Survey on reversible data hiding techniques
نویسندگان
چکیده
منابع مشابه
A Review on Reversible Data Hiding Techniques
Reversible data hiding (RDH) has been intensively studied in the community of signal processing. Also referred as invertible or lossless data hiding, RDH is to embed a piece of information into a host signal to generate the marked one, from which the original signal can be exactly recovered after extracting the embedded data. The technique of RDH is useful in some sensitive applications where n...
متن کاملA Survey on Reversible Image Data Hiding Scheme
The greater part of the reversible data hiding approaches proposed so far fuse a lossless information compression stage. The utilization of an elaborate data compression stage increases the complexity of watermarking. There are some watermarking plans that don't depend on extra data compression, with respect to example, circular histogram interpretation schemes. In this paper a survey is presen...
متن کاملA Survey on Reversible Data Hiding in Encrypted Image
Recently more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original image cover can be losslessly recovered after data embedded is extracted while protecting the image content’s as confidential. In this survey paper different reversible data hiding methods are analyzed. All previous methods embed data by reversibly vac...
متن کاملSurvey on a Highly Secured Reversible Data Hiding: Principles, Techniques and Recent Studies
Today data hacking is a very big problem in networking field. There are many security techniques available to solving this problem. There are many research processing techniques related to internet security, cryptography and steganography etc. One of these is datahiding, using this concept we can provide security, authentication to the system. Data hiding cannot recover original cover. While Re...
متن کاملA Survey on Data Hiding Techniques in Encrypted Images
The transmission of confidential data over the network requires more security. So, for improving security in data transmission, we can hide the data inside an encrypted image. Hence the confidentiality of the image and the data embedded in the image is maintained. The data embedded can be extracted without any error, and also the cover image can be restored with error free. This type of techniq...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Security and Its Applications
سال: 2014
ISSN: 1738-9976,1738-9976
DOI: 10.14257/ijsia.2014.8.4.27