Secure Data Management Using Face Morphing

Authors(2) :-Anvita D. Phutane, Dr. A. A. Gurjar

We proposed an image morphing based method for information embedding. The basic idea is to hide a secrete data into a morphed image which is obtained from the secrete image and another reference image. To make this method practically useful, it is essential to produce natural morphed images. This is a necessary condition conceal the existence of the secret image. To produce natural morphed images, we should select a proper feature point set (FPS) for morphing. This is a monotonous work if we do it manually, because the number of possible FPSs is very large. To solve the problem more efficiently, we adopted proposed interactive algorithm in this study and conducted experiments for generating morphed images. Results show that, if we provide a relatively good initial FPS, proposed interactive algorithm can fine-tune the FPS, and produce more natural images with limited number of iteration.

Authors and Affiliations

Anvita D. Phutane
M.E Scholar, Department of Electronics & Telecommunication Engineering, Sipna College of Engineering and Technology, Amravati, Maharashtra, India
Dr. A. A. Gurjar
Professor, Department of Electronics & Telecommunication Engineering, Sipna College of Engineering and Technology, Amravati, Maharashtra, India

Feature Point Set, Face Morphing, Image Morphing, Video Morphing

  1. Qiangfu Zhao and Mayuko Akatsuka, Generating Facial Images for Data embed Based on IGA and Image Morphing, 2012 IEEE.
  2. Lin Yuan and Touradj Ebrahimi, IMAGE TRANSMORPHING WITH JPEG, Third Edition, Morgan Kaufmann Publishers, 2015 IEEE.
  3. Yutaro Minakawa, Mitsuru Abe, Kentaro Sekine, and Qiangfu Zhao, “Neural Network Based Feature Point Detection for Image Morphing,” Signal Processing, 90, pp. 727-752, 2010.
  4. Yun-Te Lin, Chung-Ming Wang, " A Novel Data Embedding Algorithm for High Dynamic Range Images " 2016 IEEE.
  5. Seong G. Kong, " Head Pose Estimation From a 2D Face Image Using 3D Face Morphing With Depth Parameters," IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 24, NO. 6, JUNE 2015.
  6. Taheer Jamil,Liu Chao, “A framework for Automatic Testing of Image Processing Application,” 2016 IEEE
  7. Ryota Hanyu, Kazuki Murakami, and Qiangfu Zhao, “Verification of an Image Morphing Based Technology for Improving the Security in Cloud Storage Services” 2014 IEEE
  8. Vanmathi C, Dr. S. Prabu, “Distortion less Reversible Data Embedding based on Dual Repeat Accumulate Coding Technique” 2014 IEEE.
  9. Sikha Mary Varghese, Alphonsa Johny , Dr.Jubilant Job “A Survey on Joint Data-Embedding and Compression Techniques based on SMVQ and Image Inpainting” 2015 International Conference on Soft-Computing and Network Security (ICSNS -2015), Feb. 25 – 27, 2015, Coimbatore, INDIA.
  10. Hao-Tian Wu, Reversible Image Data Embedding with Contrast Enhancement, IEEE SIGNAL PROCESSING LETTERS, VOL. 22, NO. 1, JANUARY 2015 81.
  11. Xinpeng Zhang, Jing Long, Zichi Wang, and Hang Cheng, Lossless and Reversible Data Embedding in Encrypted Images with Public Key Cryptography, 2015 IEEE
  12. Zhaoxia Yin, Andrew Abel, inpeng Zhang, Bi Luo “Reversible Data Embedding In Encrypted Image Based On Block Histogram Shifting,” IEEE 2016.

Publication Details

Published in : Volume 6 | Issue 1 | January-February 2019
Date of Publication : 2019-01-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 83-94
Manuscript Number : IJSRST196119
Publisher : Technoscience Academy

Print ISSN : 2395-6011, Online ISSN : 2395-602X

Cite This Article :

