Image Security using Image Encryption and Image Stitching
- Diploma
- BCA
- B.Sc
- B.Tech/B.E.
- M.Sc
- MCA
- M.Tech/M.E.
Abstract—With increase in digital communication, multimedia data such as digital images, videos etc. we require fast and robust security systems. To achieve high security, encryption is one of the way to protect our data from unauthorized users. In this paper, the proposed model aims to provide security to the images using a combination of image encryption and image stitching techniques. The use of chaotic methods in the encryption makes it more difficult for the attackers to decrypt the image. Every image to be transferred is first partitioned and then each part is encrypted and sent to the receiver. That is why a person with a single part or two parts of the image will not be able to use that image. Image stitching algorithm used on the receivers end makes it easy for him to generate the original image. Image encryption along with image stitching provides a double layer of protection to the image. The need for this approach is to achieve security and privacy during the communication
3 years ago
DOWNLOAD
Related Topics
The emotions of human in every part of a life are usual and unavoidable. The emotions uplift or cast down a person facing different situations in each moment. The main objective of this research work is to provide learning with emotional-based approach and to analyze the result using data mining ...
- Diploma
- BCA
- B.Sc
- B.Tech/B.E.
- M.Sc
- MCA
- M.Tech/M.E.
Technologies
This paper introduces the current machine learning approach to solving problems in the domain of landslide susceptibility assessment. Three different machine learning algorithms can be compared: Support Vector Machines, Decision Trees and Logistic Regression. Any three landslide slopes in a selec...
- Diploma
- BCA
- B.Sc
- B.Tech/B.E.
- M.Sc
- MCA
- M.Tech/M.E.
Technologies
ABSTRACT :This paper discusses about methods for detection of leukemia. Various image processing techniques are used for identification of red blood cell and immature white cells. Different disease like anemia, leukemia, malaria, deficiency of vitamin B12, etc. can be diagnosed accordingly. Objec...
- Diploma
- BCA
- B.Sc
- B.Tech/B.E.
- M.Sc
- MCA
- M.Tech/M.E.
Technologies
Abstract—With the advancement in big data, NoSQL databases are enjoying ever-growing popularity. The increasing use of this technology in large applications also brings security concerns to the fore. Historically, SQL injection has been one of the major security threats over the years. Recent stu...
- Diploma
- BCA
- B.Sc
- B.Tech/B.E.
- M.Sc
- MCA
- M.Tech/M.E.
Technologies
Abstract— Psychological stress is threatening people’s health. It is non-trivial to detect stress timely for proactive care. With the popularity of social media, people are used to sharing their daily activities and interacting with friends on social media platforms, making it feasible to leverag...
- Diploma
- BCA
- B.Sc
- B.Tech/B.E.
- M.Sc
- MCA
- M.Tech/M.E.
Technologies