{"created":"2020-09-01T15:31:04.059156+00:00","id":4922,"links":{},"metadata":{"_buckets":{"deposit":"71cbb19e-84c9-48f6-aec8-44bcb4deb1d2"},"_deposit":{"id":"4922","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4922"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4922","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Image Encryption / Decryption System based on Permutation and Blowfish Algorithm","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Internet and networks applications are growing very fast , so the needs to protect such a applications are increased. Data encryption / decryption is used to securely transmit data in open networks . Each type of data has its own features , therefore, different techniques should be used to protect confidential image data from unauthorized access. This system presents a new permutation technique based on the combination of image permutation and a well known encryption and decryption algorithm called Blowfish ,a symmetric block cipher. Blowfish is a fast cryptographic software algorithm, using the operations of addition, XOR and look-up tables. In addition, Permutation process is also added in this system to be difficult predicting the value of pixel from the values of its neighbors. In this system, the original image is divided into 4 pixel × 4 pixels blocks, which are rearranged into a permuted image using a permutation pro Blowfish algorithm ."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"Image Encryption"},{"interim":"Image Correlation"},{"interim":"Permutation"},{"interim":"symmetric algorithm"},{"interim":"Blowfish algorithm"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-12"}],"displaytype":"preview","filename":"psc2010paper (16).pdf","filesize":[{"value":"349 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4922/files/psc2010paper (16).pdf"},"version_id":"4769e73c-da77-40e8-b822-f948b8362d0b"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Fifth Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Thu, May Phyo"},{"subitem_authors_fullname":"Htike, Thin Thin"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2010-12-16"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/824"},"item_title":"Image Encryption / Decryption System based on Permutation and Blowfish Algorithm","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-12","publish_status":"0","recid":"4922","relation_version_is_last":true,"title":["Image Encryption / Decryption System based on Permutation and Blowfish Algorithm"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T06:22:27.971824+00:00"}