SlideShare a Scribd company logo
1 of 5
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com 
A New Secure Image Transmission Technique via Secret- 
Fragment-Visible Mosaic Images by Nearly Reversible Color 
Transformations 
ABSTRACT: 
A new secure image transmission technique is proposed, which transforms 
automatically a given large-volume secret image into a so-called secret-fragment-visible 
mosaic image of the same size. The mosaic image, which looks similar to 
an arbitrarily selected target image and may be used as a camouflage of the secret 
image, is yielded by dividing the secret image into fragments and transforming 
their color characteristics to be those of the corresponding blocks of the target 
image. Skillful techniques are designed to conduct the color transformation process 
so that the secret image may be recovered nearly losslessly. A scheme of handling 
the overflows/underflows in the converted pixels’ color values by recording the 
color differences in the untransformed color space is also proposed. The 
information required for recovering the secret image is embedded into the created
mosaic image by a lossless data hiding scheme using a key. Good experimental 
results show the feasibility of the proposed method. 
EXISTING SYSTEM: 
Image encryption is a technique that makes use of the natural property of an image, 
such as high redundancy and strong spatial correlation, to get an encrypted image 
based on Shannon’s confusion and diffusion properties. The encrypted image is a 
noise image so that no one can obtain the secret image from it unless he/she has the 
correct key. However, the encrypted image is a meaningless file, which cannot 
provide additional information before decryption and may arouse an attacker’s 
attention during transmission due to its randomness in form. An alternative to 
avoid this problem is data hiding that hides a secret message into a cover image so 
that no one can realize the existence of the secret data, in which the data type of the 
secret message investigated in this paper is an image. Existing data hiding methods 
mainly utilize the techniques of LSB substitution, histogram shifting, difference 
expansion, prediction-error expansion, recursive histogram modification and 
discrete cosine/wavelet transformations. 
DISADVANTAGES OF EXISTING SYSTEM: 
 A main issue of the methods for hiding data in images is the difficulty 
to embed a large amount of message data into a single image. 
 Most image compression methods, such as JPEG compression, are not 
suitable for line drawings and textual graphics, in which sharp
contrasts between adjacent pixels are often destructed to become 
noticeable artifacts. 
PROPOSED SYSTEM: 
In this paper, a new technique for secure image transmission is proposed, which 
transforms a secret image into a meaningful mosaic image with the same size and 
looking like a preselected target image. The transformation process is controlled by 
a secret key, and only with the key can a person recover the secret image nearly 
losslessly from the mosaic image. The proposed method is inspired by Lai and 
Tsai, in which a new type of computer art image, called secret-fragment-visible 
mosaic image, was proposed. The mosaic image is the result of rearrangement of 
the fragments of a secret image in disguise of another image called the target 
image preselected from a database. But an obvious weakness of Lai and Tsai is the 
requirement of a large image database so that the generated mosaic image can be 
sufficiently similar to the selected target image. 
ADVANTAGES OF PROPOSED SYSTEM: 
 The user is not allowed to select freely his/her favorite image for use as the 
target image. It is therefore desired in this study to remove this weakness of 
the method while keeping its merit, that is, it is aimed to design a new 
method that can transform a secret image into a secret fragment-visible 
mosaic image of the same size that has the visual appearance of any freely 
selected target image without the need of a database.
SYSTEM ARCHITECTURE:
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : MATLAB 
 Tool : MATLAB R 2007B 
REFERENCE: 
Ya-Lin Lee, and Wen-Hsiang Tsai, “A New Secure Image Transmission 
Technique via Secret-Fragment-Visible Mosaic Images by Nearly Reversible 
Color Transformations”, IEEE TRANSACTIONS ON CIRCUITS AND 
SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 24, NO. 4, APRIL 2014.

