A Comprehensive Review of Digital Data Hiding Techniques


Citar

Texto integral

Acesso aberto Acesso aberto
Acesso é fechado Acesso está concedido
Acesso é fechado Somente assinantes

Resumo

This paper makes a study and overview of the currently existing data hiding schemes, from its primitive stages through the potential application. In the modern times with the advent of web technology information masking in digital imagery plays a main task of guaranteed protection and peer to peer data transfer between the intended users. Multitude schemes had predicted and employed on covering up secrecy from hackers. Initially availing signal concealment can be categorized into watermark, steganography cryptography, and so each has its unique benefits as well as demerits, fundamentally the insertion strategies have to follow certain features such as high capacity, robustness, security, payload and reliability. This paper gives a brief explanation of the multidisciplinary hiding strategies and their features in a comprised form using the tabular representation, such as watermarking, cryptography, and steganography.

Sobre autores

A. Rasmi

Computer Science and Engineering, Karpagam Academy of Higher Education

Autor responsável pela correspondência
Email: rzwsa@yahoo.com
Índia, Coimbatore, Tamil Nadu, 641021

B. Arunkumar

Computer Science and Engineering, Karpagam Academy of Higher Education

Email: rzwsa@yahoo.com
Índia, Coimbatore, Tamil Nadu, 641021

V. Anees

Associate Professor, Computer Science and Engineering, Cochin University of Science and Technology

Email: rzwsa@yahoo.com
Índia, Kochi, Kerala, 682022

Arquivos suplementares

Arquivos suplementares
Ação
1. JATS XML

Declaração de direitos autorais © Pleiades Publishing, Ltd., 2019