Image Security using Image Encryption and Image Stitching
- Diploma
- BCA
- B.Sc
- B.Tech/B.E.
- M.Sc
- MCA
- M.Tech/M.E.
Abstract—With increase in digital communication, multimedia data such as digital images, videos etc. we require fast and robust security systems. To achieve high security, encryption is one of the way to protect our data from unauthorized users. In this paper, the proposed model aims to provide security to the images using a combination of image encryption and image stitching techniques. The use of chaotic methods in the encryption makes it more difficult for the attackers to decrypt the image. Every image to be transferred is first partitioned and then each part is encrypted and sent to the receiver. That is why a person with a single part or two parts of the image will not be able to use that image. Image stitching algorithm used on the receivers end makes it easy for him to generate the original image. Image encryption along with image stitching provides a double layer of protection to the image. The need for this approach is to achieve security and privacy during the communication
3 years ago
DOWNLOAD
Related Topics
Data mining techniques are used for mining useful trends or patterns from textual and image data sets. Medical data mining is very important field as it has significant utility in healthcare domain in the real world. The mining techniques can help the healthcare industry to improve quality of ser...
- Diploma
- BCA
- B.Sc
- B.Tech/B.E.
- M.Sc
- MCA
- M.Tech/M.E.
Technologies
ABSTRACT: In current digital Era, the volume of data that is being generated through various processes in the Health care industry has become unmanageable. More than structured data there are a lot of unstructured data that is being generated. Relevant research indicate that are many issues that ...
- Diploma
- BCA
- B.Sc
- B.Tech/B.E.
- M.Sc
- MCA
- M.Tech/M.E.
Technologies
Abstract—As the worlds of commerce and the Internet technology become more inextricably linked, a large number of user consumption series become available for online market intelligence analysis. A critical demand along this line is to predict the future product adoption state of each user, which...
- Diploma
- BCA
- B.Sc
- B.Tech/B.E.
- M.Sc
- MCA
- M.Tech/M.E.
Technologies
Abstract— Bike sharing systems offer a low cost and environmentally friendly mean of transportation for short travels. It can also be used as a complementary mode to other public transit such as buses, local trains. Bike sharing systems combine the advantages of public and private transportation ...
- Diploma
- BCA
- B.Sc
- B.Tech/B.E.
- M.Sc
- MCA
- M.Tech/M.E.
Technologies
Abstract—This paper investigates the security of partial ?ngerprint-based authentication systems, especially when multiple ?ngerprints of a user are enrolled. A number of consumer electronic devices, such as smartphones, are beginning to incorporate ?ngerprint sensors for user authentication. The...
- Diploma
- BCA
- B.Sc
- B.Tech/B.E.
- M.Sc
- MCA
- M.Tech/M.E.
Technologies