More Related Content

More from IEEEBEBTECHSTUDENTPROJECTS

IEEE 2014 NS2 NETWORKING PROJECTS Discount counting for fast flow statistics...
IEEE 2014 NS2 NETWORKING PROJECTS  Discount counting for fast flow statistics...IEEE 2014 NS2 NETWORKING PROJECTS  Discount counting for fast flow statistics...
IEEE 2014 NS2 NETWORKING PROJECTS Discount counting for fast flow statistics...IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 NS2 NETWORKING PROJECTS Cloudy computing leveraging weather foreca...
IEEE 2014 NS2 NETWORKING PROJECTS  Cloudy computing leveraging weather foreca...IEEE 2014 NS2 NETWORKING PROJECTS  Cloudy computing leveraging weather foreca...
IEEE 2014 NS2 NETWORKING PROJECTS Cloudy computing leveraging weather foreca...IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 NS2 NETWORKING PROJECTS Certificateless remote anonymous authentic...
IEEE 2014 NS2 NETWORKING PROJECTS  Certificateless remote anonymous authentic...IEEE 2014 NS2 NETWORKING PROJECTS  Certificateless remote anonymous authentic...
IEEE 2014 NS2 NETWORKING PROJECTS Certificateless remote anonymous authentic...IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 NS2 NETWORKING PROJECTS Asymptotic analysis on secrecy capacity in...
IEEE 2014 NS2 NETWORKING PROJECTS  Asymptotic analysis on secrecy capacity in...IEEE 2014 NS2 NETWORKING PROJECTS  Asymptotic analysis on secrecy capacity in...
IEEE 2014 NS2 NETWORKING PROJECTS Asymptotic analysis on secrecy capacity in...IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 NS2 NETWORKING PROJECTS Algorithms for enhanced inter cell interfe...
IEEE 2014 NS2 NETWORKING PROJECTS  Algorithms for enhanced inter cell interfe...IEEE 2014 NS2 NETWORKING PROJECTS  Algorithms for enhanced inter cell interfe...
IEEE 2014 NS2 NETWORKING PROJECTS Algorithms for enhanced inter cell interfe...IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 NS2 NETWORKING PROJECTS A hybrid hardware architecture for high sp...
IEEE 2014 NS2 NETWORKING PROJECTS  A hybrid hardware architecture for high sp...IEEE 2014 NS2 NETWORKING PROJECTS  A hybrid hardware architecture for high sp...
IEEE 2014 NS2 NETWORKING PROJECTS A hybrid hardware architecture for high sp...IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Phase based-binarization-of-ancie...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Phase based-binarization-of-ancie...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Phase based-binarization-of-ancie...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Phase based-binarization-of-ancie...IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Fingerprint compression-based-on-...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Fingerprint compression-based-on-...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Fingerprint compression-based-on-...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Fingerprint compression-based-on-...IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Digital image-sharing-by-diverse-...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Digital image-sharing-by-diverse-...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Digital image-sharing-by-diverse-...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Digital image-sharing-by-diverse-...IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encr...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Designing an efficient image encr...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Designing an efficient image encr...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encr...IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS An efficient-parallel-approach-fo...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  An efficient-parallel-approach-fo...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  An efficient-parallel-approach-fo...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS An efficient-parallel-approach-fo...IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Tension in active shapes
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Tension in active shapesIEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Tension in active shapes
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Tension in active shapesIEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Seamless view synthesis through te...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Seamless view synthesis through te...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Seamless view synthesis through te...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Seamless view synthesis through te...IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Scale adaptive dictionary learning
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Scale adaptive dictionary learningIEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Scale adaptive dictionary learning
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Scale adaptive dictionary learningIEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Saliency aware video compression
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Saliency aware video compressionIEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Saliency aware video compression
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Saliency aware video compressionIEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Robust face recognition from multi...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Robust face recognition from multi...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Robust face recognition from multi...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Robust face recognition from multi...IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS On the spectrum of the plenoptic f...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS On the spectrum of the plenoptic f...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS On the spectrum of the plenoptic f...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS On the spectrum of the plenoptic f...IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Multilabel image classification vi...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Multilabel image classification vi...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Multilabel image classification vi...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Multilabel image classification vi...IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Multi label image categorization w...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Multi label image categorization w...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Multi label image categorization w...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Multi label image categorization w...IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Multi illuminant estimation with c...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Multi illuminant estimation with c...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Multi illuminant estimation with c...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Multi illuminant estimation with c...IEEEBEBTECHSTUDENTPROJECTS
 

More from IEEEBEBTECHSTUDENTPROJECTS (20)

IEEE 2014 NS2 NETWORKING PROJECTS Discount counting for fast flow statistics...
IEEE 2014 NS2 NETWORKING PROJECTS  Discount counting for fast flow statistics...IEEE 2014 NS2 NETWORKING PROJECTS  Discount counting for fast flow statistics...
IEEE 2014 NS2 NETWORKING PROJECTS Discount counting for fast flow statistics...
 
