International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 122 - Number 17 |
Year of Publication: 2015 |
Authors: Shweta Patil, S. S. Katariya |
10.5120/21789-5099 |
Shweta Patil, S. S. Katariya . Data Hiding Techniques: A Review. International Journal of Computer Applications. 122, 17 ( July 2015), 1-3. DOI=10.5120/21789-5099
In recent years, due to explosive growth in the use of internet the security of sensitive data becomes one of the prime concern. For this various data hiding techniques are in used. Now a days reversible data hiding in encrypted images is in used due to its excellent property which is original cover can be recovered with no loss after extraction of the embedded data. Also it protect the original data. Previously all the methods use vacate room after the encryption (VRAE) method but the problem with that is sometimes errors are occurred at the time of recovery of original image. So we use reversible data hiding by reserving room before the encryption. Also we survey the reversible data hiding techniques with different algorithms used