Provide Privacy of Data and Image using Mosaic Technique

نویسندگان

  • Vaddadi Uma Varalakshmi
  • Surendra Varma
چکیده

Images are considered as one of the most important medium of conveying information, in the field of computer vision, by understanding images the information extracted from them can be used for other tasks. Image mosaic is the process of partitioning a digital image into multiple segments. Image de noising is done before the mosaic to avoid the selection of falsely object for mosaic to segment the image into multiple parts without loss of information. The goal of mosaic is to change the representation of an image into more meaningful and easier to analyse. Image mosaic is basically used to locate the objects and boundaries (lines, curves, etc.) in images. Mosaic technique can be classified into different types namely, Region Based, Edge Based, Threshold Based etc. In this paper we are proposed mainly three concepts for performing generation of secret key, secrecy of transferring data and also perform image mosaic process. By implementing diffie Hellman key exchange protocol we can generate shared key between the users. In this paper we are using an encryption technique using Reverse Binary xor Encryption Algorithm converting plain format data into unknown format. After converting data into cipher format we can put into image by using least significant bit technique. After completion of data to be hidden into image and perform mosaic technique for segment image. In this paper we are using region based technique for performing image mosaic process. By implementing those concepts we can provide more security of transferring data and also improve the efficiency of network.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security, confidentiality, and privacy of information in the field of health with data EPR embedding in medical MRI images based on HVS model

the development of new technology and modern equipment has led to the development of telemedicine systems. As a result, there are dangers such as publishing patient information and intentionally or unintentionally, medical information. The forensic organization, as one of the powerful arms of the judiciary, pursues important cases in the medical and psychiatric commissions to take steps to rea...

متن کامل

Analysis the privacy statement of the American Public Libraries and provide privacy statement for public libraries in Iran

Aim: The purpose of this study was to review the privacy statement of the American top public libraries and provide privacy statement for users of public libraries in Iran. Method: The research method is a combination of descriptive survey and Delphi library. The research community consisted of 25 American public libraries based on the rankings of the American Library Association's libraries. T...

متن کامل

A Meaningful Scheme for Sharing Secret Images Using Mosaic Images

Secret image sharing (SIS) technique protects an image by sharing it among many users. Most existing SIS schemes produce meaningless shadow images, which tends to cause attackers’ suspicion. In this paper, a meaningful secret image sharing scheme is proposed that, for the first time, uses mosaic images as the shadow images. The secret image is divided into several parts, and each part is transf...

متن کامل

Exploring Nursing Students’ Experiences of Privacy in Pediatrics Ward: A Qualitative Study

Background and Objectives: Respecting privacy means respecting individuals, their dignity and independence. It is mandatory to observe privacy in health-care systems. Therefore, this study was carried out with the aim of expressing nursing students’ experience of privacy in pediatrics ward. Methods: This qualitative study was done inductively using content analysis method. The participant...

متن کامل

An Efficient Privacy Preserving Medical Image Retrieval Using ROI Enabled Searchable Encryption

In this paper, we propose a new idea of searchable medical image encryption method to provide secrecy or authentication when a database is stashed away on a host maintained by a third-party server. This project addresses the trouble of enabling content based image retrieval throughout encrypted medical image dataset. Medical image database is encrypted by the owner of the content before transmi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016