Review on a Secure Image Transmission Technique Via Secret-Fragment-Visible Mosaic Images

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395 -0056

Volume: 04 Issue: 03 | Mar -2017

p-ISSN: 2395-0072

www.irjet.net

“REVIEW ON A SECURE IMAGE TRANSMISSION TECHNIQUE VIA SECRET-FRAGMENT-VISIBLE MOSAIC IMAGES’’ Miss. Gayatri P. Sawarkar 1, Prof. Archana Vyas 2 2

1 Student Dept. of ME ENTC GHRCEM Amravati ,Maharashtra – India Professor, Dept. of ENTC GHRCEM Amravati 444603, Maharashtra – India

---------------------------------------------------------------------***--------------------------------------------------------------------Abstract - A new secure image transmission technique is

unless he/she has the correct key. However, the encrypted

proposed, which transforms automatically a given large-

image is a useless document, which cannot give extra data

volume secret image into a so-called secret-fragment-visible

before decryption and may arouse and an assaulter’s

mosaic image of the different size. The mosaic image, which

attention during transmission due to its changeableness in

looks similar to be an arbitrarily selected target image and

form. An alternative method is use to avoid this problem is

may be used as a camouflage of the secret image, will be

data hiding that hides a secret data into a cover image so

yielded by dividing the secret image into fragments and

that no one can realize the actual secret data. Actual data

transforming their color characteristics to be those of the

hiding methods mainly apply the techniques of, difference

corresponding blocks of the target image. Skilful techniques

expansion,

are proposed to be design to conduct the color transformation

transformations,

process so that the secret image may be recovered nearly

expansion histogram modification, and histogram shifting.

losslessly. The information required for recovering the secret image is proposed to be embedded into the created mosaic

recursive, LSB

discrete substitution,

cosine/wavelet prediction-error

2. PROCESS

image by a lossless data hiding scheme using a key.

A new method for secure image transmission is proposed,

Steganalysis of the stego image is also proposed to recover the

which transforms a secret image into a useful mosaic image

original image back.

with the different size and looking like a preselected target image. The transformation process is conduct by a secret

Key Words: Color transformation, data hiding, image

key, and only with the key can a person recapture the secret

Encryption, mosaic image, secure image transmission.

image nearly losslessly from the mosaic image. The mosaic image is the result of rearrangement of the fragments of a secret image in beared of another image called the target

1.INTRODUCTION Images from different sources are utilized and transmitted through the internet for different applications, for example online personal photograph albums, confidential enterprise archives, restorative imaging framework, military pictures databases. These images generally contain private or confidential data so that they should be protected from leakages during transmissions. Encryption of image is a method that makes use of the characteristic property of an image, like high redundancy and strong spatial correlation, to get an encrypted image. The encrypted image is a useless image so that anyone cannot obtain the secret image from it © 2017, IRJET

|

Impact Factor value: 5.181

|

image preselected from a database. Using their method, the user is not allowed to select freely his/her favorite image for use as the target image. It is therefore desire in this study to remove this lack of the method while keeping its merit, that is, it is aim to design a new method that can transform a secret image into a secret fragment- visible mosaic image of the different size that has the visual appearance of any freely selected target image without the need of a database. Specifically, after a target image is selected arbitrarily, the given secret image is required to be first divided into rectangular fragments called tile images, then this tile image fit into similar blocks in the target image, called target ISO 9001:2008 Certified Journal

|

Page 1317


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
Review on a Secure Image Transmission Technique Via Secret-Fragment-Visible Mosaic Images by IRJET Journal - Issuu