Survey on Different Data Hiding Techniques
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 3
Abstract
Data is a vital resource in all areas. With the wide use of internet, the security of the data being transmitted over internet also became an important challenge. Now data security over internet has been an important challenge for researches and computer engineers for decades. The number of attacks is being increasing day by day. Data hiding is the method of hiding secret messages into cover media so that an attacker will not know the presence of that data in the image. This paper discusses various techniques used to hide data efficiently.
Authors and Affiliations
Richu Shibu , ER. Gripsy Paul
ARM9 Based Real Time Embedded Network Video Capture And SMS Alerting system
In This paper, Network video capture system using friendly ARM9 board support package (BSP) S3C2440 is presented. This application system captures video, shares among networked systems and also alerts the controlling...
Power Management Strategy In Hybrid PV-FC And Wind- Power Generation Systems By Using Multi Input Single-Control (MISC) Battery
Global energy consumption is dramatically increasing due to higher standard of living and the increasing world population. The world has limited fossil and oil resources. As a consequence, the need for renewable ener...
Effective Sharing Of Unstructured Information With Tagging And Reducing Query Workload
Annotation schemes which use attribute-value pairs are usually more expressive because they can hold more information than untyped approaches. A recent work on using more mobile queries that influence such annotation...
Effect Self Loop Avoidance Weighted NDFA Method Using Fuzzy Cache Counter Classifier Algorithm for Efficient and Fastest Reachable Path in Travelling Networks
Now a days in computer path networks or travelling networks, the routing of vehicles or moving objects is mainly based on the best path. This will help in minimize the costs of paths in a place, city or any specified...
Local Sharing of Multiple Torrents in Peer to Peer System
The rapid growth traffic of Peer-toPeer applications, especially BitTorrent, is putting a lot of pressure to Internet Service Providers. In this paper, we examine the existence of the locality through a large-scale hy...