Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Data Hiding Techniques: A Review

Print
PDF
International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 122 - Number 17
Year of Publication: 2015
Authors:
Shweta Patil
S. S. Katariya
10.5120/21789-5099

Shweta Patil and S S Katariya. Article: Data Hiding Techniques: A Review. International Journal of Computer Applications 122(17):1-3, July 2015. Full text available. BibTeX

@article{key:article,
	author = {Shweta Patil and S. S. Katariya},
	title = {Article: Data Hiding Techniques: A Review},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {122},
	number = {17},
	pages = {1-3},
	month = {July},
	note = {Full text available}
}

Abstract

In recent years, due to explosive growth in the use of internet the security of sensitive data becomes one of the prime concern. For this various data hiding techniques are in used. Now a days reversible data hiding in encrypted images is in used due to its excellent property which is original cover can be recovered with no loss after extraction of the embedded data. Also it protect the original data. Previously all the methods use vacate room after the encryption (VRAE) method but the problem with that is sometimes errors are occurred at the time of recovery of original image. So we use reversible data hiding by reserving room before the encryption. Also we survey the reversible data hiding techniques with different algorithms used

References

  • Kede Ma. Weiming Zhang, Xianfeng Zhao, Nenghai Yu,Fenghua Li, "Reversible Data Hiding in Images by Reserving Room Before Encryption", IEEE Trans on Information Forensics and security, Vol. 8, No. 3, March 2013
  • Jun Tian, "Reversible Data Embedding Using a difference Expansion", IEEE Transaction , Vol. 13, No. 8, Aug 2003
  • Wen Chung Kuo, Po Yu Lai, Lih Chyau Wuu, "Adaptive Reversible Data Hiding Based on Histogram", 10th International Conference on Intelligent Systems Design and Application, l' IEEE 2010 (2002) The IEEE website. [Online]. Available: http://www. ieee. org/
  • Kuo-Ming Hung, Wen-Kai Su, Ting-Wen Chen, Li-Ming Chen, "Reversible Data Hiding Base on VQ and Halftoning Technique", International Conference on Microelectronics, Communication and Renewable Energy (ICMiCR-2013).
  • Yun Q. Shi, "Reversible Data Hiding", I. J. Cox et al. : IWDW 2004, LNCS 3304, pp. 1-12 2005 l' Springer-Verlag Berlin Heidelberg 2005 "PDCA12-70 data sheet," Opto Speed SA, Mezzovico, Switzerland
  • Jose, R. ; Abraham, G, "A separable reversible data hiding in encrypted im age with improved performance", Emerging Research Areas and 2013 International Conference on Microelectronics, Communications and Renewable Energy( AICERA/ICMiCR), 2013 Annual International Conference l'IEEE 2013.
  • Moni Naor, Adi Shamir," Visual Cryptography", in Proc. EUROCRYPT'94, Berlin, Germany, 1995, vol. 950, pp. 1-12,Springer-Verlag, LNCS
  • Siddharth Malik, Anjali Sardana, Jaya, "A Keyless Approach to Image Encryption", 2012 international conference on Communication systems and Network Technologies l'2012 IEEE
  • InKoo Kang, Gonzalo R. Arce , Heung-Kyu Lee, " Color Extended visual cryptography using error diffusion", ICASSP 2009 l' IEEE 2009
  • Wei Qiao, Hongdong Huaqing Liang, "A kind of Visual Cryptography Scheme For color Images based on halftone technique", International Conference on Measuring Technology and Mechatronics automation l' 2009 IEEE
  • Yi-Hui Chen, Ci-Wei lan and Chiao Chih Huang, " A verifiable Visual Cryptography Scheme", Fifth International Conference and Evolutionary Computing l' IEEE 2011
  • Dawen Xu, Rangding Wang, and Yun Q. Shi, Fellow, IEEE "Data Hiding in Encrypted H. 264/AVC Video Streams by Codeword Substitution" IEEE Transaction On Information Forensics and Security, Vol. 9, NO. 4, April 2014 applied to machine vibration analysis," in Proc. ASCI, 1999, pp. 398–405.