An Application of Image Morphing Technique for Secure Data Transmission through Virtual Data Hiding
Journal: International Journal of Science and Research (IJSR) (Vol.8, No. 4)Publication Date: 2019-04-05
Authors : Sonali Lavangale; M. U. Karande;
Page : 449-453
Keywords : Virtual Key Replacement; Data Hiding; Security; PSNR; MSE;
Abstract
Data Hiding is the study of concealing information into harmless questions to such a degree, to the point that the nearness of the shrouded information stays intangible to an enemy. Hiding the data into cover image have differed procedures of usage created after some time. Insurance of the concealed data from an enemy is the most imperative objective of Data hiding and henceforth clearly the security of a steganography framework will increment if the image quality stays unintelligible to an assailant regardless of whether he holds information about the implanting technique. It is likewise clear that specific zones in a picture are more productive for concealing information than alternate parts of the picture.
Other Latest Articles
- Type-2 Fuzzy System and Observer Based Controller for Non-Linear System
- Successful Delivery Outcome after Cervical Cerclage on Cervical Insufficiency with PPROM in Limited Resource Setting: A Case Report
- Second Stage Cesarean Sections Dilemmas and Difficulties
- The Anthocyanins Content, Colour Changes and Thermal Stability of Roselle (Hibiscus sabdariffa L.) Petal Extract
- The Legal Analysis of Cyber Crime an Unlawful Act with Special Reference to Legitimate Economy
Last modified: 2021-06-28 18:10:01