MERAL Myanmar Education Research and Learning Portal
-
RootNode
-
Co-operative College, Mandalay
-
Cooperative College, Phaunggyi
-
Co-operative University, Sagaing
-
Co-operative University, Thanlyin
-
Dagon University
-
Kyaukse University
-
Laquarware Technological college
-
Mandalay Technological University
-
Mandalay University of Distance Education
-
Mandalay University of Foreign Languages
-
Maubin University
-
Mawlamyine University
-
Meiktila University
-
Mohnyin University
-
Myanmar Institute of Information Technology
-
Myanmar Maritime University
-
National Management Degree College
-
Naypyitaw State Academy
-
Pathein University
-
Sagaing University
-
Sagaing University of Education
-
Taunggyi University
-
Technological University, Hmawbi
-
Technological University (Kyaukse)
-
Technological University Mandalay
-
University of Computer Studies, Mandalay
-
University of Computer Studies Maubin
-
University of Computer Studies, Meikhtila
-
University of Computer Studies Pathein
-
University of Computer Studies, Taungoo
-
University of Computer Studies, Yangon
-
University of Dental Medicine Mandalay
-
University of Dental Medicine, Yangon
-
University of Information Technology
-
University of Mandalay
-
University of Medicine 1
-
University of Medicine 2
-
University of Medicine Mandalay
-
University of Myitkyina
-
University of Public Health, Yangon
-
University of Veterinary Science
-
University of Yangon
-
West Yangon University
-
Yadanabon University
-
Yangon Technological University
-
Yangon University of Distance Education
-
Yangon University of Economics
-
Yangon University of Education
-
Yangon University of Foreign Languages
-
Yezin Agricultural University
-
New Index
-
Item
{"_buckets": {"deposit": "71cbb19e-84c9-48f6-aec8-44bcb4deb1d2"}, "_deposit": {"id": "4922", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4922"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4922", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Image Encryption / Decryption System based on Permutation and Blowfish Algorithm", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Internet and networks applications are growing very fast , so the needs to protect such a applications are increased. Data encryption / decryption is used to securely transmit data in open networks . Each type of data has its own features , therefore, different techniques should be used to protect confidential image data from unauthorized access. This system presents a new permutation technique based on the combination of image permutation and a well known encryption and decryption algorithm called Blowfish ,a symmetric block cipher. Blowfish is a fast cryptographic software algorithm, using the operations of addition, XOR and look-up tables. In addition, Permutation process is also added in this system to be difficult predicting the value of pixel from the values of its neighbors. In this system, the original image is divided into 4 pixel × 4 pixels blocks, which are rearranged into a permuted image using a permutation pro Blowfish algorithm ."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Image Encryption"}, {"interim": "Image Correlation"}, {"interim": "Permutation"}, {"interim": "symmetric algorithm"}, {"interim": "Blowfish algorithm"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-12"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "psc2010paper (16).pdf", "filesize": [{"value": "349 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 349000.0, "url": {"url": "https://meral.edu.mm/record/4922/files/psc2010paper (16).pdf"}, "version_id": "4769e73c-da77-40e8-b822-f948b8362d0b"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Thu, May Phyo"}, {"subitem_authors_fullname": "Htike, Thin Thin"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2010-12-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/824"}, "item_title": "Image Encryption / Decryption System based on Permutation and Blowfish Algorithm", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004922", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-12"}, "publish_date": "2019-07-12", "publish_status": "0", "recid": "4922", "relation": {}, "relation_version_is_last": true, "title": ["Image Encryption / Decryption System based on Permutation and Blowfish Algorithm"], "weko_shared_id": -1}
Image Encryption / Decryption System based on Permutation and Blowfish Algorithm
http://hdl.handle.net/20.500.12678/0000004922
http://hdl.handle.net/20.500.12678/00000049225fdaffa4-f0a1-43c3-8194-8786c2b7f586
71cbb19e-84c9-48f6-aec8-44bcb4deb1d2
Name / File | License | Actions |
---|---|---|
![]() |
|
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Image Encryption / Decryption System based on Permutation and Blowfish Algorithm | |||||
Language | en | |||||
Publication date | 2010-12-16 | |||||
Authors | ||||||
Thu, May Phyo | ||||||
Htike, Thin Thin | ||||||
Description | ||||||
Internet and networks applications are growing very fast , so the needs to protect such a applications are increased. Data encryption / decryption is used to securely transmit data in open networks . Each type of data has its own features , therefore, different techniques should be used to protect confidential image data from unauthorized access. This system presents a new permutation technique based on the combination of image permutation and a well known encryption and decryption algorithm called Blowfish ,a symmetric block cipher. Blowfish is a fast cryptographic software algorithm, using the operations of addition, XOR and look-up tables. In addition, Permutation process is also added in this system to be difficult predicting the value of pixel from the values of its neighbors. In this system, the original image is divided into 4 pixel × 4 pixels blocks, which are rearranged into a permuted image using a permutation pro Blowfish algorithm . | ||||||
Keywords | ||||||
Image Encryption, Image Correlation, Permutation, symmetric algorithm, Blowfish algorithm | ||||||
Identifier | http://onlineresource.ucsy.edu.mm/handle/123456789/824 | |||||
Journal articles | ||||||
Fifth Local Conference on Parallel and Soft Computing | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |