Research Article Open Access

Image Morphing Concept for Secure Transmission of Image Data Contents over Internet

Anant M. Bagade1 and S.N. Talbar1
  • 1 , Afganistan
Journal of Computer Science
Volume 6 No. 9, 2010, 987-992


Submitted On: 29 March 2010 Published On: 30 September 2010

How to Cite: Bagade, A. M. & Talbar, S. (2010). Image Morphing Concept for Secure Transmission of Image Data Contents over Internet. Journal of Computer Science, 6(9), 987-992.


Problem statement: Morphing of images has evolved and become a challenging field in information hiding and data security. The objective of this study is to secure the image data over internet while transmitting using the concept of image morphing Approach: To address this issue, the study proposed the new approach for image data security using the concept of image morphing. The morphing algorithm produces the stego keys. These stego keys are securely transmitted over Internet using TCP/IP. The stego keys are transmitted through TCP/IP’s identification field. The proposed method suggests how to transmit stego keys through identification field of IP. Results: Exterior sample points were manually identified and its inner values were interpolated using a triangular mesh. The complexity of Beier and Neely algorithm is O (n, p, w). Where n is the number of feature lines p is no of pixels in the image w is the amount of computation required for one pair feature line. By our approach the complexity is O (n,k),where n is the number of pixels and k is the number of triangles. Computations required are less, thus effect in increasing the performance of algorithm. The stego keys are identified during morphing process. As complexity reduces the speed of stego keys identification increases. Conclusion: The result showed that the proposed approach is efficient in terms of complexity and speed to generate the morph. The solution proposed for image data security over Internet is highly secure because the keys were transferred through IP identification field. The randomness in the identification field value makes this scheme no detectable.

  • 4 Citations



  • Image morphing
  • image data security
  • internet