A Survey of Information Hiding Techniques
نویسندگان
چکیده
To protect your secret information from the intruders it is necessary to convert information into unidentified form. So it is impossible to get your original information for intruders. So security is most challenging aspects for all users who want to share their secret information. With the wild growth of internet and the fast communication techniques in recent years the security and the confidentiality of the sensitive information has become of prime and first importance and concern. Information hiding is an art that involves communication of secret information in an appropriate carrier, e.g., image, video, audio etc. To protect information from unauthorized access various methods for information hiding like cryptography, stegnography, hashing, and authentication have been developed and are in practice today. In this paper we will be discussing one such information hiding techniques called Steganography. Steganography’s main goal is to hide the very existence of secure information so its challenge for an unauthorized party to find out secret information. Steganography is the process of cover sensitive information in any media to transfer it securely over the communication network. Our paper presents a survey on various information hiding techniques in steganography and evolution of different existing image steganography techniques of information hiding we conclude that researches and give some advantages and disadvantages of that and describe our proposed method. Keywords— Information hiding, Encryption, Decryption, Cryptography, Stegnography.
منابع مشابه
A survey on digital data hiding schemes: principals, algorithms, and applications
This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, ...
متن کاملA Survey on Various Data Hiding Techniques and their Comparative Analysis
With the explosive growth of internet and the fast communication techniques in recent years the security and the confidentiality of the sensitive data has become of prime and supreme importance and concern. To protect this data from unauthorized access and tampering various methods for data hiding like cryptography, hashing, authentication have been developed and are in practice today. In this ...
متن کاملA Survey on Data Hiding and Compression Schemes
Data hiding has a vital role to play in information security. Using a data hiding technique, secret information is hidden into cover digital content. Compression techniques and data hiding techniques received much less attention from the research community and from industry than cryptography. In past research many data hiding and image compression techniques has been developed, it works indepen...
متن کاملSurvey of Bio-inspired Computing for Information Hiding
In this paper, we performed surveys of bio-inspired techniques for information hiding. The applications of bio-inspired optimization for information hiding or watermarking have emerged in early 2000’s. Due to the flexibility of algorithm designs, parameter selections, and performance metrics, the uses of bio-inspired optimization techniques provide effective solutions for information hiding. Re...
متن کاملReversible Data Hiding and its Methods: A Survey
Hiding information destroys the host image even though the distortion introduced by hiding is imperceptible to the human visual system. Reversible data hiding techniques are designed to solve the problem of lossless embedding of large messages in digital images so that after the embedded message is extracted, the image can be restored completely to its original state before embedding occurred. ...
متن کامل