##plugins.themes.academic_pro.article.main##

Abstract

Abstract

Along with Computer and Network Security.Data Security plays a vital role in today world. Data is  of great importance. In this paper, we have discussed how the data can be secured. This paper deals with hiding your encrypted data inside an image. Now this image would be covered by another image. We will apply some morphing techniques on these covered images to get morphed images. Now the morphed image is sent on the network. No one in the network can predict about data inside morphed images except the intended sender and receiver. This paper deals with three algorithms. The three algorithms are required for doing three different specific task. This paper deals with RSA algorithm for encrypting data .Second Water- marking embedding and extraction algorithm is used for hiding information inside image. And the third algorithm used is Hide and Extract image algorithm to cover your image behind other image

Keywords:

Least significant bits – LSB,

Cipher Text –C

Red Green Brown- RGB .

##plugins.themes.academic_pro.article.details##

How to Cite
Deshmukh, A., & Harshali Patil, P. S. A. S. and. (2014). Image Morphing with Data Security. International Journal of Emerging Trends in Science and Technology, 1(01). Retrieved from https://igmpublication.org/ijetst.in/index.php/ijetst/article/view/9

References

[1]The Mathematics of the RSA Public-Key Cryptosystem by Burt Kaliski .
[2] TCP/IP protocol suite by Behrouz.A.Forouzan.
[3] Research on Fast implementation of RSA with java, Proceedings of 2010 International Symposium on Web Information System and Application (WISA'10).
[4] Gonzalez And Woods .Digital Image Processing.
[5] Digital Image Processing by W. K. Pratt.
[6] Fundamentals of Digital Image Processing by A.K. Jain.