A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Using Image Processing In Security
2016
International Journal Of Engineering And Computer Science
Using image stitching and image steganography security can be provided to any image which has to be sent over the network or transferred using any electronic mode. There is a message and a secret image that has to be sent. The secret image is divided into parts. The first phase is the Encrypting Phase, which deals with the process of converting the actual secret message into cipher text using the AES algorithm. In the second phase which is the Embedding Phase, the cipher text is embedded into
doi:10.18535/ijecs/v4i11.01
fatcat:vgsjentntrd5porrcwkarjqmb4