Importance and Techniques of Information Hiding : A Review
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 5
Abstract
Information or data is very crucial resource to us. Thus securing the information becomes all the more necessary. The communication media through which we send data does not provide data security, so other methods of securing data are required. Information hiding plays a very crucial role today. It provided methods for encrypting the information so that it becomes unreadable for any unintended user. This paper reviews the techniques that exist for data hiding and how can these be combined to provide another level of security.
Authors and Affiliations
Richa Gupta , Sunny Gupta , Anuradha Singhal
Wireless Sensor Based Remote Monitoring System For Fluoride Affected Areas Using GPRS and GIS
Recent developments in the availability of low-cost integrated General Packet Radio Service (GPRS)/Global Positioning Systems (GPS) modem and publically available web based Geographical Information Systems (GIS)have enab...
Categorical Heuristic for Attribute Based Encryption in the Cloud Server
Attribute-based encryption (ABE) is a public-key based one-to-many encryption that allows users to encrypt and decrypt data based on user attributes. A promising application of ABE is flexible access control of encrypted...
Automatic Database Clustering: Issues and Algorithms
Clustering is the process of grouping of data, where the grouping is established by finding similarities between data based on their characteristics. Such groups are termed as Clusters. Clustering is an unsupervised lear...
Improving Routing Performance by Using Neighbor Coverage Knowledge and Energy Aware Metric in Mobile Adhoc Networks
A mobile adhoc network is an independent collection of mobile nodes without having the fixed infrastructure. In the mobile adhoc networks, because of the high mobility of the nodes there is frequent link breakage that ca...
Lifetime Analysis Using Encoding Technique in Wireless Sensor Network
The significant challenge in Wireless Sensor network is to maximize the network lifetime through minimizing energy. The monitoring area close to the Sinknode forms a bottleneck zone because of large traffic- flow which l...