IJSRSET calls volunteers interested to contribute towards the scientific development in the field of Science, Engineering and Technology

Home > IJSRSET1841253                                                     


Implementation of Text and Image Fusion in the Area of Security

Authors(5):

Priyanka Gore, Yogini Late, Mayur Patil, Sumit Kumar, Shubhangi Mankar
  • Abstract
  • Authors
  • Keywords
  • References
  • Details
The image is most widely used communication mode in the different areas like medical area research area, business area, military area etc. The important image transfer will take place over an unsecured internet network .thus there is need of proper security for the image to avoid the unauthorized personís access the important information. the advantage of image is that it covers more multimedia data and it need protection .the cryptography is a kind of image security method ;that offers the secure transmission and storage method for the image over the internet security is the major concern for any system to maintain the integrity ,confidentiality and image authenticity. Today the world is going to be digitalized. Every business units, government and private sectors, research units are using the digital image as transferring mode for every critical data. This image over the internet which will be not secure therefore there is a need of image security. In this paper we have discussed various image security techniques. In particular we are using DWT, based approach.

Priyanka Gore, Yogini Late, Mayur Patil, Sumit Kumar, Shubhangi Mankar

DCT, Digital Signature, DWT, Image Processing, Image Security.

  1. Gonazales and woods, "Digital image processing" person education India, third edition.
  2. Anil K. Jain. "Fundamentals of image processing prentice hall of India, first edition 1987".
  3. Merat Tekalp,"Digital Video Processing",pearyon ,2010.
  4. R. J. Chen, and J. L. Lai. "Image security system using recursive cellular automata substitution", Pattern Recognition, vol. 40, pp. 1621-1631, 2007.
  5. M. A. F. Al-Husainy, "A novel encryption method for image security", International Journal of Security and Its Applications, Vol. 6, No. 1, pp. 1-8, 2012.
  6. N. A. Azam, "A Novel Fuzzy Encryption Technique Based on Multiple Right Translated AES Gray S-Boxes and Phase Embedding", Security and Communication Networks, Vol. 2017, pp. 1-9, 2017.†
  7. S. Koppu, and V. M. Viswanatham, "A Fast Enhanced Secure Image Chaotic Cryptosystem Based on Hybrid Chaotic Magic Transform", Modelling and Simulation in Engineering, vol. 2017, pp. 1-12, 2017. A. Pushpad, A. A. Potnis, and A. K. Tripathi, "A Review on Current Reversible† Image Security† Schemes",† Imperial Journal of Interdisciplinary Research, Vol. 2, Issue. 11, pp. 953-955, 2016.
  8. A. Verma, and A. Jain, "Pixel chaotic shuffling and Arnold map based Image Security Using Complex Wavelet Transform", Journal of Network Communications and Emerging Technologies, Vol. 6, Issue 5, pp. 8-11, 2016.

Publication Details

Published in : Volume 4 | Issue 6 | January-February - 2018
Date of Publication Print ISSN Online ISSN
2018-02-28 2395-1990 2394-4099
Page(s) Manuscript Number   Publisher
24-28 IJSRSET1841253   Technoscience Academy

Cite This Article

Priyanka Gore, Yogini Late, Mayur Patil, Sumit Kumar, Shubhangi Mankar, "Implementation of Text and Image Fusion in the Area of Security", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 6, pp.24-28, January-February-2018.
URL : http://ijsrset.com/IJSRSET1841253.php