Secure Data Management Using Face Morphing

Authors

  • Anvita D. Phutane  M.E Scholar, Department of Electronics & Telecommunication Engineering, Sipna College of Engineering and Technology, Amravati, Maharashtra, India
  • Dr. A. A. Gurjar  Professor, Department of Electronics & Telecommunication Engineering, Sipna College of Engineering and Technology, Amravati, Maharashtra, India

Keywords:

Feature Point Set, Face Morphing, Image Morphing, Video Morphing

Abstract

We proposed an image morphing based method for information embedding. The basic idea is to hide a secrete data into a morphed image which is obtained from the secrete image and another reference image. To make this method practically useful, it is essential to produce natural morphed images. This is a necessary condition conceal the existence of the secret image. To produce natural morphed images, we should select a proper feature point set (FPS) for morphing. This is a monotonous work if we do it manually, because the number of possible FPSs is very large. To solve the problem more efficiently, we adopted proposed interactive algorithm in this study and conducted experiments for generating morphed images. Results show that, if we provide a relatively good initial FPS, proposed interactive algorithm can fine-tune the FPS, and produce more natural images with limited number of iteration.

References

  1. Qiangfu Zhao and Mayuko Akatsuka, Generating Facial Images for Data embed Based on IGA and Image Morphing, 2012 IEEE.
  2. Lin Yuan and Touradj Ebrahimi, IMAGE TRANSMORPHING WITH JPEG, Third Edition, Morgan Kaufmann Publishers, 2015 IEEE.
  3. Yutaro Minakawa, Mitsuru Abe, Kentaro Sekine, and Qiangfu Zhao, “Neural Network Based Feature Point Detection for Image Morphing,” Signal Processing, 90, pp. 727-752, 2010.
  4. Yun-Te Lin, Chung-Ming Wang, " A Novel Data Embedding Algorithm for High Dynamic Range Images " 2016 IEEE.
  5. Seong G. Kong, " Head Pose Estimation From a 2D Face Image Using 3D Face Morphing With Depth Parameters," IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 24, NO. 6, JUNE 2015.
  6. Taheer Jamil,Liu Chao, “A framework for Automatic Testing of Image Processing Application,” 2016 IEEE
  7. Ryota Hanyu, Kazuki Murakami, and Qiangfu Zhao, “Verification of an Image Morphing Based Technology for Improving the Security in Cloud Storage Services” 2014 IEEE
  8. Vanmathi C, Dr. S. Prabu, “Distortion less Reversible Data Embedding based on Dual Repeat Accumulate Coding Technique” 2014 IEEE.
  9. Sikha Mary Varghese, Alphonsa Johny , Dr.Jubilant Job “A Survey on Joint Data-Embedding and Compression Techniques based on SMVQ and Image Inpainting” 2015 International Conference on Soft-Computing and Network Security (ICSNS -2015), Feb. 25 – 27, 2015, Coimbatore, INDIA.
  10. Hao-Tian Wu, Reversible Image Data Embedding with Contrast Enhancement, IEEE SIGNAL PROCESSING LETTERS, VOL. 22, NO. 1, JANUARY 2015 81.
  11. Xinpeng Zhang, Jing Long, Zichi Wang, and Hang Cheng, Lossless and Reversible Data Embedding in Encrypted Images with Public Key Cryptography, 2015 IEEE
  12. Zhaoxia Yin, Andrew Abel, inpeng Zhang, Bi Luo “Reversible Data Embedding In Encrypted Image Based On Block Histogram Shifting,” IEEE 2016.

Downloads

Published

2019-01-30

Issue

Section

Research Articles

How to Cite

[1]
Anvita D. Phutane, Dr. A. A. Gurjar, " Secure Data Management Using Face Morphing, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 6, Issue 1, pp.83-94, January-February-2019.