Reversible Watermarking based on Histogram ShiftingModification:A Review

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3

Abstract

 Abstract: When we talk about the data communication or exchange of information from sender to receiver, themajor concern is DATA. This (data) being of high importance, prone to various kinds of attacks. In order toprotect it, data hiding techniques are used. Some of the data hiding techniques available are digitalwatermarking, steganography, etc. By digital watermarking, data is hidden in any type of multimedia likeimages, audio, etc. Watermarking is one of the major solution to provide authenticity and copyright protectionto the digital data. But watermarking causes damage to the cover signal (signal in which data are embedding),therefore recovery of the original cover signal is not possible at the receiving end, which is not tolerable inmany fields like medical, military, etc. To reduce the degradation in the watermarked signal “Reversiblewatermarking techniques” are used. In reversible watermarking original cover signal and the message areretrieved with fewer errors. Reversible data hiding techniques are also known as the Lossless data hidingtechniques. This technique is getting high importance day by day because of some fields like military, medical,etc. This paper describes the various reversible watermarking techniques which are already existing.

Authors and Affiliations

Anamika Jain , Namita Tiwari

Keywords

Related Articles

Circuit Nanotechnology: QCA Adder Gate Layout Designs

Quantum-dot Cellular Automata (QCA) based circuit designs have been explored since its concept development in early 1980’s. Although there are lot of implementation barriers for the development of this nanotechnology to...

Overview of Hacking

Abstract: Hacking and hacker are terms that generally tend to have negative effect on people. These days, largely due to popular media most people wrongly think of hackers as computer criminal and the person who doing so...

Enhancing Security and Fine-Grained Access Control for Personal Health Record in Cloud Computing

Now a days , personal health record become patient-centric model in which PHR service allows a patient to manage and control personal health data in one place through the web, which has made the storage, retrieval and sh...

Using NP Problems to Share Keys in Secret-Key Cryptography

Abstract: Public key cryptography has now become an important means for providing confidentiality by its use of key distribution, in which users can do private communication with the help of encryption keys. It also prov...

 Analysis of Intrusion Detection Response System (IDRS) In Cyber Physical Systems (Cps) Using Regular Expression (Regexp)

 Abstract: In this research we aim to design and validate Intrusion Detection Response System (IDRS) for a cyber physical system (CPS) comprising for controlling and protecting physical infrastructures. The design p...

Download PDF file
  • EP ID EP95037
  • DOI -
  • Views 116
  • Downloads 0

How To Cite

Anamika Jain, Namita Tiwari (2015).  Reversible Watermarking based on Histogram ShiftingModification:A Review. IOSR Journals (IOSR Journal of Computer Engineering), 17(3), 25-32. https://europub.co.uk/articles/-A-95037