Image Morphing with Data Security

Abstract

Along with Computer and Network Security.Data Security plays a vital role in today world. Data is of great importance. In this paper, we have discussed how the data can be secured. This paper deals with hiding your encrypted data inside an image. Now this image would be covered by another image. We will apply some morphing techniques on these covered images to get morphed images. Now the morphed image is sent on the network. No one in the network can predict about data inside morphed images except the intended sender and receiver. This paper deals with three algorithms. The three algorithms are required for doing three different specific task. This paper deals with RSA algorithm for encrypting data .Second Water- marking embedding and extraction algorithm is used for hiding information inside image. And the third algorithm used is Hide and Extract image algorithm to cover your image behind other image

Authors and Affiliations

Ankita Deshmukh

Keywords

Related Articles

The Role of Optical Amplifiers in Soliton Communication System: A Review

The soliton is an innovative area of research that deserves intense investigation in many branches of physics. Different class of soliton-bearing models has been proposed in many physical problems in various context of p...

Transforming Smart Healthcare through the Internet of Things (IoT)

In the Internet of Things (IoT), gadgets acquire and percentage information directly with every other and the cloud, making it feasible to accumulate, document and examine new information streams quicker and extra approp...

Right to Equality

The topic of my research is ‘Right to Equality’. Right to Equality is itself a vast topic mentioned from Article 14-!8 and but in this research I would be dealing specifically on Article 141. There are in...

Evaluation of Nutritional and Sensory Quality Characteristics of Pumpkin Pies

The present study was conducted to develop and investigate pumpkin pies to assess its prospect in marketability and study their shelf-life. Fresh pumpkin was used to produce pumpkin puree. The pumpkin pies were prepared...

Projective Change between Special (α , β) - Finsler Metric and Rander’s Metric

Finsler geometry is originated from Differential geometry. Finsler geometry is Riemannian metric without quadratic restriction. In Finsler space we see special metrics such as Randers metric, Kropina metric and Matsumoto...

Download PDF file
  • EP ID EP220181
  • DOI -
  • Views 164
  • Downloads 0

How To Cite

Ankita Deshmukh (2014). Image Morphing with Data Security. International journal of Emerging Trends in Science and Technology, 1(1), 53-56. https://europub.co.uk/articles/-A-220181