Image Morphing Concept for Secure Transmission of Image Data Contents over Internet
- 1 , Afganistan
Copyright: © 2020 Anant M. Bagade and S.N. Talbar. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Problem statement: Morphing of images has evolved and become a challenging field in information hiding and data security. The objective of this study is to secure the image data over internet while transmitting using the concept of image morphing Approach: To address this issue, the study proposed the new approach for image data security using the concept of image morphing. The morphing algorithm produces the stego keys. These stego keys are securely transmitted over Internet using TCP/IP. The stego keys are transmitted through TCP/IP’s identification field. The proposed method suggests how to transmit stego keys through identification field of IP. Results: Exterior sample points were manually identified and its inner values were interpolated using a triangular mesh. The complexity of Beier and Neely algorithm is O (n, p, w). Where n is the number of feature lines p is no of pixels in the image w is the amount of computation required for one pair feature line. By our approach the complexity is O (n,k),where n is the number of pixels and k is the number of triangles. Computations required are less, thus effect in increasing the performance of algorithm. The stego keys are identified during morphing process. As complexity reduces the speed of stego keys identification increases. Conclusion: The result showed that the proposed approach is efficient in terms of complexity and speed to generate the morph. The solution proposed for image data security over Internet is highly secure because the keys were transferred through IP identification field. The randomness in the identification field value makes this scheme no detectable.
- 1,368 Views
- 1,834 Downloads
- 4 Citations
- Image morphing
- image data security