Total views : 314

An Extensive Survey of Data Hiding Techniques

Affiliations

  • Computer Science and Engineering, Karpagam University, Coimbatore - 641021, Tamil Nadu, India

Abstract


Background/Objectives: In the digital age because of the widespread use of internet, data hiding in digital imagery plays a vital role to ensure copyright protection and robustness from malicious attacks. Methods/Statistical Analysis: This research work explores an overview of the recently existing data hiding techniques used for the hidden exchange of secret information, from its earliest instances through potential future application. We enlighten different data hiding methods termed as watermarking, cryptography and steganography which have been proposed in last few years, some of them are flexible and simple for data hiding purpose. Findings: The potency of these techniques is based on certain features like robustness, imperceptibility and data embedding capacity which enables the users to evaluate the performance and efficiency of these techniques. Application/Improvements: It has great importance in the nearby future especially in the fields like intelligence agencies, military agencies, and cyber crime, so it will be more beneficial for researchers to develop innovative techniques.

Keywords

Cryptography, Data Hiding, Steganography, Techniques, Watermarking.

Full Text:

 |  (PDF views: 393)

References


  • Thanikaiselvan V, Bansal T, Jain P, Shastri S. 9/7 IWT Domain data hiding in image using adaptive and non adaptive methods. Indian Journal of Science and Technology. 2016 Feb; 9(5). Doi: 10.17485/ijst/2016/v9i5/87189.
  • Kaur G, Kaur K. Digital watermarking and other data hiding techniques. IJITEE. 2013; 2(5):181. ISSN: 2278-3075.
  • Sharma PR, Mishra J. A comprehensive survey on data hiding technique. IRJET e. 2015 Jul; 2(4):1–5. ISSN: 2395 -0056.
  • Shastri S, Thanikaiselvan V. PVO based reversible data hiding with improved embedding capacity and security. Indian Journal of Science and Technology. 2016 Feb; 9(5). Doi: 10.17485/ijst/2016/v9i5/87191.
  • Anandpara D, Kothari AD. Working and comparative analysis of various spatial based image steganography techniques. International Journal of Computer Applications. 2015 Mar; 113(12):1–5. (0975 – 8887).
  • Patel PR, Patel Y. Survey on different methods of image steganography. IJIRCCE. 2014 Dec; 2(12):1–5.
  • Halder T, Karforma S, Mandal R. A novel data hiding approach by pixel-value-difference steganography and optimal adjustment to secure e-governance documents. Indian Journal of Science and Technology. 2015 Jul; 8(16). Doi: 10.17485/ijst/2015/v8i16/51269.
  • Vidya G, HemaPreetha R, Shilpa GS, Kalpana V. Image steganography using ken ken puzzle for secure data hiding. Indian Journal of Science and Technology. 2014 Jan; 7(9). Doi: 10.17485/ijst/2014/v7i9/48564.
  • Babloosaha B, Sharma S. Steganographic Techniques of Data Hiding using Digital Images Defence Journal. 2012 Jan; 62(1):11–8.
  • Rabara V, Shah V. Image based steganography review of LSB and HASH-LSB techniques. IJAERD. 2014; 2014.
  • Thasneem Salim PT, Vigneswaran T. FPGA Implementation of Hiding Information using Cryptography. Indian Journal of Science and Technology. 2015 Aug; 8(18). Doi: 10.17485/ ijst/2015/v8i19/76853.
  • Rahma AMS, Abdulmunim ME, Al-Janabi RJS. New spatial domain steganography method based on similarity technique. International Journal of Engineering and Technology. 2015 Jan; 5(1):1–4.
  • Islam S, Modi MR, Gupta P. Edge-based image steganography. EURASIP Journal on Information Security. 2014.
  • Sonaniya AK, Rai RK. A review on comparison between different image steganography methods. IJAECE. 2014 Nov; 3(8):355–58.
  • Shelke FM, Dongre AA, Soni PD. Comparison of different techniques for Steganography in images. IJAIEM. 2014 Feb; 3(2):1–6.
  • Suri S, Joshi H, Mincoha V, Tyagi A. Comparative analysis of steganography for coloured images. International Journal of Computer Sciences and Engineering Research Paper. 2014; 2(4):1–5.
  • Dash S, Das M, Jena KC. Region based data hiding for high payload. International Journal of Computer Science and Information Technologies. 2015; 6 (1):913–19.
  • Tiwari A, Yadav SR, Mittal NK. A review on different image steganography techniques certified. International Journal of Engineering and Innovative Technology (IJEIT). 2014 Jan; 3(7):1–4.
  • Kundra S, Madaan N. A comparative study of image steganography techniques. IJSR. 2014 Apr; 3(4):1–5. ISSN (Online): 2319-7064.
  • Mehndiratta A. Data hiding system using cryptography and steganography: A comprehensive modern investigation. IRJET. 2015 Apr; 2(1):1–7.
  • Abikoye Oluwakemi C, Adewole Kayode S, Oladipupo Ayotunde J. Efficient data hiding system using cryptography and steganography. IJAIS. 2012 Dec; 11(4):1–6. ISSN: 2249-0868.

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.