Академический Документы
Профессиональный Документы
Культура Документы
In present time security is major concern while transmitting any message over a
network. Network security is not sufficient as cyber crime is increasing therefore
other method is used for providing security. Security provided to image using image
steganography and stitching is beneficial.AES algorithm is used to encrypt text
message and embedded in a part of the image the text message is difficult to find.
Image is divided into parts and then sent to the receiver. This makes it difficult to get
access to all the parts of the image at once therefore it become highly difficult for the
intruder to decode the document. There is no limitation on the image format that can
be used. The image can be gray scale or colored but the size of the message needs to
be of only 140 characters. II. LITERATURE SURVEY In today’s world the use of E-
Commerce is on the hike. Right from shopping for mobiles to buying a car and house.
These transactions are all done using private information like: credit card number,
password etc. Internet users are growing up day to day therefore the data transmitted
over the internet is under threat. Security must be provided to the data that is being
sent over the network. As with emerging technology the hacker also kept themselves
updated with technology and ways to hack it. In order to provide security there is only
a way to hide personal information from the hackers. Many techniques have been
developed like digital watermarking, visual cryptography: A forensic watermark, also
called a digital watermark, is a sequence of characters or code embedded in a digital
document, image, video or computer program to uniquely identify its originator and
authorized user. Forensic watermarks can be repeated at random locations within the
content to make them difficult to detect and remove. Visual Cryptography is a special
encryption technique to hide information in images in such a way that it can be
decrypted by the human vision if the correct key image is used. The technique was
proposed by Naor and Shamir in 1994. Visual Cryptography uses two transparent
images. One image contains random pixels and the other image contains the secret
information. It is impossible to retrieve the secret information from one of the images.
Both transparent images and layers are required to reveal the information. The above
techniques have been developed before image steganography. Researchers have also
developed techniques that embed data or another image within the image. There are
various method used for data hiding [4] like frequency domain, spatial domain
compressed data domain. In spatial domain, we deal with images as it is. The values
of the pixels of the image change with respect to scene. Whereas in frequency
domain, we deal with the rate at which the pixel values are changing in spatial
domain. In other word image pixel in the spatial domain are arranged in order to
incorporate the data to be embedded. Frequency domain data hiding [2, 5]: In this
method images are first transformed into frequency domain, and then data is
embedding is done by modifying the transformed coefficients of the frequency
domain. Compressed domain data hiding [2, 5]: Since the data is transmitted over the
network is always in the compressed form. This information is used in for embedding
the data in compressed domain where the compressed data coefficients are
manipulated to embed data. Cryptography provides security for the message
transmitted over the network whereas steganography protects both message and the
communicating parties. In this images is broken into n parts a person with access to
all n shares could only decrypt the image, while any n-1 shares revealed no
information about the original image. Image stitching is the process of combining
multiple photographic images with overlapping fields of view to produce a segmented
panorama or high-resolution image. Image stitching is done in the gradient domain
using linear blending and RANSAC parameter but this provides only 70-80%
efficiency. Thus, by using image steganography and image stitching algorithm
together double security can be provided to any application. Applications of the
proposed system are:
1. Financial Services (Banking)
2. Defence
3. Detective agencies
4. Government sectors
BODY
Image and video processing play an important role in the development of technologies
for dealing with security issues: surveillance cameras are widely diffused as means of
crime reduction, and image analysis tools are used in the forensics field. In this thesis
two problems are considered: the reconstruction of documents which have been reduced
to a heap of paper strips by a shredder device and the enhancement of poorly
illuminated surveillance videos.
On the base of the features, strips can be grouped in such a way that the
strips belonging to the same page in the original documents are assigned to the
same group and there are ideally as many groups as many the pages were. A
hierarchical clustering algorithm has been used for this aim. The number of
groups to be found is automatically selected by the algorithm in a proper
interval provided by the user. The clustering is effective in improving the
performance of a computer-aided reconstruction. Moreover, the computer
computational time for the on-line interaction with the human operator is re-
duced by clustering. The computer-aided reconstruction is modelled as an
image retrieval task: the user selects one strip, and the ones most similar to it
are retrieved (ordered by decreasing similarity measure) and shown on the
monitor. Among them, the user recognizes the correctly matching strips and
virtually glues them. The process is repeated iteratively until the reconstruction
has been accomplished.
Though many algorithms for dynamics reduction exist in the literature, the
problem of objectively assessing their performance is still unsolved. Usu-ally, a
subjective qualitative evaluation is performed, strongly relating the algorithm
performance to the personal observer taste. We developed two novel quality
measure algorithms, namely the tool based on the co-occurrence matrix and the
local contrast measure. Both take as a reference the high dynamics image and
regard as good the algorithms whose output is a low dynamics image with
similar characteristics. The co-occurrence matrix tool describes the spatial
distribution of high and low dynamics images by means of a visual
representation as well as of a number of numerical features. The second
measure we developed focuses on the local contrast feature. Based on the local
contrast, noise, details and homogeneous parts can be separated. An algorithm
which is able in particular to enhance the details part is con-sidered to perform
well according to this measure. A third methodology for assessing the
enhancement algorithm performance is to setup an experimental environment
where the luminosity can be varied. The same scene can then be acquired with
good luminosity (reference images) or under poor lighting
conditions (images to be processed by the algorithms). In this case a
good algorithm, given the badly illuminated images, would output images with
a low distance from the reference image.
To summarize, the main original contributions of this thesis in the field of image
and video enhancement are the following:
1. the LARS algorithm has been improved for surveillance and vehicle
driving assistance applications (and an FPGA implementation has been
proposed);
2. three novel objective quality measures to assess the performance of dy-
namics reduction algorithms have been developed.
CONCLUSION
The processing of images is faster and more cost-effective. One needs less time
for processing, as well as less film and other photographing equipment.
It is more ecological to process images. No processing or fixing chemicals are
needed to take and process digital images. However, printing inks are essential
when printing digital images.
When shooting a digital image, one can immediately see if the image is good or
not. Copying a digital image is easy, and the quality of the image stays good unless it is
compressed. However, it has some disadvantages too. A digital file of a certain
size cannot be enlarged with a good quality anymore. For instance, a good poster
cannot be made of an image file of 500 kb. However, it is easy to make an image
smaller.