Survey on Different Data Hiding Methods For Binary Host Images
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 1)Publication Date: 2015-01-05
Authors : Sofia. A. Khan; Antara Bhattacharya;
Page : 1313-1315
Keywords : DATA MINING; CRYPTOGRAPHY; SECRET MESSAGES; ENCRYPTION; DECRYPTION;
Abstract
Data hiding approach aims to embed some secret information into a carrier data signal by altering the unimportant components for copyright protection or secret communication. In some cases, the data-hiding operation will lead to distortion in the host image. However, these distortion, is unacceptable to some applications, e. g. , medical or military images. In this case it is critical to embed the supplementary secret message with a reversible manner so that the original contents can be perfectly restored after extraction of the hidden data. There are number of information hiding techniques with the features that not only the message needs to be exactly extracted, but also the cover itself should be restored losslessly. This characteristic is important in some special context such as law forensics, military imagery and medical imagery. In these applications, the cover is very valuable or important to be damaged. So in the following text various techniques for data hiding are discussed. The survey is about how the data hiding techniques have gradually evolved with time and how techniques and methods when merged together can be effective.
Other Latest Articles
- Leadership and Management Skills among Master in Technical and Vocational Education Students to Fulfill Employer Demand
- Challenges in Cloud Computing: Enabling the Future Internet of Services
- Alleviating Salt Stress in Crop Plants through Salt Tolerant Microbes
- Damping of Power and Enhancement of Stability for a Large Offshore Windfarm Using a Rectifier Current Regulator
- Survey on Mobile and Wireless Security Awareness: User Perspectives
Last modified: 2021-06-30 21:20:16