Survey on Different Data Hiding Techniques

Abstract

Data is a vital resource in all areas. With the wide use of internet, the security of the data being transmitted over internet also became an important challenge. Now data security over internet has been an important challenge for researches and computer engineers for decades. The number of attacks is being increasing day by day. Data hiding is the method of hiding secret messages into cover media so that an attacker will not know the presence of that data in the image. This paper discusses various techniques used to hide data efficiently.

Authors and Affiliations

Richu Shibu , ER. Gripsy Paul

Keywords

Related Articles

Vampire Attacks:Draining Life From Wireless Ad-Hoc Sensor Networks

Wireless Ad – hoc Sensor Network is a newly introduced platform in the field of remote sensing, data collection, analysis, rectification of the problem and research in various studies. Prior security work in this are...

Confidential Safeguard Access Control In Shared Clouds

Cloud computing is a buzz express which means that accessing and storing of data and programs over the internet in its position of your computer's hard drive. Protection and secrecy represent major concerns in the ac...

Analysis of Four Stage Encryption

Four Stage Encryption generates the output alphabet from a given input alphabet. The size of the output alphabet depends upon the key K0. Unless this key is known, it is difficult to guess the size of the output alph...

A Secured Load Balanced Clustering Algorithm for Wireless Sensor Network

Wireless sensor networks are composed of large number of power constrained nodes, which needs an energy conservation protocols to reduce the energy consumption as much as possible. Clustering is a standard approach fo...

A Survey: Optimization of Backoff Algorithm for Wireless Mobile Adhoc Network

Media access control (MAC) layer is a very important layer in wireless sensor networks. The media access control data communication protocol sub layer also known as the medium access control. It provide addressing an...

Download PDF file
  • EP ID EP27883
  • DOI -
  • Views 255
  • Downloads 0

How To Cite

Richu Shibu, ER. Gripsy Paul (2014). Survey on Different Data Hiding Techniques. International Journal of Research in Computer and Communication Technology, 3(3), -. https://europub.co.uk/articles/-A-27883