A Case Study on Image Morphing Through Data Hiding Technique
Today very important issue is to hide our sensitive data which comes under data hiding which means hiding our sensitive data as well as information from out side world. Image will become an important and sensitive information when it contain any sensitive information in it for many reasons like communication owner identification etc. Many techniques have been introduces one of which is image morphing which means changes its form from one to another without changing its other parameter to make it more secure . For morphs between faces, the metamorphosis does not look good if the two faces do not have the same shape approximately. In this project, we implemented a morphing scheme which would combine cross-dissolve with warping methods to give good morphs. This is based on "Feature-Based Image Metamorphosis. The morph process consists of a warping stage before cross-dissolving so that the two images have the same shape. The warp is specified, in this case, by a mapping between lines in the first and second images. In the following discussion, the first image will be called the source image and the last image will be called the destination image. In this survey paper we will show you different types of morphing algorithms, procedures and techniques.
Bhumika H. Bhatt, Hita M. Joshi, “Feature based Image Morphing”, International Journal of Computer Science & Technology, vol. 2, issue 3, pp. 46-47, sept. 2011.
Urvshi Bhushan, Dr. G.P.Saroha and Disha Tivari, “An implemention of image morphing through mesh morphing algorithm”, Journal of Computer Science, vol. 2, issue 7, pp. 74-76, Jul. 2012.
George Wolberg, “Image Morphing Survey”, Department of Computer Science, City College of New York, New York, USA, Jun. 1998.
Seungyong Lee, George Wolberg and Sung Yong Shin, “Polymorph:An Algorithm for Morphing among multiple images”, Visual Computer(1998), Springer-Verlag, 1998, pp. 360-371, Jul. 2008.
Manfred Kopp,Werner Purgthofer, “Multi Resolution Image Morphing”, Vienna Univ. of Technology, Institute of Computer Graphics, Austria, Jul. 2004.
Srinath Setty, Swati Rallapalli “Implemention of Morphing Algorithm with feature based Image metamorphosis”, The Univ. of Texas, Austin, Jun. 2010
Anat M. Bagade, S.N.Talbar, “Image morphing cocept of secure transmission image data contents over internet”, Journal of Computer Science, pp. 987-992, Jul. 2010.
George Wolberg, “Recent Advance in Image Morphing”, M. Eng. thesis, Department of Computer Science, City College of New York, New York, USA, Jun. 1996.
Prashant K. Oswal,Prashanth Y. Govindaraju, “Image Morphing: A Comparative Study”, Department of Electrical and Computer Engineering, Clemson Univ., Clemson Eng., Clemson, sept. 2010.
Lei Zhu,Yan Yang,Steven Haker and Allen Tannenbaum, “An Image Morphing Technique Based on Optimal Mass Preserving Mapping”, IEEE Transactions on Image Processing, vol.16, no.6,pp. 1481-1483, Jun. 2007.
Kinjal N. Shah, Tushar Gohil, “Image Morphing”, Department of Information Technology, SCET, Tech. Rep. 6-9, Sept. 2007-2008
Aleandru Vlad FECIORESSCU, “Image Morphing Techniques,” Journal of Industrial Design and Engineering Graphics, vol.5, issue 1, pp. 25-28, Jun. 2010.
Pramod Potlri, Krshna Sagriraj and Venkatachalam Tubati "Image Morphing: Feature based,view,Mesh", Department of Electrical and Computer Eng., Clemson Univ., Clemson Eng., Clemson, Aug. 2009.
Robert de Waard, “Image Morphing Algorithm”, Aug. 2011. http://www.infi.nl/blog/view/id/116/Image_Morph_Algorithm
Martin Bichsel, “Automatic Interpolation and Recognition of Face Images by Morphing”, 2nd international conference on automatic face and gesture recognition, pp. 128-135, Jan. 2001.
Manolis,Manolis Kamvysselis, Matt D. Blum and Hooman Vassef,Krzysztof Gajos, “3D Morphing”, Tech. Rep. 1-13, Nov.2003
http://alumni.media.mit.edu/~maov/classes/comp_photo_vision08f/lect/07_Image%20Morphing.pdf
https://www.owlnet.rice.edu/~elec539/Projects97/morphjrks/morph.html
Jignasha B. Panchal, “An Implementation of Enhanced Image Morphing Algorithm using Hybrid Approach” International Journal of Computer Applications (0975 – 8887) Volume 66– No.20, March 2013