Survey on Different Data Hiding Techniques
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 3
Abstract
Data is a vital resource in all areas. With the wide use of internet, the security of the data being transmitted over internet also became an important challenge. Now data security over internet has been an important challenge for researches and computer engineers for decades. The number of attacks is being increasing day by day. Data hiding is the method of hiding secret messages into cover media so that an attacker will not know the presence of that data in the image. This paper discusses various techniques used to hide data efficiently.
Authors and Affiliations
Richu Shibu , ER. Gripsy Paul
Vampire Attacks:Draining Life From Wireless Ad-Hoc Sensor Networks
Wireless Ad – hoc Sensor Network is a newly introduced platform in the field of remote sensing, data collection, analysis, rectification of the problem and research in various studies. Prior security work in this are...
Confidential Safeguard Access Control In Shared Clouds
Cloud computing is a buzz express which means that accessing and storing of data and programs over the internet in its position of your computer's hard drive. Protection and secrecy represent major concerns in the ac...
Analysis of Four Stage Encryption
Four Stage Encryption generates the output alphabet from a given input alphabet. The size of the output alphabet depends upon the key K0. Unless this key is known, it is difficult to guess the size of the output alph...
A Secured Load Balanced Clustering Algorithm for Wireless Sensor Network
Wireless sensor networks are composed of large number of power constrained nodes, which needs an energy conservation protocols to reduce the energy consumption as much as possible. Clustering is a standard approach fo...
A Survey: Optimization of Backoff Algorithm for Wireless Mobile Adhoc Network
Media access control (MAC) layer is a very important layer in wireless sensor networks. The media access control data communication protocol sub layer also known as the medium access control. It provide addressing an...