Survey on Different Data Hiding Techniques

Abstract

Data is a vital resource in all areas. With the wide use of internet, the security of the data being transmitted over internet also became an important challenge. Now data security over internet has been an important challenge for researches and computer engineers for decades. The number of attacks is being increasing day by day. Data hiding is the method of hiding secret messages into cover media so that an attacker will not know the presence of that data in the image. This paper discusses various techniques used to hide data efficiently.

Authors and Affiliations

Richu Shibu , ER. Gripsy Paul

Keywords

Related Articles

ARM9 Based Real Time Embedded Network Video Capture And SMS Alerting system

In This paper, Network video capture system using friendly ARM9 board support package (BSP) S3C2440 is presented. This application system captures video, shares among networked systems and also alerts the controlling...

Power Management Strategy In Hybrid PV-FC And Wind- Power Generation Systems By Using Multi Input Single-Control (MISC) Battery

Global energy consumption is dramatically increasing due to higher standard of living and the increasing world population. The world has limited fossil and oil resources. As a consequence, the need for renewable ener...

Effective Sharing Of Unstructured Information With Tagging And Reducing Query Workload

Annotation schemes which use attribute-value pairs are usually more expressive because they can hold more information than untyped approaches. A recent work on using more mobile queries that influence such annotation...

Effect Self Loop Avoidance Weighted NDFA Method Using Fuzzy Cache Counter Classifier Algorithm for Efficient and Fastest Reachable Path in Travelling Networks

Now a days in computer path networks or travelling networks, the routing of vehicles or moving objects is mainly based on the best path. This will help in minimize the costs of paths in a place, city or any specified...

Local Sharing of Multiple Torrents in Peer to Peer System

The rapid growth traffic of Peer-toPeer applications, especially BitTorrent, is putting a lot of pressure to Internet Service Providers. In this paper, we examine the existence of the locality through a large-scale hy...

Download PDF file
  • EP ID EP27883
  • DOI -
  • Views 235
  • Downloads 0

How To Cite

Richu Shibu, ER. Gripsy Paul (2014). Survey on Different Data Hiding Techniques. International Journal of Research in Computer and Communication Technology, 3(3), -. https://europub.co.uk/articles/-A-27883