Survey on Different Data Hiding Techniques
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 3
Abstract
Data is a vital resource in all areas. With the wide use of internet, the security of the data being transmitted over internet also became an important challenge. Now data security over internet has been an important challenge for researches and computer engineers for decades. The number of attacks is being increasing day by day. Data hiding is the method of hiding secret messages into cover media so that an attacker will not know the presence of that data in the image. This paper discusses various techniques used to hide data efficiently.
Authors and Affiliations
Richu Shibu , ER. Gripsy Paul
EFFICIENT APPROACH FOR PRIVACY PRESERVING MICRODATA PUBLISHING USING SLICING
Many agencies and organizations are willing to release the data they collected to other parties for research and the formulation of public policies. Data often contains personally identifiable information and therefor...
An Application of Integrated Interface Schema (IIS) Over Multiple WDBS to Enhance Data Unit Annotation
The data unit’s revisits from the fundamental database are typically programmed into the result pages vigorously for human browsing. For the preset data units to be appliance process capable which is necessary for ma...
Android Based Braille Interactive System
In our daily life the telecommunication technology plays an important role. Despite of all these technological advancement in the telecommunication field, the physically impaired people have no access for these technolo...
EVS: A Cloud Services Information Security and Privacy Eligibility and Verification System
In recent years, cloud computing services have evolved as a new paradigm for delivering computing resources thatare dynamic and customizable, and providehigh performance. Many organizations are migrating their inform...
Storage Correctness and Dynamic Data Support for Cloud Data
Cloud users store their data in the cloud environment which is privileged by the service provider. Cloud users can access their cloud storage. Cloud storage is a model with virtualized pools of storage which is genera...