IEEE 2014 NS2 NETWORKING PROJECTS Cloudy computing leveraging weather foreca...
IEEE 2014 NS2 NETWORKING PROJECTS  Cloudy computing leveraging weather foreca...IEEE 2014 NS2 NETWORKING PROJECTS  Cloudy computing leveraging weather foreca...
IEEE 2014 NS2 NETWORKING PROJECTS Cloudy computing leveraging weather foreca...
 
IEEE 2014 NS2 NETWORKING PROJECTS Certificateless remote anonymous authentic...
IEEE 2014 NS2 NETWORKING PROJECTS  Certificateless remote anonymous authentic...IEEE 2014 NS2 NETWORKING PROJECTS  Certificateless remote anonymous authentic...
IEEE 2014 NS2 NETWORKING PROJECTS Certificateless remote anonymous authentic...
 
IEEE 2014 NS2 NETWORKING PROJECTS Asymptotic analysis on secrecy capacity in...
IEEE 2014 NS2 NETWORKING PROJECTS  Asymptotic analysis on secrecy capacity in...IEEE 2014 NS2 NETWORKING PROJECTS  Asymptotic analysis on secrecy capacity in...
IEEE 2014 NS2 NETWORKING PROJECTS Asymptotic analysis on secrecy capacity in...
 
IEEE 2014 NS2 NETWORKING PROJECTS Algorithms for enhanced inter cell interfe...
IEEE 2014 NS2 NETWORKING PROJECTS  Algorithms for enhanced inter cell interfe...IEEE 2014 NS2 NETWORKING PROJECTS  Algorithms for enhanced inter cell interfe...
IEEE 2014 NS2 NETWORKING PROJECTS Algorithms for enhanced inter cell interfe...
 
IEEE 2014 NS2 NETWORKING PROJECTS A hybrid hardware architecture for high sp...
IEEE 2014 NS2 NETWORKING PROJECTS  A hybrid hardware architecture for high sp...IEEE 2014 NS2 NETWORKING PROJECTS  A hybrid hardware architecture for high sp...
IEEE 2014 NS2 NETWORKING PROJECTS A hybrid hardware architecture for high sp...
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Phase based-binarization-of-ancie...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Phase based-binarization-of-ancie...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Phase based-binarization-of-ancie...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Phase based-binarization-of-ancie...
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Fingerprint compression-based-on-...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Fingerprint compression-based-on-...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Fingerprint compression-based-on-...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Fingerprint compression-based-on-...
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Digital image-sharing-by-diverse-...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Digital image-sharing-by-diverse-...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Digital image-sharing-by-diverse-...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Digital image-sharing-by-diverse-...
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encr...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Designing an efficient image encr...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Designing an efficient image encr...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encr...
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS An efficient-parallel-approach-fo...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  An efficient-parallel-approach-fo...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  An efficient-parallel-approach-fo...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS An efficient-parallel-approach-fo...
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Tension in active shapes
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Tension in active shapesIEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Tension in active shapes
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Tension in active shapes
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Seamless view synthesis through te...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Seamless view synthesis through te...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Seamless view synthesis through te...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Seamless view synthesis through te...
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Scale adaptive dictionary learning
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Scale adaptive dictionary learningIEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Scale adaptive dictionary learning
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Scale adaptive dictionary learning
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Saliency aware video compression
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Saliency aware video compressionIEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Saliency aware video compression
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Saliency aware video compression
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Robust face recognition from multi...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Robust face recognition from multi...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Robust face recognition from multi...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Robust face recognition from multi...
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS On the spectrum of the plenoptic f...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS On the spectrum of the plenoptic f...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS On the spectrum of the plenoptic f...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS On the spectrum of the plenoptic f...
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Multilabel image classification vi...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Multilabel image classification vi...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Multilabel image classification vi...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Multilabel image classification vi...
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Multi label image categorization w...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Multi label image categorization w...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Multi label image categorization w...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Multi label image categorization w...
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Multi illuminant estimation with c...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Multi illuminant estimation with c...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Multi illuminant estimation with c...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Multi illuminant estimation with c...
 

