Reversible Watermarking based on Histogram ShiftingModification:A Review

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3

Abstract

 Abstract: When we talk about the data communication or exchange of information from sender to receiver, themajor concern is DATA. This (data) being of high importance, prone to various kinds of attacks. In order toprotect it, data hiding techniques are used. Some of the data hiding techniques available are digitalwatermarking, steganography, etc. By digital watermarking, data is hidden in any type of multimedia likeimages, audio, etc. Watermarking is one of the major solution to provide authenticity and copyright protectionto the digital data. But watermarking causes damage to the cover signal (signal in which data are embedding),therefore recovery of the original cover signal is not possible at the receiving end, which is not tolerable inmany fields like medical, military, etc. To reduce the degradation in the watermarked signal “Reversiblewatermarking techniques” are used. In reversible watermarking original cover signal and the message areretrieved with fewer errors. Reversible data hiding techniques are also known as the Lossless data hidingtechniques. This technique is getting high importance day by day because of some fields like military, medical,etc. This paper describes the various reversible watermarking techniques which are already existing.

Authors and Affiliations

Anamika Jain , Namita Tiwari

Keywords

Related Articles

Security Issues and Attacks in Wireless Sensor Network

Remote sensor arranges is a standout amongst the most developing innovation for detecting and playing out the distinctive undertakings. Such systems are valuable in numerous fields, for example, crises, wellbeing observi...

 Solution against BGP vulnerabilities

Abstract: The Border Gateway Protocol (BGP) is the only inter-domain routing protocol.Routing informationamong Autonomous Systems (AS) is exchanged using BGP. BGP protocol does not provide any securitymechanism, so it is...

 A Review on Speckle Noise Reduction Techniques

 Abstract:In medical image processing, Image denoising plays a very important role in diagnosis. Medical images are very much inconsistent. In medical imaging, Ultrasound is very popular due to its low cost, least h...

 Towards Accurate Estimation of Fingerprint Ridge Orientation  Using BPNN and Ternarization

 Accurate estimation of ridge orientation is a crucial step in fingerprint image enhancement because the performance of a minutiae extraction algorithm and matching heavily relies on the quality of the input fin...

 Computational Method for Forensic Verification of offline Signatures

 Signature verification models based on personal model have been reported by many researchers in past but the method proposed here is a forensic document examination approach using computational methods, unlike ot...

Download PDF file
  • EP ID EP95037
  • DOI -
  • Views 103
  • Downloads 0

How To Cite

Anamika Jain, Namita Tiwari (2015).  Reversible Watermarking based on Histogram ShiftingModification:A Review. IOSR Journals (IOSR Journal of Computer Engineering), 17(3), 25-32. https://europub.co.uk/articles/-A-95037