Review on Algorithms and Techniques of Reversible Data Hiding
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 3
Abstract
Nowadays, with the rapid development of information technology more and more images and data are available on the internet..So there is a need to provide some kind of authentication to such important data. With the increase in technology, the reversible data hiding (RDH) in encrypted images, has gain lots of importance. The reversible data hiding[1] is also known as the new watermarking technique which is used to authenticate an image by embedding some data on it as a watermark.A novel method is proposed by reserving room for embedding data before encryption of the image takes place with the available RDH algorithm and methods.Now the authentic person can hide the data easily on the image to provide authentication.This is the review paper about the current reversible data hiding algorithms available.
Authors and Affiliations
Shilpy Mukherjee, A R Mahajan
Transmission Power Control in Wireless ad hoc Networks
In ad hoc wireless networks packets are relayed over multiple hops to reach their destination. In order to operate ad hoc networks several protocols, for media access control, power control, routing, and transport ar...
An Overview: Peak To Power Average Ratio reduction by Discrete Cosine Transform Selective Mapping
The OFDM is employed in many systems. The main the drawback of the OFDM systems is the high Peak to Power Average Ratio [PAPR].This paper deals with the basic idea of PAPR .The paper also describe in brief the differ...
Modeling A New Architecture Of Area Delay Efficient 2-D Fir Filter Using VHDL
This paper presented memory footprint and combinational complexity for two - dimensional finite impulse response (FIR) filter to get the systematic design strategy to obtain areadelay-power-efficient architectures. Ba...
Applications of MVS on Hierarchical Clustering Algorithms
Clustering is a valuable method that arranges a large quantity of unordered text documents into a small number of expressive and coherent clusters, thereby offering a basis for instinctive and informative steering an...
Detection and management of SPIT calls in VoiceOver-IP Services
Voice over IP (VoIP) technology has become a key role in the development for providing telephony services at a lower cost with a higher flexibility. VoIP services are faced with several security issues and threats such...