Downloads: 122 | Views: 309 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015 | Popularity: 6.5 / 10
Secret Fragment Mosaic Images: A Secure Method for Image Transmission
Shabana Vathelil Subair, Timna P Elizabeth
Abstract: Images from various sources are often used and are transmitted through the internet for various purposes, such as confidential enterprise archives, document storage systems, medical imaging systems, and military image databases. These images may contain secret or confidential information since it should be protected from leakage during transmissions. An approach for secure image transmission is needed, which is to transform a secret image into a meaningful Secret Fragment Mosaic image with size almost same and looking similar to the preselected target image. The mosaic image is the outcome of arranging of the block fragments of a secret image in a way so as to disguise the other image called the target image. The mosaic image, which looks similar to a randomly selected target image, which is used for hiding of the secret image by color transforming their characteristics similar to the blocks of the target image. Such technique is necessary so for the lossless recovery of the transmitted secret image. The appropriate information is embedded into the mosaic image for the recovery of the transmitted secret image.
Keywords: Color transformation, data hiding, encryption of image, mosaic image, secure transmission of image
Edition: Volume 4 Issue 3, March 2015
Pages: 583 - 585
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 5, May 2022
Pages: 885 - 888Image Based Steganography
Bheeshma Rao J, Ujwal Sai Satya Jorige, Sai Praneetha Katragadda, Pradeep Kumar .V
Downloads: 101
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1579 - 1582Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format
Neenu Shereef
Downloads: 104
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 1319 - 1323Advanced Technique for Comprehensive Data Security
Pramendra Kumar, Vijay Kumar Sharma
Downloads: 104
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1642 - 1643A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams
Shrutika S. Giradkar, Antara Bhattacharya
Downloads: 104
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1130 - 1132Survey On: Reversible Data Hiding in Encrypted JPEG Images
N. B. Pokale, Sanjivani S. Koli