Image Security using Image Encryption and Image Stitching

  • Diploma
  • BCA
  • B.Sc
  • B.Tech/B.E.
  • M.Sc
  • MCA
  • M.Tech/M.E.
Technologies
  • .netMVC
  • PHP
  • Python
  • Java
  • Django

Abstract—With increase in digital communication, multimedia data such as digital images, videos etc. we require fast and robust security systems. To achieve high security, encryption is one of the way to protect our data from unauthorized users. In this paper, the proposed model aims to provide security to the images using a combination of image encryption and image stitching techniques. The use of chaotic methods in the encryption makes it more difficult for the attackers to decrypt the image. Every image to be transferred is first partitioned and then each part is encrypted and sent to the receiver. That is why a person with a single part or two parts of the image will not be able to use that image. Image stitching algorithm used on the receivers end makes it easy for him to generate the original image. Image encryption along with image stitching provides a double layer of protection to the image. The need for this approach is to achieve security and privacy during the communication

3 years ago


DOWNLOAD


Related Topics

A Novel Data Mining Approach for Brain Tumour Detection

Data mining techniques are used for mining useful trends or patterns from textual and image data sets. Medical data mining is very important field as it has significant utility in healthcare domain in the real world. The mining techniques can help the healthcare industry to improve quality of ser...

  • Diploma
  • BCA
  • B.Sc
  • B.Tech/B.E.
  • M.Sc
  • MCA
  • M.Tech/M.E.


Technologies
  • .netMVC
  • PHP
  • Python
  • Java
  • Django
Challenges in Storage and Retrival of Healthcare Data:Review of various NoSQL Technologies

ABSTRACT: In current digital Era, the volume of data that is being generated through various processes in the Health care industry has become unmanageable. More than structured data there are a lot of unstructured data that is being generated. Relevant research indicate that are many issues that ...

  • Diploma
  • BCA
  • B.Sc
  • B.Tech/B.E.
  • M.Sc
  • MCA
  • M.Tech/M.E.


Technologies
  • .netMVC
  • PHP
  • Python
  • Java
  • Django
  • BigData
  • HBase
  • Hadoop
Product Adoption Rate Prediction in a Competitive Market

Abstract—As the worlds of commerce and the Internet technology become more inextricably linked, a large number of user consumption series become available for online market intelligence analysis. A critical demand along this line is to predict the future product adoption state of each user, which...

  • Diploma
  • BCA
  • B.Sc
  • B.Tech/B.E.
  • M.Sc
  • MCA
  • M.Tech/M.E.


Technologies
  • .netMVC
  • PHP
  • Python
  • Java
  • Django
  • BigData
  • HBase
  • Hadoop
  • Android
Bike Sharing & Rental System: An Android Application

Abstract— Bike sharing systems offer a low cost and environmentally friendly mean of transportation for short travels. It can also be used as a complementary mode to other public transit such as buses, local trains. Bike sharing systems combine the advantages of public and private transportation ...

  • Diploma
  • BCA
  • B.Sc
  • B.Tech/B.E.
  • M.Sc
  • MCA
  • M.Tech/M.E.


Technologies
  • .netMVC
  • PHP
  • Python
  • Java
  • Django
  • BigData
  • HBase
  • Hadoop
  • Android
MasterPrint: Exploring the Vulnerability of Partial Fingerprint-based Authentication Systems

Abstract—This paper investigates the security of partial ?ngerprint-based authentication systems, especially when multiple ?ngerprints of a user are enrolled. A number of consumer electronic devices, such as smartphones, are beginning to incorporate ?ngerprint sensors for user authentication. The...

  • Diploma
  • BCA
  • B.Sc
  • B.Tech/B.E.
  • M.Sc
  • MCA
  • M.Tech/M.E.


Technologies
  • .netMVC
  • PHP
  • Python
  • Java
  • Django
  • BigData
  • HBase
  • Hadoop
  • Android