Implementation of Text and Image Fusion in the Area of Security
Keywords:
DCT, Digital Signature, DWT, Image Processing, Image Security.Abstract
The image is most widely used communication mode in the different areas like medical area research area, business area, military area etc. The important image transfer will take place over an unsecured internet network .thus there is need of proper security for the image to avoid the unauthorized person’s access the important information. the advantage of image is that it covers more multimedia data and it need protection .the cryptography is a kind of image security method ;that offers the secure transmission and storage method for the image over the internet security is the major concern for any system to maintain the integrity ,confidentiality and image authenticity. Today the world is going to be digitalized. Every business units, government and private sectors, research units are using the digital image as transferring mode for every critical data. This image over the internet which will be not secure therefore there is a need of image security. In this paper we have discussed various image security techniques. In particular we are using DWT, based approach.
References
- Gonazales and woods, "Digital image processing" person education India, third edition.
- Anil K. Jain. "Fundamentals of image processing prentice hall of India, first edition 1987".
- Merat Tekalp,"Digital Video Processing",pearyon ,2010.
- R. J. Chen, and J. L. Lai. "Image security system using recursive cellular automata substitution", Pattern Recognition, vol. 40, pp. 1621-1631, 2007.
- M. A. F. Al-Husainy, "A novel encryption method for image security", International Journal of Security and Its Applications, Vol. 6, No. 1, pp. 1-8, 2012.
- N. A. Azam, "A Novel Fuzzy Encryption Technique Based on Multiple Right Translated AES Gray S-Boxes and Phase Embedding", Security and Communication Networks, Vol. 2017, pp. 1-9, 2017.
- S. Koppu, and V. M. Viswanatham, "A Fast Enhanced Secure Image Chaotic Cryptosystem Based on Hybrid Chaotic Magic Transform", Modelling and Simulation in Engineering, vol. 2017, pp. 1-12, 2017. A. Pushpad, A. A. Potnis, and A. K. Tripathi, "A Review on Current Reversible Image Security Schemes", Imperial Journal of Interdisciplinary Research, Vol. 2, Issue. 11, pp. 953-955, 2016.
- A. Verma, and A. Jain, "Pixel chaotic shuffling and Arnold map based Image Security Using Complex Wavelet Transform", Journal of Network Communications and Emerging Technologies, Vol. 6, Issue 5, pp. 8-11, 2016.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.