the original image is divided into 4 pixel × 4 pixels blocks, which are rearranged into a permuted image using a permutation pro Blowfish algorithm .
Keywords
Image Encryption, Image Correlation, Permutation, symmetric algorithm, Blowfish algorithm
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/824
Journal articles
Fifth Local Conference on Parallel and Soft Computing
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 15:31:07.353323
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL