Secure image data transmission and hiding technique: a survey
Journal: ACCENTS Transactions on Image Processing and Computer Vision (TIPCV) (Vol.2, No. 2)Publication Date: 2016-02-18
Authors : Pooja Chaturvedi; Dinesh Chandra Jain;
Page : 1-6
Keywords : Encryption; Chaos; Steganography; Security measures.;
Abstract
Security is the need of today’s era. In every field like data management, data communication, e-commerce etc. The security task is being complicated as there are variety of data to secure as different level of data security is needed based on the data type. In this paper we have discussed and analyse the image data security. Image cryptography, data hiding, image entropy and image XOR. Based on these parameters we have analysed the previous research work and discussed the advantages and gaps.
Other Latest Articles
- Efficient Content based Image Retrieval (CBIR) Techniques: A Survey
- Knowledge Based System based on Fuzzy Logic for Digital Image Processing
- Design and Implementation of Frequency Modulated Transmission and Reception of Speech Signal and FPGA Based Enhancement
- Simulation of Spatial Concentration of Urban Built-up Lands through GIS and Remote Sensing Techniques: A Study of Mysore City, Karnataka, India
- Comparison of Different Feature Detection Techniques for Image Mosaicing
Last modified: 2016-08-13 16:47:18