A Secured Image Sharing Encyption Watermarking Schemes

Miss. S. V. Kale, Dr. V. M. Thakare

Abstract: Images from various sources are frequently utilized and to be transmitted through the internet for various applications, such as online personal photograph albums, confidential enterprise archives, document storage systems, medical imaging systems, and military image databases are used. These images usually contain private or confidential information so that they should be protected from leakages during the secure transmissions. This paper focuses on different schemes, such as Robust Watermarking Technique based on Texture Matching of the Watermark with the Host Image, A new blind authentication method based on the secret sharing technique with a data repair capability for gray scale document images via the use of the Portable Network Graphics (PNG) image, Integral imaging is a three-dimensional (3D) imaging technique. But some problems exists in each method, So as to overcome the problems that are given in analysis and discussion, The improved “Secured Image Sharing watermarking Technique”  sharing method for secure transformation  is proposed using the analysis of the various mobility models.

Keywords: Encryption, Decryption, Mutation, symmetric Key, Cryptography, Visual security.

Title: A Secured Image Sharing Encyption Watermarking Schemes

Author: Miss. S. V. Kale, Dr. V. M. Thakare

International Journal of Computer Science and Information Technology Research

ISSN 2348-1196 (print), ISSN 2348-120X (online)

Research Publish Journals

Vol. 7, Issue 2, April 2019 – June 2019

Citation
Share : Facebook Twitter Linked In

Citation
A Secured Image Sharing Encyption Watermarking Schemes by Miss. S. V. Kale, Dr. V. M. Thakare