Implementation of Text and Image Fusion in the Area of Security

Authors(5) :-Priyanka Gore, Yogini Late, Mayur Patil, Sumit Kumar, Shubhangi Mankar

The image is most widely used communication mode in the different areas like medical area research area, business area, military area etc. The important image transfer will take place over an unsecured internet network .thus there is need of proper security for the image to avoid the unauthorized person’s access the important information. the advantage of image is that it covers more multimedia data and it need protection .the cryptography is a kind of image security method ;that offers the secure transmission and storage method for the image over the internet security is the major concern for any system to maintain the integrity ,confidentiality and image authenticity. Today the world is going to be digitalized. Every business units, government and private sectors, research units are using the digital image as transferring mode for every critical data. This image over the internet which will be not secure therefore there is a need of image security. In this paper we have discussed various image security techniques. In particular we are using DWT, based approach.

Authors and Affiliations

Priyanka Gore
B.E, Electronics and Telecommunication, Vishwatmak Om Gurudev College of Engineering, Aghai, Maharashtra, India
Yogini Late
B.E, Electronics and Telecommunication, Vishwatmak Om Gurudev College of Engineering, Aghai, Maharashtra, India
Mayur Patil
B.E, Electronics and Telecommunication, Vishwatmak Om Gurudev College of Engineering, Aghai, Maharashtra, India
Sumit Kumar
B.E, Electronics and Telecommunication, Vishwatmak Om Gurudev College of Engineering, Aghai, Maharashtra, India
Shubhangi Mankar
Assistant Professor, Electronics and Telecommunication, Vishwatmak Om Gurudev College of Engineering, Aghai, Maharashtra, India

DCT, Digital Signature, DWT, Image Processing, Image Security.

  1. Gonazales and woods, "Digital image processing" person education India, third edition.
  2. Anil K. Jain. "Fundamentals of image processing prentice hall of India, first edition 1987".
  3. Merat Tekalp,"Digital Video Processing",pearyon ,2010.
  4. R. J. Chen, and J. L. Lai. "Image security system using recursive cellular automata substitution", Pattern Recognition, vol. 40, pp. 1621-1631, 2007.
  5. M. A. F. Al-Husainy, "A novel encryption method for image security", International Journal of Security and Its Applications, Vol. 6, No. 1, pp. 1-8, 2012.
  6. N. A. Azam, "A Novel Fuzzy Encryption Technique Based on Multiple Right Translated AES Gray S-Boxes and Phase Embedding", Security and Communication Networks, Vol. 2017, pp. 1-9, 2017. 
  7. S. Koppu, and V. M. Viswanatham, "A Fast Enhanced Secure Image Chaotic Cryptosystem Based on Hybrid Chaotic Magic Transform", Modelling and Simulation in Engineering, vol. 2017, pp. 1-12, 2017. A. Pushpad, A. A. Potnis, and A. K. Tripathi, "A Review on Current Reversible  Image Security  Schemes",  Imperial Journal of Interdisciplinary Research, Vol. 2, Issue. 11, pp. 953-955, 2016.
  8. A. Verma, and A. Jain, "Pixel chaotic shuffling and Arnold map based Image Security Using Complex Wavelet Transform", Journal of Network Communications and Emerging Technologies, Vol. 6, Issue 5, pp. 8-11, 2016.

Publication Details

Published in : Volume 4 | Issue 6 | January-February 2018
Date of Publication : 2018-02-28
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 24-28
Manuscript Number : IJSRSET1841253
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Priyanka Gore, Yogini Late, Mayur Patil, Sumit Kumar, Shubhangi Mankar, " Implementation of Text and Image Fusion in the Area of Security, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 6, pp.24-28, January-February-2018. Citation Detection and Elimination     |     
Journal URL : https://ijsrset.com/IJSRSET1841253

Article Preview