Importance and Techniques of Information Hiding : A Review

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 5

Abstract

Information or data is very crucial resource to us. Thus securing the information becomes all the more necessary. The communication media through which we send data does not provide data security, so other methods of securing data are required. Information hiding plays a very crucial role today. It provided methods for encrypting the information so that it becomes unreadable for any unintended user. This paper reviews the techniques that exist for data hiding and how can these be combined to provide another level of security.

Authors and Affiliations

Richa Gupta , Sunny Gupta , Anuradha Singhal

Keywords

Related Articles

Wireless Sensor Based Remote Monitoring System For Fluoride Affected Areas Using GPRS and GIS

Recent developments in the availability of low-cost integrated General Packet Radio Service (GPRS)/Global Positioning Systems (GPS) modem and publically available web based Geographical Information Systems (GIS)have enab...

Categorical Heuristic for Attribute Based Encryption in the Cloud Server

Attribute-based encryption (ABE) is a public-key based one-to-many encryption that allows users to encrypt and decrypt data based on user attributes. A promising application of ABE is flexible access control of encrypted...

Automatic Database Clustering: Issues and Algorithms

Clustering is the process of grouping of data, where the grouping is established by finding similarities between data based on their characteristics. Such groups are termed as Clusters. Clustering is an unsupervised lear...

Improving Routing Performance by Using Neighbor Coverage Knowledge and Energy Aware Metric in Mobile Adhoc Networks

A mobile adhoc network is an independent collection of mobile nodes without having the fixed infrastructure. In the mobile adhoc networks, because of the high mobility of the nodes there is frequent link breakage that ca...

Lifetime Analysis Using Encoding Technique in Wireless Sensor Network

The significant challenge in Wireless Sensor network is to maximize the network lifetime through minimizing energy. The monitoring area close to the Sinknode forms a bottleneck zone because of large traffic- flow which l...

Download PDF file
  • EP ID EP121287
  • DOI -
  • Views 89
  • Downloads 0

How To Cite

Richa Gupta, Sunny Gupta, Anuradha Singhal (2014). Importance and Techniques of Information Hiding : A Review. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 9(5), 260-265. https://europub.co.uk/articles/-A-121287