Review on Binary Image Steganography and Watermarking
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 11
Abstract
In this paper we have reviewed and analyzed different watermarking and steganography techniques. This is based on image processing in spatial and transform domain. We have reviewed different techniques like data hiding by employing pairs of contour edge patterns, edge pixels, visual distortion tables, visual quality preserving rules, substitution, fixed partitioning of images, run lengths in spatial and using Discrete Cosine Transform, Discrete Wavelet Transform in transform domain. We have also represented analysis of these techniques in the form of table considering different factors of watermarking and steganography like visual quality, embedding capacity, security, robustness and computational complexity. It is concluded that spatial domain techniques are best with some factors like visual quality, while transform domain are best for some factors like robustness against attacks or other image processing operations and security. The data hiding capacity and computational complexity are common factors for both the domains.
Authors and Affiliations
Mrs. Gyankamal J. Chhaje , Ms. Krupali V. Deshmukh , Ms. Trupti S. Kulkarni
An Efficient Protocol for Resource Constrained Platforms Using ECC
At present, most of e-commerce applications are developed using asymmetric cryptography to guarantee the authentication of the involved parties. On the other hand, a growing demand for mobile devices has geared a shift t...
CHOICES ON DESIGNING GF (P) ELLIPTIC CURVE COPROCESSOR BENEFITING FROM MAPPING HOMOGENEOUS CURVES IN PARALLEL MULTIPLICATIONS
Modular inversion operation is known to be the most time consuming operation in ECC field arithmetic computations. In addition, Many ECC designs that use projective coordinates over GF (p) have not considered different f...
Upgraded Selection Sort
Sorting is a technique which is frequently used in our day to day life. It has a direct implication on searching. If the data is sorted on any key attribute, finding data based on that key attribute becomes very fast. Th...
Rapid and Proactive Approach on Exploration of Database Vulnerabilities
In today's complicated computing environment, managing data has become the primary concern of all industries. Information security is the greatest challenge and it has become essential to secure the enterprise system res...
Enhanced Component Retrieval Scheme Using Suffix Tree in Object Oriented Paradigm
In today’s world software are used everywhere i.e. every electronic devices use software. So there is a large demand of software but in the same proportion the development is not growing. It is similar to the supply dema...