A Secure Data Hiding Scheme for Digital Images Using Permutation and Normalization
Abstract
Keywords
Full Text:
PDFReferences
D.R. Denslin Brabin, S.Janakiraman, “Reversible data hiding in digital images using Permutation and Pixel pair Modification”, Proc. of International conference ICST, 2011.
Bret Dunbar, “A detailed look at stegonagraphic Techniques and their use in an Open-Systems Environment”, SANS Institute 2002.
Ali Al-Ataby, Fawzi Al-Naima, “ A Modified High Capacity Image Steganography Technique Based on Wavelet Transform”, The International Arab Journal of Information Technology, Vol. 7, No. 4, October 2010, pp 357-363.
Donovan artz, “Digital steganography: hiding data within data”, IEEE internet computing, may.june 2001, pp 75-80.
Chin-Chen Chang, Wei-Liang Tai, and Chia-Chen Lin, “A Reversible Data Hiding Scheme Based on Side Match Vector Quantization”, IEEE Transaction on Circuits and Systems for Video Technology, Vol. 16, No. 10, October 2006, pp 1301-1308.
Chang C.C, Lin C.C and Chen Y.H, “ Reversible data embedding scheme using differences between original and predicted pixel values”, Published in IET Information Security, January 2008, Vol. 2, No. 2, pp. 35–46.
Ning Liu, Palak Amin and K.P. subbalakshmi, “Security and Robustness enhancement for Image data hiding”, IEEE Transaction on Multimedia, Vol. 9, No. 3, April 2007, pp. 466-478
Chun-Hsiang Huang, Shang-Chin Chuang and Ja-Ling Wu, “Digital-Invisible-ink Data hiding based on Spread-Spectrum and quantization techniques”, IEEE Transaction on Multimedia, Vol. 10, No. 4, June 2008, pp. 557-569
Anindya sarkar, Upamanyu Madhow and B.S.Manjunath, “Matrix embedding with Pseudorandom coefficient selection and error correction for robust and secure steganography”, IEEE Transaction on Information Forensics and security , Vol. 5, No. 2, June 2010, pp. 225-239
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.