Anvita D. Phutane, Dr. A. A. Gurjar, " Secure Data Management Using Face Morphing", International Journal of Scientific Research in Science and Technology(IJSRST), Print ISSN : 2395-6011, Online ISSN : 2395-602X, Volume 6, Issue 1, pp.83-94, January-February-2019.
Journal URL : https://ijsrst.com/IJSRST196119
Citation Detection and Elimination     |      | |
  • Seong G. Kong, " Head Pose Estimation From a 2D Face Image Using 3D Face Morphing With Depth Parameters," IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 24, NO. 6, JUNE 2015.
  • Taheer Jamil,Liu Chao, “A framework for Automatic Testing of Image Processing Application,” 2016 IEEE
  • Ryota Hanyu, Kazuki Murakami, and Qiangfu Zhao, “Verification of an Image Morphing Based Technology for Improving the Security in Cloud Storage Services” 2014 IEEE
  • Vanmathi C, Dr. S. Prabu, “Distortion less Reversible Data Embedding based on Dual Repeat Accumulate Coding Technique” 2014 IEEE.
  • Sikha Mary Varghese, Alphonsa Johny , Dr.Jubilant Job “A Survey on Joint Data-Embedding and Compression Techniques based on SMVQ and Image Inpainting” 2015 International Conference on Soft-Computing and Network Security (ICSNS -2015), Feb. 25 – 27, 2015, Coimbatore, INDIA.
  • Hao-Tian Wu, Reversible Image Data Embedding with Contrast Enhancement, IEEE SIGNAL PROCESSING LETTERS, VOL. 22, NO. 1, JANUARY 2015 81.
  • Xinpeng Zhang, Jing Long, Zichi Wang, and Hang Cheng, Lossless and Reversible Data Embedding in Encrypted Images with Public Key Cryptography, 2015 IEEE
  • Zhaoxia Yin, Andrew Abel, inpeng Zhang, Bi Luo “Reversible Data Embedding In Encrypted Image Based On Block Histogram Shifting,” IEEE 2016.
  • " target="_blank"> BibTeX
    |
  • Seong G. Kong, " Head Pose Estimation From a 2D Face Image Using 3D Face Morphing With Depth Parameters," IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 24, NO. 6, JUNE 2015.
  • Taheer Jamil,Liu Chao, “A framework for Automatic Testing of Image Processing Application,” 2016 IEEE
  • Ryota Hanyu, Kazuki Murakami, and Qiangfu Zhao, “Verification of an Image Morphing Based Technology for Improving the Security in Cloud Storage Services” 2014 IEEE
  • Vanmathi C, Dr. S. Prabu, “Distortion less Reversible Data Embedding based on Dual Repeat Accumulate Coding Technique” 2014 IEEE.
  • Sikha Mary Varghese, Alphonsa Johny , Dr.Jubilant Job “A Survey on Joint Data-Embedding and Compression Techniques based on SMVQ and Image Inpainting” 2015 International Conference on Soft-Computing and Network Security (ICSNS -2015), Feb. 25 – 27, 2015, Coimbatore, INDIA.
  • Hao-Tian Wu, Reversible Image Data Embedding with Contrast Enhancement, IEEE SIGNAL PROCESSING LETTERS, VOL. 22, NO. 1, JANUARY 2015 81.
  • Xinpeng Zhang, Jing Long, Zichi Wang, and Hang Cheng, Lossless and Reversible Data Embedding in Encrypted Images with Public Key Cryptography, 2015 IEEE
  • Zhaoxia Yin, Andrew Abel, inpeng Zhang, Bi Luo “Reversible Data Embedding In Encrypted Image Based On Block Histogram Shifting,” IEEE 2016.
  • " target="_blank">RIS
    |
  • Seong G. Kong, " Head Pose Estimation From a 2D Face Image Using 3D Face Morphing With Depth Parameters," IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 24, NO. 6, JUNE 2015.
  • Taheer Jamil,Liu Chao, “A framework for Automatic Testing of Image Processing Application,” 2016 IEEE
  • Ryota Hanyu, Kazuki Murakami, and Qiangfu Zhao, “Verification of an Image Morphing Based Technology for Improving the Security in Cloud Storage Services” 2014 IEEE
  • Vanmathi C, Dr. S. Prabu, “Distortion less Reversible Data Embedding based on Dual Repeat Accumulate Coding Technique” 2014 IEEE.
  • Sikha Mary Varghese, Alphonsa Johny , Dr.Jubilant Job “A Survey on Joint Data-Embedding and Compression Techniques based on SMVQ and Image Inpainting” 2015 International Conference on Soft-Computing and Network Security (ICSNS -2015), Feb. 25 – 27, 2015, Coimbatore, INDIA.
  • Hao-Tian Wu, Reversible Image Data Embedding with Contrast Enhancement, IEEE SIGNAL PROCESSING LETTERS, VOL. 22, NO. 1, JANUARY 2015 81.
  • Xinpeng Zhang, Jing Long, Zichi Wang, and Hang Cheng, Lossless and Reversible Data Embedding in Encrypted Images with Public Key Cryptography, 2015 IEEE
  • Zhaoxia Yin, Andrew Abel, inpeng Zhang, Bi Luo “Reversible Data Embedding In Encrypted Image Based On Block Histogram Shifting,” IEEE 2016.
  • " target="_blank">CSV

    Article Preview