Comparative Studies | Computer Science & Engineering | India | Volume 8 Issue 4, April 2019
An Application of Image Morphing Technique for Secure Data Transmission through Virtual Data Hiding
Sonali Lavangale, M. U. Karande
Data Hiding is the study of concealing information into harmless questions to such a degree, to the point that the nearness of the shrouded information stays intangible to an enemy. Hiding the data into cover image have differed procedures of usage created after some time. Insurance of the concealed data from an enemy is the most imperative objective of Data hiding and henceforth clearly the security of a steganography framework will increment if the image quality stays unintelligible to an assailant regardless of whether he holds information about the implanting technique. It is likewise clear that specific zones in a picture are more productive for concealing information than alternate parts of the picture.
Keywords: Virtual Key Replacement, Data Hiding, Security, PSNR, MSE
Edition: Volume 8 Issue 4, April 2019
Pages: 449 - 453
How to Cite this Article?
Sonali Lavangale, M. U. Karande, "An Application of Image Morphing Technique for Secure Data Transmission through Virtual Data Hiding", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20196597, Volume 8 Issue 4, April 2019, 449 - 453
175 PDF Views | 117 PDF Downloads
Similar Articles with Keyword 'Data Hiding'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1642 - 1643A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams
Shrutika S. Giradkar, Antara Bhattacharya
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1175 - 1178Steganographic Method of Data Hiding using JPEG Images
Shabana Vathelil Subair, Fathima A Muhammadali
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 907 - 910A Steganography Approach to Protect Secret Information in Computer Network
Prajakta B. Diwan, V. B. Bhagat
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 1976 - 1979Implementation of MLMS base Information Security in Combination with HLSB Data Hiding Method
Ekata S. Bele, Chetan Bawankar
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1534 - 1539Data Anonymization Approach for Data Privacy
Padma L. Gaikwad, M. M. Naoghare
Similar Articles with Keyword 'Security'
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 700 - 705Virtual Augmented Reality Application and Research in Police Station Management System with Security Aspects
Kale Jyoti S
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2786 - 2790Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 890 - 894A Survey on Types of Crawlers and Web Searching Algorithms
T. Yogameera, Dr. D. Shanthi
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Similar Articles with Keyword 'PSNR'
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020
Pages: 1330 - 1335Efficient Image Encryption EIE - Compression System Using Haar Wavelets Using Matlab
Kavita, Anil Vadhwa
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1467 - 1471XOR Encryption Based Video Steganography
Ramandeep Kaur, Pooja
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2124 - 2127Medical Image Compression Using ISPIHT & JPEG2000 Hybrid
Yashpreet Sain
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 1054 - 1058Colour Extended Visual Cryptography based on MKGED
T. Anuradha, Dr. K. Usha Rani
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 1338 - 1343Implementation of Adaptive Video Compression using Hybridized Wavelet Transform
Anurag Srivastava, Puneet Sharma
Similar Articles with Keyword 'MSE'
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013
Pages: 297 - 300Balancing the Trade-Offs between Data Availability and Query Delay in MANETs
Umar I. Masumdar, N. S. Killarikar
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2734 - 2838Efficient Techniques for Mining High Utility Itemsets from Transactional Databases: A Survey
Ganesh Sawant, Bhawana Kanawde
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1165 - 1168Privacy Preserving Closed Frequent Pattern Mining
Anju Vijayan
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020
Pages: 1330 - 1335Efficient Image Encryption EIE - Compression System Using Haar Wavelets Using Matlab
Kavita, Anil Vadhwa
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1467 - 1471XOR Encryption Based Video Steganography
Ramandeep Kaur, Pooja