Image Morphing with Data Security

Abstract

Along with Computer and Network Security.Data Security plays a vital role in today world. Data is of great importance. In this paper, we have discussed how the data can be secured. This paper deals with hiding your encrypted data inside an image. Now this image would be covered by another image. We will apply some morphing techniques on these covered images to get morphed images. Now the morphed image is sent on the network. No one in the network can predict about data inside morphed images except the intended sender and receiver. This paper deals with three algorithms. The three algorithms are required for doing three different specific task. This paper deals with RSA algorithm for encrypting data .Second Water- marking embedding and extraction algorithm is used for hiding information inside image. And the third algorithm used is Hide and Extract image algorithm to cover your image behind other image

Authors and Affiliations

Ankita Deshmukh

Keywords

Related Articles

Diffusion in Artificial Kidney (Haemodialyser)

In this paper the diffusion equation is solved by separation of variable method and analyzed Frobenius infinite series approximation. Finally, I have written a computer program using Turbo C++ and simulate the method for...

Thinking and Experiences as a Base of Philosophical Understanding

These philosophical words are words of self minded; many times reading philosophy can confuse someone because it has many different theories of different thinkers and philosophers. Taking a time of reading philosophy wil...

Some Fixed point theorems in Complex Valued Metric Space using Weak Compatible Mappings

The aim of the present paper is to establish fixed point theorems for self mappings under weakly compatibility in Complex valued metric space. Subject Classification: 47H10,54H25

Synthesis and Characterization of Copper Nanoparticles, Using Combination of Two Different Sizes of Balls in Wet Ball Milling

The applications of nanoparticles are in biological Nano sensors, optoelectronics, Nano devices, Nano electronics, information storage ,catalysis and Nano fluids which differ significantly from size to size of nanopartic...

Internet of Things (IoT) with Cloud Computing and Machine-to-Machine (M2M) Communication

The Internet of Things (IoT) is a new revolution of the Internet. Objects make themselves recognizable and they obtain intelligence by making or enabling context related decisions. They can communicate information about...

Download PDF file
  • EP ID EP220181
  • DOI -
  • Views 168
  • Downloads 0

How To Cite

Ankita Deshmukh (2014). Image Morphing with Data Security. International journal of Emerging Trends in Science and Technology, 1(1), 53-56. https://europub.co.uk/articles/-A-220181