International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Comparative Studies | Computer Science & Engineering | India | Volume 8 Issue 4, April 2019

An Application of Image Morphing Technique for Secure Data Transmission through Virtual Data Hiding

Sonali Lavangale, M. U. Karande

Data Hiding is the study of concealing information into harmless questions to such a degree, to the point that the nearness of the shrouded information stays intangible to an enemy. Hiding the data into cover image have differed procedures of usage created after some time. Insurance of the concealed data from an enemy is the most imperative objective of Data hiding and henceforth clearly the security of a steganography framework will increment if the image quality stays unintelligible to an assailant regardless of whether he holds information about the implanting technique. It is likewise clear that specific zones in a picture are more productive for concealing information than alternate parts of the picture.

Keywords: Virtual Key Replacement, Data Hiding, Security, PSNR, MSE

Edition: Volume 8 Issue 4, April 2019

Pages: 449 - 453

Share this Article

How to Cite this Article?

Sonali Lavangale, M. U. Karande, "An Application of Image Morphing Technique for Secure Data Transmission through Virtual Data Hiding", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20196597, Volume 8 Issue 4, April 2019, 449 - 453

95 PDF Views | 57 PDF Downloads

Download Article PDF

Similar Articles with Keyword 'Data Hiding'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2352 - 2357

RS and OFDM Methods Over Encrypted and Data Embedded Video Streams

Jithya J. Prakash, Hemand E. P.

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1642 - 1643

A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams

Shrutika S. Giradkar, Antara Bhattacharya

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2281 - 2284

Hiding Image in Image Using LSB Insertion Method with Improved Security and Quality

Mekha Jose

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3075 - 3078

Secret Data Hiding in Compressed Video Bit Streams for Privacy Information Protection

B. Vengadalakshmi, S. Abiramasundari

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 647 - 651

Frequency Domain Based Robust Digital Image Watermarking Resilient to Desynchronization Attacks

Mahesh R. Shimpi, S. V. Gumaste

Share this Article

Similar Articles with Keyword 'Security'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2701 - 2704

Review on Self Organized Trust Model for Distributed Systems

Suyog Ashokrao Nagare

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2644 - 2649

Misbehavior Packet Detection Approach using Effective Trust in Delay-Tolerant Networks

Prerana S. Jagadale, Prashant Jawalkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

Similar Articles with Keyword 'PSNR'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 2040 - 2043

An Efficient Method for Image Denoising Using Orthogonal Wavelet Transform

Akshata S Kori, Manjunatha A S.

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1338 - 1343

Implementation of Adaptive Video Compression using Hybridized Wavelet Transform

Anurag Srivastava, Puneet Sharma

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1655 - 1659

Speckle Noise ReductionUsing Local Binary Pattern; Anisotropic Diffusion and Bilateral Filter

Mandeep Singh Sandhu, Rajandeep Kaur

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3075 - 3078

Secret Data Hiding in Compressed Video Bit Streams for Privacy Information Protection

B. Vengadalakshmi, S. Abiramasundari

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1467 - 1471

XOR Encryption Based Video Steganography

Ramandeep Kaur, Pooja

Share this Article

Similar Articles with Keyword 'MSE'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2734 - 2838

Efficient Techniques for Mining High Utility Itemsets from Transactional Databases: A Survey

Ganesh Sawant, Bhawana Kanawde

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 2040 - 2043

An Efficient Method for Image Denoising Using Orthogonal Wavelet Transform

Akshata S Kori, Manjunatha A S.

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2692 - 2696

Study on High Utility Itemset Mining

Nilovena.K.V, Anu.K.S

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 621 - 623

A Survey: By Using Frequent Pattern Growth Infrequent Weighted Itemset Mining

Vaidya Seema Bhagwan, A. B. Bagwan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1655 - 1659

Speckle Noise ReductionUsing Local Binary Pattern; Anisotropic Diffusion and Bilateral Filter

Mandeep Singh Sandhu, Rajandeep Kaur

Share this Article



Top