Downloads

Using Image Processing In Security

Authors

Shivam Sharma1

Abstract

Using image stitching and image steganography security can be provided to any image which has to be sent over the network or transferred using any electronic mode. There is a message and a secret image that has to be sent. The secret image is divided into parts. The first phase is the Encrypting Phase, which deals with the process of converting the actual secret message into cipher text using the AES algorithm. In the second phase which is the Embedding Phase, the cipher text is embedded into any part of the secret image that is to be sent. Third phase is the Hiding Phase, where steganography is performed on the output image of Embedding Phase and other parts of the image where the parts are camouflaged by another image using least significant bit replacement. These individual parts are sent to the concerned receiver. At the receivers end decryption of Hiding phase and Embedding Phase takes place respectively. The parts obtained are stitched together using k nearest method. Using SIFT features the quality of the image is improved.

Article Details

Published

2015-11-28

Section

Articles

How to Cite

Using Image Processing In Security. (2015). International Journal of Engineering and Computer Science, 4(11). https://ijecs.in/index.php/ijecs/article/view/2845