期刊名称:International Journal of Innovative Research in Science, Engineering and Technology
印刷版ISSN:2347-6710
电子版ISSN:2319-8753
出版年度:2015
卷号:4
期号:6
页码:3860
DOI:10.15680/IJIRSET.2015.0406008
出版社:S&S Publications
摘要:The image security on internet transfers is the concern of the hour as the breaching attacks into theimage databases are rising every year. The hackers take advantage of the stolen personal and important images to fulfilltheir dangerous and unethical intentions. The image data theft can be used to defame a person on the internet by postingthe illegal and unacceptable images of that person (internet user). Hence the images transfers have to be secure toensure the privacy of the user’s image data. In this research, a number of image security systems have been studied toevaluate the research gap. Majority of the existing image security systems are not up to date to protect against the latestbreaching attacks. So, we have proposed an effective and robust image security framework particularly designed for theimages. The proposed has been designed and implemented using MATLAB. In this research, a hybrid image securityframework has been proposed to overcome the problem stated earlier, which will be implemented by combiningvarious techniques together to achieve the image security goal. The techniques included in the combination would beimage compression, cryptography and steganography. DWT compression has been used, because it is a strongercompression algorithm. The steganographed image would be compressed to reduce its size. Blowfish encryptionalgorithm would be used for the encryption purposes. It offers maximum throughput (faster) and also energy efficient.Compressed image would be encrypted to enhance the image security. Real image will be hidden into another image. Acluster based steganographic technique will be used. Real image and face image would be analyzed, and the real imagewould be embedded in those areas of face image, where color schemes of the real image and face image would be mostsimilar. Kmeans or Hierarchical clustering would be used as a clustering technique. An all new comparative analysistechnique would be applied to make the comparison between real image and base image on the basis of color patterns.