Survey on Different Data Hiding Techniques
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 3
Abstract
Data is a vital resource in all areas. With the wide use of internet, the security of the data being transmitted over internet also became an important challenge. Now data security over internet has been an important challenge for researches and computer engineers for decades. The number of attacks is being increasing day by day. Data hiding is the method of hiding secret messages into cover media so that an attacker will not know the presence of that data in the image. This paper discusses various techniques used to hide data efficiently.
Authors and Affiliations
Richu Shibu , ER. Gripsy Paul
Optimal Powersystem Restoration using Neural Network
In this recent trends Power system restoration (PSR) became a challenging topic for the keen researchers. Many people proposes many techniques to solve this problem and overcome the limitations of the existing techn...
Enhancement of the image by using Histogram Modification and High-pass Filtering Mask
Generally the major problem is low contrast image analysis in medical Field. Low contrast digital images reduce the ability of observer in analyzing the image. This low contrast images are obtained from low radiated...
Detection and Prevention Of Cooperative Black Hole Attack in a MANET
A mobile ad hoc network (MANET) is a selfconfiguring infrastructure-less network of mobile devices connected wirelessly. In MANETs, security plays a major role as the mobile nodes can join and leave the network random...
A Public Auditing Framework for Cloud Storage Security
Commoditization of computing resources has become a reality with cloud computing which is a new computing model. Users are no longer required to invest on procuring computing resources. Instead they use resources pro...
Dg: Modeling Network Behavior for Static and Dynamic Websites
Internet services and applications have become an inextricable part of daily life, enabling communication and the management of personal information from anywhere. To accommodate this increase in application and data...