Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "71cbb19e-84c9-48f6-aec8-44bcb4deb1d2"}, "_deposit": {"id": "4922", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4922"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4922", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Image Encryption / Decryption System based on Permutation and Blowfish Algorithm", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Internet and networks applications are growing very fast , so the needs to protect such a applications are increased. Data encryption / decryption is used to securely transmit data in open networks . Each type of data has its own features , therefore, different techniques should be used to protect confidential image data from unauthorized access. This system presents a new permutation technique based on the combination of image permutation and a well known encryption and decryption algorithm called Blowfish ,a symmetric block cipher. Blowfish is a fast cryptographic software algorithm, using the operations of addition, XOR and look-up tables. In addition, Permutation process is also added in this system to be difficult predicting the value of pixel from the values of its neighbors. In this system, the original image is divided into 4 pixel × 4 pixels blocks, which are rearranged into a permuted image using a permutation pro Blowfish algorithm ."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Image Encryption"}, {"interim": "Image Correlation"}, {"interim": "Permutation"}, {"interim": "symmetric algorithm"}, {"interim": "Blowfish algorithm"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-12"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "psc2010paper (16).pdf", "filesize": [{"value": "349 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 349000.0, "url": {"url": "https://meral.edu.mm/record/4922/files/psc2010paper (16).pdf"}, "version_id": "4769e73c-da77-40e8-b822-f948b8362d0b"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Thu, May Phyo"}, {"subitem_authors_fullname": "Htike, Thin Thin"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2010-12-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/824"}, "item_title": "Image Encryption / Decryption System based on Permutation and Blowfish Algorithm", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004922", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-12"}, "publish_date": "2019-07-12", "publish_status": "0", "recid": "4922", "relation": {}, "relation_version_is_last": true, "title": ["Image Encryption / Decryption System based on Permutation and Blowfish Algorithm"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Image Encryption / Decryption System based on Permutation and Blowfish Algorithm

http://hdl.handle.net/20.500.12678/0000004922
http://hdl.handle.net/20.500.12678/0000004922
5fdaffa4-f0a1-43c3-8194-8786c2b7f586
71cbb19e-84c9-48f6-aec8-44bcb4deb1d2
None
Preview
Name / File License Actions
psc2010paper psc2010paper (16).pdf (349 Kb)
Publication type
Article
Upload type
Publication
Title
Title Image Encryption / Decryption System based on Permutation and Blowfish Algorithm
Language en
Publication date 2010-12-16
Authors
Thu, May Phyo
Htike, Thin Thin
Description
Internet and networks applications are growing very fast , so the needs to protect such a applications are increased. Data encryption / decryption is used to securely transmit data in open networks . Each type of data has its own features , therefore, different techniques should be used to protect confidential image data from unauthorized access. This system presents a new permutation technique based on the combination of image permutation and a well known encryption and decryption algorithm called Blowfish ,a symmetric block cipher. Blowfish is a fast cryptographic software algorithm, using the operations of addition, XOR and look-up tables. In addition, Permutation process is also added in this system to be difficult predicting the value of pixel from the values of its neighbors. In this system, the original image is divided into 4 pixel × 4 pixels blocks, which are rearranged into a permuted image using a permutation pro Blowfish algorithm .
Keywords
Image Encryption, Image Correlation, Permutation, symmetric algorithm, Blowfish algorithm
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/824
Journal articles
Fifth Local Conference on Parallel and Soft Computing
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 15:31:07.353323
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL