{"created":"2020-12-21T08:01:10.090173+00:00","id":6961,"links":{},"metadata":{"_buckets":{"deposit":"adbc36b2-4489-48fd-8405-e8205192ff84"},"_deposit":{"created_by":92,"id":"6961","owner":"92","owners":[92],"owners_ext":{"displayname":"","email":"khin_sandar_chit@miit.edu.mm","username":""},"pid":{"revision_id":0,"type":"depid","value":"6961"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/00006961","sets":["1582963674932:1597397014014"]},"communities":["miit"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Security of Digiital Images Using Cryptographic Algorithms","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Today, the world is going to be digitalized in all the ways. Every business units, government and private sectors, research units are using the digital image as transferring mode for every critical data. These images over the internet which will not be secure. Therefore, there is a need of image security. Currently, there exists various image security techniques like encryption, watermarking, steganography, etc. In this paper, we compared image encryption algorithms. Implementations of these algorithms have been realized for experimental purpose. The results of analysis are given in this paper."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"Cryptographic Algorithms"},{"interim":"Image Encryption"},{"interim":"Encryption procecss"},{"interim":"Histogram"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2020-12-21"}],"displaytype":"preview","filename":"Security of Digital Images Using Cryptographic.pdf","filesize":[{"value":"1.3 MB"}],"format":"application/pdf","url":{"url":"https://meral.edu.mm/record/6961/files/Security of Digital Images Using Cryptographic.pdf"},"version_id":"26bf6fa9-ce09-4547-962e-901e87fa8ac3"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"VIII","subitem_journal_title":"International Journal of Research and Innovation in Applied Science (IJRIAS)","subitem_pages":"103-106","subitem_volume":"Vol - IV"}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Yi Yi Aung"},{"subitem_authors_fullname":"Tin Mar Kyi"},{"subitem_authors_fullname":"Myo Thidar Win"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Journal article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2019-09-07"},"item_title":"Security of Digiital Images Using Cryptographic Algorithms","item_type_id":"21","owner":"92","path":["1597397014014"],"publish_date":"2020-12-21","publish_status":"0","recid":"6961","relation_version_is_last":true,"title":["Security of Digiital Images Using Cryptographic Algorithms"],"weko_creator_id":"92","weko_shared_id":-1},"updated":"2021-12-13T01:59:35.152691+00:00"}