Downloads: 113 | Views: 219
Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 1, January 2015 | Popularity: 6.8 / 10
Survey on Different Data Hiding Methods For Binary Host Images
Sofia. A. Khan, Antara Bhattacharya
Abstract: Data hiding approach aims to embed some secret information into a carrier data signal by altering the unimportant components for copyright protection or secret communication. In some cases, the data-hiding operation will lead to distortion in the host image. However, these distortion, is unacceptable to some applications, e. g. , medical or military images. In this case it is critical to embed the supplementary secret message with a reversible manner so that the original contents can be perfectly restored after extraction of the hidden data. There are number of information hiding techniques with the features that not only the message needs to be exactly extracted, but also the cover itself should be restored losslessly. This characteristic is important in some special context such as law forensics, military imagery and medical imagery. In these applications, the cover is very valuable or important to be damaged. So in the following text various techniques for data hiding are discussed. The survey is about how the data hiding techniques have gradually evolved with time and how techniques and methods when merged together can be effective.
Keywords: DATA MINING, CRYPTOGRAPHY, SECRET MESSAGES, ENCRYPTION, DECRYPTION
Edition: Volume 4 Issue 1, January 2015
Pages: 1313 - 1315
Similar Articles
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022
Pages: 654 - 659Image Encryption using (k, n) Secret Sharing Scheme using Lagrange Polynomial
GVSS Jayanth Anish
Downloads: 0
Survey Paper, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022
Pages: 947 - 949COVID-19 Prediction using Machine Learning Algorithms
Saily Suresh Patil
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023
Pages: 581 - 585Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security
R. Vidhya, R. Sathya
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024
Pages: 1075 - 1080Improving Health Information Security in Mobile Cloud Computing with Blockchain and Modular Encryption Techniques
Vikasa Bheemashankara Pateela, K Rahul Krishna, Dr. Krishna Kumar P R, Triveni N