A Survey of Information Hiding Techniques

نویسندگان

  • Komal Patel
  • Sumit Utareja
  • Hitesh Gupta
چکیده

To protect your secret information from the intruders it is necessary to convert information into unidentified form. So it is impossible to get your original information for intruders. So security is most challenging aspects for all users who want to share their secret information. With the wild growth of internet and the fast communication techniques in recent years the security and the confidentiality of the sensitive information has become of prime and first importance and concern. Information hiding is an art that involves communication of secret information in an appropriate carrier, e.g., image, video, audio etc. To protect information from unauthorized access various methods for information hiding like cryptography, stegnography, hashing, and authentication have been developed and are in practice today. In this paper we will be discussing one such information hiding techniques called Steganography. Steganography’s main goal is to hide the very existence of secure information so its challenge for an unauthorized party to find out secret information. Steganography is the process of cover sensitive information in any media to transfer it securely over the communication network. Our paper presents a survey on various information hiding techniques in steganography and evolution of different existing image steganography techniques of information hiding we conclude that researches and give some advantages and disadvantages of that and describe our proposed method. Keywords— Information hiding, Encryption, Decryption, Cryptography, Stegnography.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A survey on digital data hiding schemes: principals, algorithms, and applications

This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, ...

متن کامل

A Survey on Various Data Hiding Techniques and their Comparative Analysis

With the explosive growth of internet and the fast communication techniques in recent years the security and the confidentiality of the sensitive data has become of prime and supreme importance and concern. To protect this data from unauthorized access and tampering various methods for data hiding like cryptography, hashing, authentication have been developed and are in practice today. In this ...

متن کامل

A Survey on Data Hiding and Compression Schemes

Data hiding has a vital role to play in information security. Using a data hiding technique, secret information is hidden into cover digital content. Compression techniques and data hiding techniques received much less attention from the research community and from industry than cryptography. In past research many data hiding and image compression techniques has been developed, it works indepen...

متن کامل

Survey of Bio-inspired Computing for Information Hiding

In this paper, we performed surveys of bio-inspired techniques for information hiding. The applications of bio-inspired optimization for information hiding or watermarking have emerged in early 2000’s. Due to the flexibility of algorithm designs, parameter selections, and performance metrics, the uses of bio-inspired optimization techniques provide effective solutions for information hiding. Re...

متن کامل

Reversible Data Hiding and its Methods: A Survey

Hiding information destroys the host image even though the distortion introduced by hiding is imperceptible to the human visual system. Reversible data hiding techniques are designed to solve the problem of lossless embedding of large messages in digital images so that after the embedded message is extracted, the image can be restored completely to its original state before embedding occurred. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013