We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Data Hiding Techniques: A Review

by Shweta Patil, S. S. Katariya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 122 - Number 17
Year of Publication: 2015
Authors: Shweta Patil, S. S. Katariya
10.5120/21789-5099

Shweta Patil, S. S. Katariya . Data Hiding Techniques: A Review. International Journal of Computer Applications. 122, 17 ( July 2015), 1-3. DOI=10.5120/21789-5099

@article{ 10.5120/21789-5099,
author = { Shweta Patil, S. S. Katariya },
title = { Data Hiding Techniques: A Review },
journal = { International Journal of Computer Applications },
issue_date = { July 2015 },
volume = { 122 },
number = { 17 },
month = { July },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-3 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume122/number17/21789-5099/ },
doi = { 10.5120/21789-5099 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:10:46.757603+05:30
%A Shweta Patil
%A S. S. Katariya
%T Data Hiding Techniques: A Review
%J International Journal of Computer Applications
%@ 0975-8887
%V 122
%N 17
%P 1-3
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In recent years, due to explosive growth in the use of internet the security of sensitive data becomes one of the prime concern. For this various data hiding techniques are in used. Now a days reversible data hiding in encrypted images is in used due to its excellent property which is original cover can be recovered with no loss after extraction of the embedded data. Also it protect the original data. Previously all the methods use vacate room after the encryption (VRAE) method but the problem with that is sometimes errors are occurred at the time of recovery of original image. So we use reversible data hiding by reserving room before the encryption. Also we survey the reversible data hiding techniques with different algorithms used

References
  1. Kede Ma. Weiming Zhang, Xianfeng Zhao, Nenghai Yu,Fenghua Li, "Reversible Data Hiding in Images by Reserving Room Before Encryption", IEEE Trans on Information Forensics and security, Vol. 8, No. 3, March 2013
  2. Jun Tian, "Reversible Data Embedding Using a difference Expansion", IEEE Transaction , Vol. 13, No. 8, Aug 2003
  3. Wen Chung Kuo, Po Yu Lai, Lih Chyau Wuu, "Adaptive Reversible Data Hiding Based on Histogram", 10th International Conference on Intelligent Systems Design and Application, l' IEEE 2010 (2002) The IEEE website. [Online]. Available: http://www. ieee. org/
  4. Kuo-Ming Hung, Wen-Kai Su, Ting-Wen Chen, Li-Ming Chen, "Reversible Data Hiding Base on VQ and Halftoning Technique", International Conference on Microelectronics, Communication and Renewable Energy (ICMiCR-2013).
  5. Yun Q. Shi, "Reversible Data Hiding", I. J. Cox et al. : IWDW 2004, LNCS 3304, pp. 1-12 2005 l' Springer-Verlag Berlin Heidelberg 2005 "PDCA12-70 data sheet," Opto Speed SA, Mezzovico, Switzerland
  6. Jose, R. ; Abraham, G, "A separable reversible data hiding in encrypted im age with improved performance", Emerging Research Areas and 2013 International Conference on Microelectronics, Communications and Renewable Energy( AICERA/ICMiCR), 2013 Annual International Conference l'IEEE 2013.
  7. Moni Naor, Adi Shamir," Visual Cryptography", in Proc. EUROCRYPT'94, Berlin, Germany, 1995, vol. 950, pp. 1-12,Springer-Verlag, LNCS
  8. Siddharth Malik, Anjali Sardana, Jaya, "A Keyless Approach to Image Encryption", 2012 international conference on Communication systems and Network Technologies l'2012 IEEE
  9. InKoo Kang, Gonzalo R. Arce , Heung-Kyu Lee, " Color Extended visual cryptography using error diffusion", ICASSP 2009 l' IEEE 2009
  10. Wei Qiao, Hongdong Huaqing Liang, "A kind of Visual Cryptography Scheme For color Images based on halftone technique", International Conference on Measuring Technology and Mechatronics automation l' 2009 IEEE
  11. Yi-Hui Chen, Ci-Wei lan and Chiao Chih Huang, " A verifiable Visual Cryptography Scheme", Fifth International Conference and Evolutionary Computing l' IEEE 2011
  12. Dawen Xu, Rangding Wang, and Yun Q. Shi, Fellow, IEEE "Data Hiding in Encrypted H. 264/AVC Video Streams by Codeword Substitution" IEEE Transaction On Information Forensics and Security, Vol. 9, NO. 4, April 2014 applied to machine vibration analysis," in Proc. ASCI, 1999, pp. 398–405.
Index Terms

Computer Science
Information Sciences

Keywords

Data hiding cover media RDH MVD encryption