International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 113 | Views: 252

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 1, January 2015 | Popularity: 6.8 / 10


     

Survey on Different Data Hiding Methods For Binary Host Images

Sofia. A. Khan, Antara Bhattacharya


Abstract: Data hiding approach aims to embed some secret information into a carrier data signal by altering the unimportant components for copyright protection or secret communication. In some cases, the data-hiding operation will lead to distortion in the host image. However, these distortion, is unacceptable to some applications, e. g. , medical or military images. In this case it is critical to embed the supplementary secret message with a reversible manner so that the original contents can be perfectly restored after extraction of the hidden data. There are number of information hiding techniques with the features that not only the message needs to be exactly extracted, but also the cover itself should be restored losslessly. This characteristic is important in some special context such as law forensics, military imagery and medical imagery. In these applications, the cover is very valuable or important to be damaged. So in the following text various techniques for data hiding are discussed. The survey is about how the data hiding techniques have gradually evolved with time and how techniques and methods when merged together can be effective.


Keywords: DATA MINING, CRYPTOGRAPHY, SECRET MESSAGES, ENCRYPTION, DECRYPTION


Edition: Volume 4 Issue 1, January 2015


Pages: 1313 - 1315



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Sofia. A. Khan, Antara Bhattacharya, "Survey on Different Data Hiding Methods For Binary Host Images", International Journal of Science and Research (IJSR), Volume 4 Issue 1, January 2015, pp. 1313-1315, https://www.ijsr.net/getabstract.php?paperid=SUB15484, DOI: https://www.doi.org/10.21275/SUB15484



Similar Articles

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022

Pages: 654 - 659

Image Encryption using (k, n) Secret Sharing Scheme using Lagrange Polynomial

GVSS Jayanth Anish

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1068 - 1070

Predicting the Course Knowledge Level of Students using Data Mining Techniques

Thapaswini P S

Share this Article

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article
Top