2010
DOI: 10.3844/jcssp.2010.987.992
|View full text |Cite
|
Sign up to set email alerts
|

Image Morphing Concept for Secure Transmission of Image Data Contents over Internet

Abstract: Problem statement: Morphing of images has evolved and become a challenging field in information hiding and data security. The objective of this study is to secure the image data over internet while transmitting using the concept of image morphing Approach: To address this issue, the study proposed the new approach for image data security using the concept of image morphing. The morphing algorithm produces the stego keys. These stego keys are securely transmitted over Internet using TCP/IP. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…Many users tweet about the event along with photos describing situation, so some tweets can contain images as well. To keep those images secure we can use the approach proposed by Bagade A. et al in [11] of image morphing to secure those images.…”
Section: A Fetching Tweetsmentioning
confidence: 99%
“…Many users tweet about the event along with photos describing situation, so some tweets can contain images as well. To keep those images secure we can use the approach proposed by Bagade A. et al in [11] of image morphing to secure those images.…”
Section: A Fetching Tweetsmentioning
confidence: 99%
“…Morphing involves the image processing techniques of warping and cross dissolving. Morphing generates intermediate images, which are useful for hiding image data [1][2][3][4]. It is necessary that the presence of embedded information be kept secret for security purposes.…”
Section: Introductionmentioning
confidence: 99%