Total views : 614

Privacy and Ownership Protection Digital Data Techniques: Comparison and Survey


  • Department of Electronics and Electrical Engineering, Lovely Professional University, Phagwara – 144411, Punjab, India


Objectives: The main objective for writing this paper is to review about classification of various digital data hiding techniques, their types and along with their comparison. Methods: This paper provides the complete overview about the various types of data hiding techniques currently available and highlighted the important concepts behind each technique. A brief overview of the research work on studies related to DHT is considered and several research papers on these topics are cited. This paper reviews various recent advancement made in the field of DHT particularly the cryptography, steganography and digital watermarking. Findings: The various digital data hiding techniques have their own unique features and processing methods for hiding or maintaining the secrecy of the original information but watermarking is emerging as one of the most competent way to care for digital data at present. This paper also provides an effective source of information about the possible research gap in the field of creating robust and secure watermarking technique.


Data Hiding Technique (DHT), Discrete Cosine transform (DCT), Discrete Wave late transform (DWT), Human Auditory System (HAS), Least Significant Bit (LSB) Coding, Watermarking (WM)

Full Text:

 |  (PDF views: 200)


  • Edward J, Christine I. Digital watermarking: Applications and Algorithms. Proceedings of IEEE Signal processing Magazine. 2001 July.
  • Rekha A,Pillai R. Piracy in the digital age: Is ethical awareness turning into action? IEEE International Symposium on Ethics in Science, Technology and Engineering, 2014, Chicago, IL. 2014. p.1–4.
  • If You Think Piracy Is Decreasing, You Haven't Looked at the Data... - Digital Music News", Digital Music News. 2016 Aug 31. Available from:
  • 2015 Aug 31 Available from: musiclicensingstudy/copyright-and-the-music-marketplace. pdf.
  • Friedlander J. 2016 Aug 31 Available from:
  • Chandra M, Pandey S,Chaudhary R. Digital watermarking technique for protecting digital images. 3rd International Conference on Computer Science and Information Technology (ICCSIT). 2010, Chengdu, 2010, 226-233.
  • Forouzan B.Introduction to cryptography and network security. Boston: McGraw-Hill Higher Education; 2008.
  • Mishra R, Bhanodiya P.A review on steganography and cryptography. International Conference on Advances in Computer Engineering and Applications (ICACEA),, Ghaziabad.2015. p. 119–22.
  • Bennett K. Linguistic Steganography: Survey, analysis, and robustness concerns for hiding information in text. Center for Education and Research in Information Assurance and Security. Purdue University, 2004.
  • Bhattacharyya S, Gautam S. A Robust Image Steganography using DWT Difference Modulation (DWTDM). International Journal of Computer network and Information Security.2012; ,4(7).
  • Jenkins N, Jean E.Steganography in audio.University of Cambridge CST Part II Dissertation. 2009.
  • Johnson N,Jajodia S. Exploring steganography: Seeing the unseen. IEEE Computer. 1998 Feb; 31(2):26–34.
  • Balgurgi P,Jagtap S. Audio Steganography Used for Secure Data Transmission. International Conference on Advances in Computing. Springer India. 2016; 174:699–706.
  • Bhagat AR,Dhembhare AB. An Efficient and Secure Data Hiding Technique-Steganography. International Journal of Innovative Research in Computer and Communication Engineering. 2015; 3(2): 941–9.
  • Singh H, Singh PK, Saroha K. A Survey on Text Based Steganography.Proceedings of the 3rd National Conference; INDIACom-2009 Computing For Nation Development. Bharati Vidyapeeth’s Institute of Computer Applications and Management, New Delhi. February 2009, 26–27.
  • Jain, Nitin, Ram SM, Dubey S. Image Steganography Using LSB and Edge Detection Technique. International Journal of Soft Computing and Engineering (IJSCE). 2012; 2231– 307.
  • Amin M, Salleh M, Ibrahim S, Katmin MR, Shamsuddin MZI. Information Hiding using Steganography. Proceedings of 4th National Conference on Telecommunication Technology, Shah Alam, Malaysia. 2003.
  • Kaur N, Behal S. A Survey on various types of Steganography and Analysis of Hiding Techniques. International Journal of Engineering Trends and Technology. 2014; 11(8): 387– 91.
  • Raphael A,Sundaram V. Cryptography and Steganography: A Survey. International Journal of Computer Technology 2011; 2(3): 626–30.
  • Husain F. A survey on digital watermarking techniques for multimedia data. MIT International Journal of Electronics and Communication Engineering. 2012; 2(1), 37–43.
  • Robert L, Shanmugapriya T. A Study on Digital Watermarking Techniques. International Journal of Recent Trends in Engineering. 2009; 2(1), 223–5.
  • Durvey M, Satyarthi D. A Review Paper on Digital Watermarking. International Journal of Emerging Trends and Technology in Computer Science.2014; 3(4): 99–105.
  • Tiwari N, Ramaiya MK,Sharma M. Digital watermarking using DWT and DES. 3rd International Advance Computing Conference. IEEE.2013.
  • Singh S. Digital Watermarking Trends. International Journal of Research in Computer Science. 2011; 1(1): 55–61.
  • Parashar P,Singh R. A Survey_Digital Image Watermarking Techniques. International Journal of Signal Processing, Image Processing and Pattern Recognition. 2014; 7(6): 111–26.
  • Potdar VM., Han S, Chang E. A survey of digital image watermarking techniques. 3rd IEEE International Conference on Industrial Informatics. INDIN '05. 2005. 2005 Aug; 10(12): 709–16.
  • Arnold M, Schmucker M, Wolthusen SD. Techniques and Applications of Digital Watermarking and Content Protection, 1st ed. Artech House: 2003 July.
  • Heidenheim, Germany. Digital Watermarking for Digital Media. Information Science Publishing. May 2005.
  • Mathapati R, Pujari J. Digital Video Watermarking. International Journal of Advanced Research in Computer Science and Software Engineering. 2012; 2(11): 1–8.
  • Cox IJ, Kilian J, Leighton FT, Shamoon T. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing. 1997 Dec; 6(12): 1673–87.
  • Micic A, Radenkovic D, Nikolic S. Autentification of Text Documents Using Digital Watermarking. Telecommunications in Modern Satellite, Cable and Broadcasting Services. 2005 Sept; 503-505.
  • Brassil, Maxemchuk, Gorman O; Electronic marking and identification techniques to discourage document copying. Selected Areas in Communications, IEEE Journal. 1995 Oct; 13(8): 1495–504.
  • Singh P, Chadha RS. A Survey of Digital Watermarking Techniques, Applications and Attacks. Proceedings of International Journal of Engineering and Innovative Technology (IJEIT).2013; 2(9).
  • Shah JK. ECE Department, Temple University, PA 19122. Available from: 35. Mistry D. Comparison of Digital Water Marking methods.
  • International Journal on Computer Science and Engineering. 2010; 2(9):2905–9.
  • Singh P, Chadha RS. A Survey of Digital Watermarking Techniques, Applications and Attacks. Proceedings of International Journal of Engineering and Innovative Technology (IJEIT). 2013 March; 2(9).
  • Kaur S, Copyright Protection of Data by using Video Watermarking. International Journal of Computer Application. 2015; 119(17): 14–18.
  • Diskin P, Lau S, Cummins, Parlett R. Steganography and Digital Watermarking Copyright. School of Computer Science. The University of Birmingham; 2004.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.