Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "4339ff7c-58d3-41cc-b616-4b5d42acf055"}, "_deposit": {"created_by": 92, "id": "7106", "owner": "92", "owners": [92], "owners_ext": {"displayname": "", "username": ""}, "pid": {"revision_id": 0, "type": "depid", "value": "7106"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/00007106", "sets": ["user-miit"]}, "communities": ["miit"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Image Encryption Using RC6 and MARS", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "With the fast progression of data exchange in electronic way, information security is becoming more important in data storage and transmission. Because of widely using images in industrial process, it is important to protect the confidential image data from unauthorized access. In this paper, we compared image encryption algorithms and compression is added for two of them RC6 and MARS image encryptions. Implementations of these two algorithms have been realized for experimental purpose. The results of analysis are given in this paper."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Encryption"}, {"interim": "Encryption quality"}, {"interim": "RC6"}, {"interim": "MARS"}, {"interim": "Histogram"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2020-12-30"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "Yi Yi Aung Paper.pdf", "filesize": [{"value": "142 KB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_0", "mimetype": "application/pdf", "size": 142000.0, "url": {"url": "https://meral.edu.mm/record/7106/files/Yi Yi Aung Paper.pdf"}, "version_id": "04f7246e-65d2-4be8-97a0-977883e03b24"}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "PSC", "subitem_c_date": "30.12.2009", "subitem_conference_title": "The 4th Conference on Parallel and Soft Computing", "subitem_place": "University of Computer Studies , Yangon , Myanmar"}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Yi Yi Aung"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Conference paper"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2009-12-15"}, "item_title": "Image Encryption Using RC6 and MARS", "item_type_id": "21", "owner": "92", "path": ["1582963674932", "1597397014014"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000007106", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2020-12-30"}, "publish_date": "2020-12-30", "publish_status": "0", "recid": "7106", "relation": {}, "relation_version_is_last": true, "title": ["Image Encryption Using RC6 and MARS"], "weko_shared_id": -1}
  1. Myanmar Institute of Information Technology
  1. Myanmar Institute of Information Technology
  2. Faculty of Computer System and Technology

Image Encryption Using RC6 and MARS

http://hdl.handle.net/20.500.12678/0000007106
http://hdl.handle.net/20.500.12678/0000007106
ad912a13-5c35-4796-9a1c-a28a41e89dda
4339ff7c-58d3-41cc-b616-4b5d42acf055
None
Preview
Name / File License Actions
Yi Yi Yi Aung Paper.pdf (142 KB)
license.icon
Publication type
Conference paper
Upload type
Publication
Title
Title Image Encryption Using RC6 and MARS
Language en
Publication date 2009-12-15
Authors
Yi Yi Aung
Description
With the fast progression of data exchange in electronic way, information security is becoming more important in data storage and transmission. Because of widely using images in industrial process, it is important to protect the confidential image data from unauthorized access. In this paper, we compared image encryption algorithms and compression is added for two of them RC6 and MARS image encryptions. Implementations of these two algorithms have been realized for experimental purpose. The results of analysis are given in this paper.
Keywords
Encryption, Encryption quality, RC6, MARS, Histogram
Conference papers
PSC
30.12.2009
The 4th Conference on Parallel and Soft Computing
University of Computer Studies , Yangon , Myanmar
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-12-30 08:53:56.815648
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL