A Comprehensive Review of Digital Data Hiding Techniques


如何引用文章

全文:

开放存取 开放存取
受限制的访问 ##reader.subscriptionAccessGranted##
受限制的访问 订阅存取

详细

This paper makes a study and overview of the currently existing data hiding schemes, from its primitive stages through the potential application. In the modern times with the advent of web technology information masking in digital imagery plays a main task of guaranteed protection and peer to peer data transfer between the intended users. Multitude schemes had predicted and employed on covering up secrecy from hackers. Initially availing signal concealment can be categorized into watermark, steganography cryptography, and so each has its unique benefits as well as demerits, fundamentally the insertion strategies have to follow certain features such as high capacity, robustness, security, payload and reliability. This paper gives a brief explanation of the multidisciplinary hiding strategies and their features in a comprised form using the tabular representation, such as watermarking, cryptography, and steganography.

作者简介

A. Rasmi

Computer Science and Engineering, Karpagam Academy of Higher Education

编辑信件的主要联系方式.
Email: rzwsa@yahoo.com
印度, Coimbatore, Tamil Nadu, 641021

B. Arunkumar

Computer Science and Engineering, Karpagam Academy of Higher Education

Email: rzwsa@yahoo.com
印度, Coimbatore, Tamil Nadu, 641021

V. Anees

Associate Professor, Computer Science and Engineering, Cochin University of Science and Technology

Email: rzwsa@yahoo.com
印度, Kochi, Kerala, 682022

补充文件

附件文件
动作
1. JATS XML

版权所有 © Pleiades Publishing, Ltd., 2019