International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 145

Comparative Studies | Computer Science & Engineering | India | Volume 8 Issue 4, April 2019


An Application of Image Morphing Technique for Secure Data Transmission through Virtual Data Hiding

Sonali Lavangale | M. U. Karande


Abstract: Data Hiding is the study of concealing information into harmless questions to such a degree, to the point that the nearness of the shrouded information stays intangible to an enemy. Hiding the data into cover image have differed procedures of usage created after some time. Insurance of the concealed data from an enemy is the most imperative objective of Data hiding and henceforth clearly the security of a steganography framework will increment if the image quality stays unintelligible to an assailant regardless of whether he holds information about the implanting technique. It is likewise clear that specific zones in a picture are more productive for concealing information than alternate parts of the picture.


Keywords: Virtual Key Replacement, Data Hiding, Security, PSNR, MSE


Edition: Volume 8 Issue 4, April 2019,


Pages: 449 - 453


How to Cite this Article?

Sonali Lavangale, M. U. Karande, "An Application of Image Morphing Technique for Secure Data Transmission through Virtual Data Hiding", International Journal of Science and Research (IJSR), Volume 8 Issue 4, April 2019, pp. 449-453, https://www.ijsr.net/get_abstract.php?paper_id=ART20196597

How to Share this Article?

Enter Your Email Address




Similar Articles with Keyword 'Data Hiding'

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 5, May 2022

Pages: 885 - 888

Image Based Steganography

Bheeshma Rao J | Ujwal Sai Satya Jorige | Sai Praneetha Katragadda | Pradeep Kumar .V

Share this Article

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Share this Article


Top