Review on Binary Image Steganography and Watermarking

Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 11

Abstract

In this paper we have reviewed and analyzed different watermarking and steganography techniques. This is based on image processing in spatial and transform domain. We have reviewed different techniques like data hiding by employing pairs of contour edge patterns, edge pixels, visual distortion tables, visual quality preserving rules, substitution, fixed partitioning of images, run lengths in spatial and using Discrete Cosine Transform, Discrete Wavelet Transform in transform domain. We have also represented analysis of these techniques in the form of table considering different factors of watermarking and steganography like visual quality, embedding capacity, security, robustness and computational complexity. It is concluded that spatial domain techniques are best with some factors like visual quality, while transform domain are best for some factors like robustness against attacks or other image processing operations and security. The data hiding capacity and computational complexity are common factors for both the domains.

Authors and Affiliations

Mrs. Gyankamal J. Chhaje , Ms. Krupali V. Deshmukh , Ms. Trupti S. Kulkarni

Keywords

Related Articles

An Efficient Protocol for Resource Constrained Platforms Using ECC

At present, most of e-commerce applications are developed using asymmetric cryptography to guarantee the authentication of the involved parties. On the other hand, a growing demand for mobile devices has geared a shift t...

CHOICES ON DESIGNING GF (P) ELLIPTIC CURVE COPROCESSOR BENEFITING FROM MAPPING HOMOGENEOUS CURVES IN PARALLEL MULTIPLICATIONS

Modular inversion operation is known to be the most time consuming operation in ECC field arithmetic computations. In addition, Many ECC designs that use projective coordinates over GF (p) have not considered different f...

Upgraded Selection Sort

Sorting is a technique which is frequently used in our day to day life. It has a direct implication on searching. If the data is sorted on any key attribute, finding data based on that key attribute becomes very fast. Th...

Rapid and Proactive Approach on Exploration of Database Vulnerabilities

In today's complicated computing environment, managing data has become the primary concern of all industries. Information security is the greatest challenge and it has become essential to secure the enterprise system res...

Enhanced Component Retrieval Scheme Using Suffix Tree in Object Oriented Paradigm

In today’s world software are used everywhere i.e. every electronic devices use software. So there is a large demand of software but in the same proportion the development is not growing. It is similar to the supply dema...

Download PDF file
  • EP ID EP145267
  • DOI -
  • Views 124
  • Downloads 0

How To Cite

Mrs. Gyankamal J. Chhaje, Ms. Krupali V. Deshmukh, Ms. Trupti S. Kulkarni (2011). Review on Binary Image Steganography and Watermarking. International Journal on Computer Science and Engineering, 3(11), 3645-3651. https://europub.co.uk/articles/-A-145267