Review on Algorithms and Techniques of Reversible Data Hiding
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 3
Abstract
Nowadays, with the rapid development of information technology more and more images and data are available on the internet..So there is a need to provide some kind of authentication to such important data. With the increase in technology, the reversible data hiding (RDH) in encrypted images, has gain lots of importance. The reversible data hiding[1] is also known as the new watermarking technique which is used to authenticate an image by embedding some data on it as a watermark.A novel method is proposed by reserving room for embedding data before encryption of the image takes place with the available RDH algorithm and methods.Now the authentic person can hide the data easily on the image to provide authentication.This is the review paper about the current reversible data hiding algorithms available.
Authors and Affiliations
Shilpy Mukherjee, A R Mahajan
Make Safe Data Promulgate In Multi Cloud Storage
The cloud computing technique provide a high range of service the society over the INTERNET. The unique features of clouding computing is that users data are processes remotely users does not own the machine or opera...
WSN Based Industrial Environmental Monitoring System Using µC/OS-II
The paper describes the performance and functional characteristics of arm7 embedded microprocessor and Micro C/OS-II based wireless sensor node (WSN) in monitoring the parameters such as temperature, humidity, gas an...
A comparison Approach in Image Optimization Techniques
The capturing of multiple low-resolution images taken of the same scene results in a distortion between each image. Image registration is the process of determining this distortion. In this paper, we examine the hypo...
Fixed Point Lms Adaptive Filter Using Partial Product Generator
The area and power efficiency is very important for every circuit and its applications. Here I present an efficient architecture of adaptive filter with partial product generator and delayed lms algorithm is also used...
A Secured Load Balanced Clustering Algorithm for Wireless Sensor Network
Wireless sensor networks are composed of large number of power constrained nodes, which needs an energy conservation protocols to reduce the energy consumption as much as possible. Clustering is a standard approach fo...