A Survey on Image Security

Authors

  • Sarita T. Sawale  Information Technology, Anuradha Engineering College, Chikhali, Maharashtra, India
  • Devika M. Gaikwad  Information Technology, Anuradha Engineering College, Chikhali, Maharashtra, India
  • Rachana N. Khadse  Information Technology, Anuradha Engineering College, Chikhali, Maharashtra, India

Keywords:

Security, Cryptography, Steganography, Visual Cryptography, Watermarking.

Abstract

Due to increase use of internet we required techniques for the protection of channel. The security of secret information can be provided using steganography, cryptography, watermarking and morphing. Steganography refer to the practice of concealing the message in the manner in which it will do no meaning other than intended recipient and encryption of other hand. Steganography hide the secret message while cryptography changes message format itself. Watermarking is the process of hiding digital information in carrier signal. In the process of morphing source image is gradually distorted and disappeared while producing the target image. So, this paper covers the overview of methods for image security, need of image security and its comparison.

References

  1. Peres, Elizabeth M., and John A. court right “Normative image communication media mass interpersonal channels in the new media environment”. Human communication research: 485-503
  2. William stalling” network security Essential application and standards {book name}
  3. “Shyam Nandan Kumar” Technique for security of multimedia a using Neutral Network.
  4. PATEL P, PATEL Y Secure and authentic DCT image Steganography through DWT-SVD based digital watermarking with RSA encryption. proc. Of the 5th international conference on communication system and network technologies ,2015(736-739)
  5. LASKAR TA, HEMANCHANDRAN K. Digital image watermarking technique and application. International Journal of Engineering Research and Technology ,2013.
  6. Hill, Douglas W., and James T. Lynn, Adaptive System and method for responding to computer network attacks V.S patent No.6,088,804,11july 2000
  7. Diffie, w. Hekkmon, M (1976). New direction in cryptography. IEEE Transcation on Information theory 22(6) =644-654
  8. Gray L Fridom, trustworthy digital camera restoring credibility to the photographic image, IEEE trans. consum. electron.39(4)(1993) 905-910\
  9. Dr. Rajib Kumar Bhattacharya, introduction to genetic algorithm.
  10. A. E. Ebien, R. Hinterding and ZMichakewicz,“Parameter control in evaluationary algotithm”,IEEE transcation on Evaluatory computation :on pp-124-141.
  11. Digital image security: fusion of encryption steganography and watermarkinhg
  12. F. Djebbar, B ayaady, H.K.Abed Meraimx “ A view on latest audio steganography techniques”, International Conference on Innovations in Information Technology , 2011.
  13. SN1PER – A Detailed Explanation of Most Advanced Automated Information Gathering & Penetration Testing BY Balaji in 16 February 2019
  14. Intelligent Processing: An Approach of Audio Steganography. 2011.IEEE
  15.  elprocus .com/artificial-neural-network-ann-and-their-type.

Downloads

Published

2020-02-17

Issue

Section

Research Articles

How to Cite

[1]
Sarita T. Sawale, Devika M. Gaikwad, Rachana N. Khadse, " A Survey on Image Security, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 5, Issue 6, pp.209-215, January-February-2020.