Secure Data Hiding Technique using Secret Image Scrambling

Vijay Kumar Sharma, R. Jaya Krishna, Arjun Singh, Vikram Singh Rathore

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

Today secure data hiding is remaining as the demanding topic because of its advantages. Most of the things are delivering electronically during these days, so steganography fulfills this requirement by providing safe data hiding. In this paper, wavelet based secure data hiding is proposed. Initially, the secrete image is encrypted by using pixel scrambling operation with circular shift and swapping operation then the resultant image is added to the cover image. Scrambling process is applied up to N round. The resultant image picture quality has been improved by applying pixel-based correlation operation. The results show the strength of proposed technique. The proposed technique is more robust because the secret image is initially scrambled before embedding.

Original languageEnglish
Title of host publicationProceedings of the 4th International Conference on Electronics, Communication and Aerospace Technology, ICECA 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages831-836
Number of pages6
ISBN (Electronic)9781728163871
DOIs
Publication statusPublished - 05-11-2020
Event4th International Conference on Electronics, Communication and Aerospace Technology, ICECA 2020 - Coimbatore, India
Duration: 05-11-202007-11-2020

Publication series

NameProceedings of the 4th International Conference on Electronics, Communication and Aerospace Technology, ICECA 2020

Conference

Conference4th International Conference on Electronics, Communication and Aerospace Technology, ICECA 2020
Country/TerritoryIndia
CityCoimbatore
Period05-11-2007-11-20

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Signal Processing
  • Aerospace Engineering
  • Electrical and Electronic Engineering
  • Instrumentation

Fingerprint

Dive into the research topics of 'Secure Data Hiding Technique using Secret Image Scrambling'. Together they form a unique fingerprint.

Cite this