International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017
p-ISSN: 2395-0072
www.irjet.net
“REVIEW ON A SECURE IMAGE TRANSMISSION TECHNIQUE VIA SECRET-FRAGMENT-VISIBLE MOSAIC IMAGES’’ Miss. Gayatri P. Sawarkar 1, Prof. Archana Vyas 2 2
1 Student Dept. of ME ENTC GHRCEM Amravati ,Maharashtra – India Professor, Dept. of ENTC GHRCEM Amravati 444603, Maharashtra – India
---------------------------------------------------------------------***--------------------------------------------------------------------Abstract - A new secure image transmission technique is
unless he/she has the correct key. However, the encrypted
proposed, which transforms automatically a given large-
image is a useless document, which cannot give extra data
volume secret image into a so-called secret-fragment-visible
before decryption and may arouse and an assaulter’s
mosaic image of the different size. The mosaic image, which
attention during transmission due to its changeableness in
looks similar to be an arbitrarily selected target image and
form. An alternative method is use to avoid this problem is
may be used as a camouflage of the secret image, will be
data hiding that hides a secret data into a cover image so
yielded by dividing the secret image into fragments and
that no one can realize the actual secret data. Actual data
transforming their color characteristics to be those of the
hiding methods mainly apply the techniques of, difference
corresponding blocks of the target image. Skilful techniques
expansion,
are proposed to be design to conduct the color transformation
transformations,
process so that the secret image may be recovered nearly
expansion histogram modification, and histogram shifting.
losslessly. The information required for recovering the secret image is proposed to be embedded into the created mosaic
recursive, LSB
discrete substitution,
cosine/wavelet prediction-error
2. PROCESS
image by a lossless data hiding scheme using a key.
A new method for secure image transmission is proposed,
Steganalysis of the stego image is also proposed to recover the
which transforms a secret image into a useful mosaic image
original image back.
with the different size and looking like a preselected target image. The transformation process is conduct by a secret
Key Words: Color transformation, data hiding, image
key, and only with the key can a person recapture the secret
Encryption, mosaic image, secure image transmission.
image nearly losslessly from the mosaic image. The mosaic image is the result of rearrangement of the fragments of a secret image in beared of another image called the target
1.INTRODUCTION Images from different sources are utilized and transmitted through the internet for different applications, for example online personal photograph albums, confidential enterprise archives, restorative imaging framework, military pictures databases. These images generally contain private or confidential data so that they should be protected from leakages during transmissions. Encryption of image is a method that makes use of the characteristic property of an image, like high redundancy and strong spatial correlation, to get an encrypted image. The encrypted image is a useless image so that anyone cannot obtain the secret image from it © 2017, IRJET
|
Impact Factor value: 5.181
|
image preselected from a database. Using their method, the user is not allowed to select freely his/her favorite image for use as the target image. It is therefore desire in this study to remove this lack of the method while keeping its merit, that is, it is aim to design a new method that can transform a secret image into a secret fragment- visible mosaic image of the different size that has the visual appearance of any freely selected target image without the need of a database. Specifically, after a target image is selected arbitrarily, the given secret image is required to be first divided into rectangular fragments called tile images, then this tile image fit into similar blocks in the target image, called target ISO 9001:2008 Certified Journal
|
Page 1317