Reversible Watermarking based on Histogram ShiftingModification:A Review
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3
Abstract
Abstract: When we talk about the data communication or exchange of information from sender to receiver, themajor concern is DATA. This (data) being of high importance, prone to various kinds of attacks. In order toprotect it, data hiding techniques are used. Some of the data hiding techniques available are digitalwatermarking, steganography, etc. By digital watermarking, data is hidden in any type of multimedia likeimages, audio, etc. Watermarking is one of the major solution to provide authenticity and copyright protectionto the digital data. But watermarking causes damage to the cover signal (signal in which data are embedding),therefore recovery of the original cover signal is not possible at the receiving end, which is not tolerable inmany fields like medical, military, etc. To reduce the degradation in the watermarked signal “Reversiblewatermarking techniques” are used. In reversible watermarking original cover signal and the message areretrieved with fewer errors. Reversible data hiding techniques are also known as the Lossless data hidingtechniques. This technique is getting high importance day by day because of some fields like military, medical,etc. This paper describes the various reversible watermarking techniques which are already existing.
Authors and Affiliations
Anamika Jain , Namita Tiwari
Circuit Nanotechnology: QCA Adder Gate Layout Designs
Quantum-dot Cellular Automata (QCA) based circuit designs have been explored since its concept development in early 1980’s. Although there are lot of implementation barriers for the development of this nanotechnology to...
Overview of Hacking
Abstract: Hacking and hacker are terms that generally tend to have negative effect on people. These days, largely due to popular media most people wrongly think of hackers as computer criminal and the person who doing so...
Enhancing Security and Fine-Grained Access Control for Personal Health Record in Cloud Computing
Now a days , personal health record become patient-centric model in which PHR service allows a patient to manage and control personal health data in one place through the web, which has made the storage, retrieval and sh...
Using NP Problems to Share Keys in Secret-Key Cryptography
Abstract: Public key cryptography has now become an important means for providing confidentiality by its use of key distribution, in which users can do private communication with the help of encryption keys. It also prov...
Analysis of Intrusion Detection Response System (IDRS) In Cyber Physical Systems (Cps) Using Regular Expression (Regexp)
Abstract: In this research we aim to design and validate Intrusion Detection Response System (IDRS) for a cyber physical system (CPS) comprising for controlling and protecting physical infrastructures. The design p...