Study of Information Hiding Techniques and their Counterattacks: A Review Article

Abstract

With the rapid development of the internet technologies, digital media needs to be transmitted conveniently over the network. Attacks, unauthorized access of the information over the network become greater issues now a day. Information Hiding provides solution to these issues. In this paper, we studied the various exist-ing information hiding techniques like steganography, watermarking etc. An overview of steganalysis attack is also presented in this paper. Steganography tools used for the purpose of information hiding are also dis-cussed.

Authors and Affiliations

Rajkumar Yadav

Keywords

Related Articles

Hardware/Software Co-design using Primitive Interface

 Most engineering designs can be viewed as systems, i.e., as collections of several components whose combined operation provides useful services. Components can be heterogeneous in nature and their interaction may b...

Regeneration of ZVS Converter with Resonant Inductor

This paper presents an analysis of the regeneration of zero-voltages witching converter with resonant inductor, quasi-resonant converters, and full-bridge zero-voltage-switched PWM Converter. The design of a clamping cir...

PoWer: Polar Wavelet-Gaussian Filter for ring artifact suppression in CT Imaging Systems

In X-ray Computerized Tomography (CT), ring artifacts are caused by imperfect detector elements as well as by defects or impurities on the scintillator crystals. They appear on CT images as a number of dark concentric ri...

A Similar Structure Block Prediction for Lossless Image Compression

 In image compression the main challenge is to efficiently encode and represent high frequency image structural components such as patterns, edges and textures. In this work, we develop an efficient image co...

Download PDF file
  • EP ID EP129714
  • DOI -
  • Views 106
  • Downloads 0

How To Cite

Rajkumar Yadav (2011). Study of Information Hiding Techniques and their Counterattacks: A Review Article. International Journal of Computer Science and Communication Networks, 1(2), 142-164. https://europub.co.uk/articles/-A-129714