Implementation of Text and Image Fusion in the Area of Security

Authors

  • Priyanka Gore  B.E, Electronics and Telecommunication, Vishwatmak Om Gurudev College of Engineering, Aghai, Maharashtra, India
  • Yogini Late  B.E, Electronics and Telecommunication, Vishwatmak Om Gurudev College of Engineering, Aghai, Maharashtra, India
  • Mayur Patil  B.E, Electronics and Telecommunication, Vishwatmak Om Gurudev College of Engineering, Aghai, Maharashtra, India
  • Sumit Kumar  B.E, Electronics and Telecommunication, Vishwatmak Om Gurudev College of Engineering, Aghai, Maharashtra, India
  • Shubhangi Mankar  Assistant Professor, Electronics and Telecommunication, Vishwatmak Om Gurudev College of Engineering, Aghai, Maharashtra, India

Keywords:

DCT, Digital Signature, DWT, Image Processing, Image Security.

Abstract

The image is most widely used communication mode in the different areas like medical area research area, business area, military area etc. The important image transfer will take place over an unsecured internet network .thus there is need of proper security for the image to avoid the unauthorized person’s access the important information. the advantage of image is that it covers more multimedia data and it need protection .the cryptography is a kind of image security method ;that offers the secure transmission and storage method for the image over the internet security is the major concern for any system to maintain the integrity ,confidentiality and image authenticity. Today the world is going to be digitalized. Every business units, government and private sectors, research units are using the digital image as transferring mode for every critical data. This image over the internet which will be not secure therefore there is a need of image security. In this paper we have discussed various image security techniques. In particular we are using DWT, based approach.

References

  1. Gonazales and woods, "Digital image processing" person education India, third edition.
  2. Anil K. Jain. "Fundamentals of image processing prentice hall of India, first edition 1987".
  3. Merat Tekalp,"Digital Video Processing",pearyon ,2010.
  4. R. J. Chen, and J. L. Lai. "Image security system using recursive cellular automata substitution", Pattern Recognition, vol. 40, pp. 1621-1631, 2007.
  5. M. A. F. Al-Husainy, "A novel encryption method for image security", International Journal of Security and Its Applications, Vol. 6, No. 1, pp. 1-8, 2012.
  6. N. A. Azam, "A Novel Fuzzy Encryption Technique Based on Multiple Right Translated AES Gray S-Boxes and Phase Embedding", Security and Communication Networks, Vol. 2017, pp. 1-9, 2017. 
  7. S. Koppu, and V. M. Viswanatham, "A Fast Enhanced Secure Image Chaotic Cryptosystem Based on Hybrid Chaotic Magic Transform", Modelling and Simulation in Engineering, vol. 2017, pp. 1-12, 2017. A. Pushpad, A. A. Potnis, and A. K. Tripathi, "A Review on Current Reversible  Image Security  Schemes",  Imperial Journal of Interdisciplinary Research, Vol. 2, Issue. 11, pp. 953-955, 2016.
  8. A. Verma, and A. Jain, "Pixel chaotic shuffling and Arnold map based Image Security Using Complex Wavelet Transform", Journal of Network Communications and Emerging Technologies, Vol. 6, Issue 5, pp. 8-11, 2016.

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
Priyanka Gore, Yogini Late, Mayur Patil, Sumit Kumar, Shubhangi Mankar, " Implementation of Text and Image Fusion in the Area of Security, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 6, pp.24-28, January-February-2018.