{"created":"2020-12-30T08:48:34.121601+00:00","id":7106,"links":{},"metadata":{"_buckets":{"deposit":"4339ff7c-58d3-41cc-b616-4b5d42acf055"},"_deposit":{"created_by":92,"id":"7106","owner":"92","owners":[92],"owners_ext":{"displayname":"","email":"khin_sandar_chit@miit.edu.mm","username":""},"pid":{"revision_id":0,"type":"depid","value":"7106"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/00007106","sets":["1582963674932","1582963674932:1597397014014"]},"communities":["miit"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Image Encryption Using RC6 and MARS","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"With the fast progression of data exchange in electronic way, information security is becoming more important in data storage and transmission. Because of widely using images in industrial process, it is important to protect the confidential image data from unauthorized access. In this paper, we compared image encryption algorithms and compression is added for two of them RC6 and MARS image encryptions. Implementations of these two algorithms have been realized for experimental purpose. The results of analysis are given in this paper."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"Encryption"},{"interim":"Encryption quality"},{"interim":"RC6"},{"interim":"MARS"},{"interim":"Histogram"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2020-12-30"}],"displaytype":"preview","filename":"Yi Yi Aung Paper.pdf","filesize":[{"value":"142 KB"}],"format":"application/pdf","licensetype":"license_0","url":{"url":"https://meral.edu.mm/record/7106/files/Yi Yi Aung Paper.pdf"},"version_id":"04f7246e-65d2-4be8-97a0-977883e03b24"}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"PSC","subitem_c_date":"30.12.2009","subitem_conference_title":"The 4th Conference on Parallel and Soft Computing","subitem_place":"University of Computer Studies , Yangon , Myanmar"}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Yi Yi Aung"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Conference paper"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2009-12-15"},"item_title":"Image Encryption Using RC6 and MARS","item_type_id":"21","owner":"92","path":["1582963674932","1597397014014"],"publish_date":"2020-12-30","publish_status":"0","recid":"7106","relation_version_is_last":true,"title":["Image Encryption Using RC6 and MARS"],"weko_creator_id":"92","weko_shared_id":-1},"updated":"2021-12-13T02:29:00.832100+00:00"}