Recently uploaded

UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 

Recently uploaded (20)

UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 

IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS A new-secure-image-transmission-technique-via secret-fragment-visible mosaic images by nearly reversible color transformations

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com A New Secure Image Transmission Technique via Secret- Fragment-Visible Mosaic Images by Nearly Reversible Color Transformations ABSTRACT: A new secure image transmission technique is proposed, which transforms automatically a given large-volume secret image into a so-called secret-fragment-visible mosaic image of the same size. The mosaic image, which looks similar to an arbitrarily selected target image and may be used as a camouflage of the secret image, is yielded by dividing the secret image into fragments and transforming their color characteristics to be those of the corresponding blocks of the target image. Skillful techniques are designed to conduct the color transformation process so that the secret image may be recovered nearly losslessly. A scheme of handling the overflows/underflows in the converted pixels’ color values by recording the color differences in the untransformed color space is also proposed. The information required for recovering the secret image is embedded into the created
  • 2. mosaic image by a lossless data hiding scheme using a key. Good experimental results show the feasibility of the proposed method. EXISTING SYSTEM: Image encryption is a technique that makes use of the natural property of an image, such as high redundancy and strong spatial correlation, to get an encrypted image based on Shannon’s confusion and diffusion properties. The encrypted image is a noise image so that no one can obtain the secret image from it unless he/she has the correct key. However, the encrypted image is a meaningless file, which cannot provide additional information before decryption and may arouse an attacker’s attention during transmission due to its randomness in form. An alternative to avoid this problem is data hiding that hides a secret message into a cover image so that no one can realize the existence of the secret data, in which the data type of the secret message investigated in this paper is an image. Existing data hiding methods mainly utilize the techniques of LSB substitution, histogram shifting, difference expansion, prediction-error expansion, recursive histogram modification and discrete cosine/wavelet transformations. DISADVANTAGES OF EXISTING SYSTEM:  A main issue of the methods for hiding data in images is the difficulty to embed a large amount of message data into a single image.  Most image compression methods, such as JPEG compression, are not suitable for line drawings and textual graphics, in which sharp
  • 3. contrasts between adjacent pixels are often destructed to become noticeable artifacts. PROPOSED SYSTEM: In this paper, a new technique for secure image transmission is proposed, which transforms a secret image into a meaningful mosaic image with the same size and looking like a preselected target image. The transformation process is controlled by a secret key, and only with the key can a person recover the secret image nearly losslessly from the mosaic image. The proposed method is inspired by Lai and Tsai, in which a new type of computer art image, called secret-fragment-visible mosaic image, was proposed. The mosaic image is the result of rearrangement of the fragments of a secret image in disguise of another image called the target image preselected from a database. But an obvious weakness of Lai and Tsai is the requirement of a large image database so that the generated mosaic image can be sufficiently similar to the selected target image. ADVANTAGES OF PROPOSED SYSTEM:  The user is not allowed to select freely his/her favorite image for use as the target image. It is therefore desired in this study to remove this weakness of the method while keeping its merit, that is, it is aimed to design a new method that can transform a secret image into a secret fragment-visible mosaic image of the same size that has the visual appearance of any freely selected target image without the need of a database.
  • 5. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : MATLAB  Tool : MATLAB R 2007B REFERENCE: Ya-Lin Lee, and Wen-Hsiang Tsai, “A New Secure Image Transmission Technique via Secret-Fragment-Visible Mosaic Images by Nearly Reversible Color Transformations”, IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 24, NO. 4, APRIL 2014.