Author : Dr.Ruksar Fatima 1
Date of Publication :12th September 2017
Abstract: Today’s demand of internet in applications in large amount requires to be transmitted in a secure manner. In communication system transmission of digital data is not secure because interception and improper manipulation done by the eavesdropper. We can send digital data in such a way that no one, except the sender and the receiver can suspect the existing of data. In this paper we propose a new fuzzy logic based technique for content based image retrieval and digital data transmission, which transforms a secret digital data by embedding in another digital data with the same size and looking like selected target image. The transformation process can be controlled by a secret key generated by fuzzy logic
Reference :
-
- Reshma Chaudhari,A.M.Patil ”Content Based Image Retrieval Using Color and Shape Features” Journal of Advanced reaserch in electrical,electronics and instrumentation Engineering vol.1, Issue 5,ISSN- 2278- 8875,November 2012
- Bin Xu,Jiajun Bu, Chun Chen,Can Wang,Deng Cai,Xiaofei, Member IEEE, “EMR: A Scalable Graph Based Ranking Model for Content based Image Retrieval” IEEE Transaction, vol 27, No 1, Janaury 2015.
- Dr.k.sathiyasekar,S.karthick swathy Krisha.K.S “ Different data hiding Techniques”, Journal of Engineering and computer science ISSN:2319- 7242, vol 3, Issue 1, page no. 3655-3659 January 2014.
- Rincy MedayilJohn and Jacob Cherian “A secure image transmission via mosaic images using Genetic algorithm", IJIRST, Vol 2,Issue 5, ISSN. 2349-6010, October 2015.
- Usha,Srinath. N. k,Narayan and sangeeta K N “A secure data embedding technique in image steganography for medical images”, International Journal of Advanced Research in Computer Communication Engineering, Vol 3, Issue 8, ISSN. 2278-1021, August 2014.
- Ashalatha, anitha devi, Dr.K.B shivakumar “A secured secret image transmission by using fragment visible mosaic image technique”. IJANA, ISSN.0975-0282, May 2015.
- Manpreet kaur,Sukhpreet kaur “A survey of various encryption techniques for audio data”. IJARCSSE, Vol 4, Issue 5, May 2014.
- Jithu Vimal “Different audio steganographic techniques”. IJETT, Vol 11 ISSN. 2231-5381, May 2014.
- Souma Pal and prof samir kumar “Various methods of video steganography”. IJIRR, Vol 03, Issue 06, pp.2569-2573, June 2016.
- K.ganeshkumar and. Arivazhagan “A cryptography algorithm with fuzzy logic for effective data communication”. Indian journal of science and Technology, Vol 9,ISSN.0974-5645, December 2016