A Comprehensive Review of Digital Data Hiding Techniques


Cite item

Full Text

Open Access Open Access
Restricted Access Access granted
Restricted Access Subscription Access

Abstract

This paper makes a study and overview of the currently existing data hiding schemes, from its primitive stages through the potential application. In the modern times with the advent of web technology information masking in digital imagery plays a main task of guaranteed protection and peer to peer data transfer between the intended users. Multitude schemes had predicted and employed on covering up secrecy from hackers. Initially availing signal concealment can be categorized into watermark, steganography cryptography, and so each has its unique benefits as well as demerits, fundamentally the insertion strategies have to follow certain features such as high capacity, robustness, security, payload and reliability. This paper gives a brief explanation of the multidisciplinary hiding strategies and their features in a comprised form using the tabular representation, such as watermarking, cryptography, and steganography.

About the authors

A. Rasmi

Computer Science and Engineering, Karpagam Academy of Higher Education

Author for correspondence.
Email: rzwsa@yahoo.com
India, Coimbatore, Tamil Nadu, 641021

B. Arunkumar

Computer Science and Engineering, Karpagam Academy of Higher Education

Email: rzwsa@yahoo.com
India, Coimbatore, Tamil Nadu, 641021

V. Mohammed Anees

Associate Professor, Computer Science and Engineering, Cochin University of Science and Technology

Email: rzwsa@yahoo.com
India, Kochi, Kerala, 682022

Supplementary files

Supplementary Files
Action
1. JATS XML

Copyright (c) 2019 Pleiades Publishing, Ltd.