Image Security using Image Encryption and Image Stitching

  • Diploma
  • BCA
  • B.Sc
  • B.Tech/B.E.
  • M.Sc
  • MCA
  • M.Tech/M.E.
Technologies
  • .netMVC
  • PHP
  • Python
  • Java
  • Django

Abstract—With increase in digital communication, multimedia data such as digital images, videos etc. we require fast and robust security systems. To achieve high security, encryption is one of the way to protect our data from unauthorized users. In this paper, the proposed model aims to provide security to the images using a combination of image encryption and image stitching techniques. The use of chaotic methods in the encryption makes it more difficult for the attackers to decrypt the image. Every image to be transferred is first partitioned and then each part is encrypted and sent to the receiver. That is why a person with a single part or two parts of the image will not be able to use that image. Image stitching algorithm used on the receivers end makes it easy for him to generate the original image. Image encryption along with image stitching provides a double layer of protection to the image. The need for this approach is to achieve security and privacy during the communication

3 years ago


DOWNLOAD


Related Topics

Student Learning Context Analysis by Emotional Intelligence with Data Mining Tools

The emotions of human in every part of a life are usual and unavoidable. The emotions uplift or cast down a person facing different situations in each moment. The main objective of this research work is to provide learning with emotional-based approach and to analyze the result using data mining ...

  • Diploma
  • BCA
  • B.Sc
  • B.Tech/B.E.
  • M.Sc
  • MCA
  • M.Tech/M.E.


Technologies
  • .netMVC
  • PHP
  • Python
  • Java
  • Django
“Landslide Prediction Using Machine Learning”

This paper introduces the current machine learning approach to solving problems in the domain of landslide susceptibility assessment. Three different machine learning algorithms can be compared: Support Vector Machines, Decision Trees and Logistic Regression. Any three landslide slopes in a selec...

  • Diploma
  • BCA
  • B.Sc
  • B.Tech/B.E.
  • M.Sc
  • MCA
  • M.Tech/M.E.


Technologies
  • .netMVC
  • PHP
  • Python
  • Java
  • Django
Leukemia Detection using Digital Image Processing Techniques

ABSTRACT :This paper discusses about methods for detection of leukemia. Various image processing techniques are used for identification of red blood cell and immature white cells. Different disease like anemia, leukemia, malaria, deficiency of vitamin B12, etc. can be diagnosed accordingly. Objec...

  • Diploma
  • BCA
  • B.Sc
  • B.Tech/B.E.
  • M.Sc
  • MCA
  • M.Tech/M.E.


Technologies
  • .netMVC
  • PHP
  • Python
  • Java
  • Django
Automatic Detection of NoSQL Injection Using Supervised Learning

Abstract—With the advancement in big data, NoSQL databases are enjoying ever-growing popularity. The increasing use of this technology in large applications also brings security concerns to the fore. Historically, SQL injection has been one of the major security threats over the years. Recent stu...

  • Diploma
  • BCA
  • B.Sc
  • B.Tech/B.E.
  • M.Sc
  • MCA
  • M.Tech/M.E.


Technologies
  • .netMVC
  • PHP
  • Python
  • Java
  • Django
  • Mongo DB
Detecting Stress Based on Social Interactions in Social Networks

Abstract— Psychological stress is threatening people’s health. It is non-trivial to detect stress timely for proactive care. With the popularity of social media, people are used to sharing their daily activities and interacting with friends on social media platforms, making it feasible to leverag...

  • Diploma
  • BCA
  • B.Sc
  • B.Tech/B.E.
  • M.Sc
  • MCA
  • M.Tech/M.E.


Technologies
  • .netMVC
  • PHP
  • Python
  • Java
  • Django
  • Mongo DB
  • Android