Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Secure Data Hiding Scheme for Digital Images Using Permutation and Normalization


Affiliations
1 IT Department, Jaya Engineering College, Chennai, India
2 Department of CSE, Anna University of Technology, Chennai, India
     

   Subscribe/Renew Journal


A secure data hiding method for digital images is proposed here. Min-Max Normalization method is used to provide space to embed secret bits into image pixels. The image pixels are normalized into some short range and then denormalized. The secret bit is directly added to the denormalized image pixel. Message dependent Permutation is performed to generate secret key. XOR operation is performed between the denormalized pixel values of the cover image on the positions according to secret key and the byte values of the secret message to enhance security. The experimental results reveal that the proposed scheme produces well hiding capacity and security.

Keywords

Watermarking, Steganography, Permutation, Normalization.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 245

PDF Views: 2




  • A Secure Data Hiding Scheme for Digital Images Using Permutation and Normalization

Abstract Views: 245  |  PDF Views: 2

Authors

D. R. Denslin Brabin
IT Department, Jaya Engineering College, Chennai, India
S. Janakiraman
Department of CSE, Anna University of Technology, Chennai, India

Abstract


A secure data hiding method for digital images is proposed here. Min-Max Normalization method is used to provide space to embed secret bits into image pixels. The image pixels are normalized into some short range and then denormalized. The secret bit is directly added to the denormalized image pixel. Message dependent Permutation is performed to generate secret key. XOR operation is performed between the denormalized pixel values of the cover image on the positions according to secret key and the byte values of the secret message to enhance security. The experimental results reveal that the proposed scheme produces well hiding capacity and security.

Keywords


Watermarking, Steganography, Permutation, Normalization.