Image Morphing with Data Security
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2014, Vol 1, Issue 1
Abstract
Along with Computer and Network Security.Data Security plays a vital role in today world. Data is of great importance. In this paper, we have discussed how the data can be secured. This paper deals with hiding your encrypted data inside an image. Now this image would be covered by another image. We will apply some morphing techniques on these covered images to get morphed images. Now the morphed image is sent on the network. No one in the network can predict about data inside morphed images except the intended sender and receiver. This paper deals with three algorithms. The three algorithms are required for doing three different specific task. This paper deals with RSA algorithm for encrypting data .Second Water- marking embedding and extraction algorithm is used for hiding information inside image. And the third algorithm used is Hide and Extract image algorithm to cover your image behind other image
Authors and Affiliations
Ankita Deshmukh
A Real Time Telehelth Monitoring System
Now a day's healthcare industry is to provide better healthcare to people anytime and anywhere in the world in a more economic and patient friendly manner. In the present paper the physiological parameters such as ECG, P...
Use of Continuous Integration in Single Page Rendering Web Application Development
This paper is mainly focused on single page rendering web application development using continuous integration. The Continuous Integration (CI) is a software development life cycle process which mainly focuses on automat...
The Study of Plant Diversity of SRR Government Arts & Science College Campus, Karimnagar, Telangana, India
Plant Systematics is a great discipline for identification of the different plant species.This provides the basic information about the different plant species. In the present study ,a total of 180 species representing 1...
Effects of Some Heavy Metals on the Life-Table Parameters of Anopheles stephensi (Liston) (Diptera: Culicidae)
The exposure sub lethal doses of three heavy metals, Cd, Fe and Mn as solutions of CdCl2, FeCl3 and MnCl2 resulted a variable increase in mortalities of various life stages (L1-L4, pupa), adult emergence and generation m...
An Effective Way to Search Tags from Large Scale RFID System
Radio frequency identification (RFID) technology has many applications in inventory management, supply chain, product tracking, transportation, and logistics. The research issue of practical importance is to search for a...