A survey on digital data hiding schemes: principals, algorithms, and applications
نویسندگان
چکیده مقاله:
This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, or video and the final receiver, which is Human Auditory System (HAS) or Human Visual System (HVS), is also beneficial. For the speech/audio case, HAS will be briefly reviewed to find out how to make the most of its weaknesses for embedding as much data as possible. The same discussion also holds for the image watermarking. Although several audio and image data hiding schemes have been proposed so far, they can be divided into a few categories. Hence, conventional schemes along with their recently published extensions are introduced. Besides, a general comparison is made among these methods leading researchers/designers to choose the appropriate schemes based on their applications. Regarding the old scenario of the prisoner-warden and the evil intention of the warden to eavesdrop and/or destroy the data that Alice sends to Bob, there are both intentional and unintentional attacks to digital information hiding systems, which have the same effect based on our definition. These attacks can also be considered for testing the performance or benchmarking, of the watermarking algorithm. They are also known as steganalysis methods which will be discussed at the end of the paper.
منابع مشابه
A Survey on Data Hiding and Compression Schemes
Data hiding has a vital role to play in information security. Using a data hiding technique, secret information is hidden into cover digital content. Compression techniques and data hiding techniques received much less attention from the research community and from industry than cryptography. In past research many data hiding and image compression techniques has been developed, it works indepen...
متن کاملA Survey of Information Hiding Schemes for Digital Images
In this survey, we first describe the purposes for image hiding. They are Steganography, Image Watermarking and Image Authentication. Classified by hiding methods, image hiding can be divided into pixel-based image hiding, frequency-based image hiding and VQ-based image hiding. In the aspect of pixel-based image hiding, we describe three representative methods, the substitution table technique,...
متن کاملA Systematic Review of Data Mining Applications in Digital Libraries
Purpose: Study aimed to identify the applications of data mining in the provision of services, collection and management of digital libraries. Methodology: This is an applied study in terms of purpose and in terms of method is qualitative research that have been done by systematic review method. For this purpose, articles have been obtained by searching databases of Springer, Emerald, ProQuest,...
متن کاملGenetic algorithms for optimality of data hiding in digital images
This paper investigates the scope of usage of Genetic Algorithms (GA) for data hiding in digital images. The tool has been explored in this topic of research to achieve an optimal solution in multidimensional nonlinear problem of conflicting nature that exists among imperceptibility, robustness, security and payload capacity. Two spatial domain data hiding methods are proposed where GA is used ...
متن کاملمنابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ذخیره در منابع من قبلا به منابع من ذحیره شده{@ msg_add @}
عنوان ژورنال
دوره 5 شماره 1
صفحات 5- 36
تاریخ انتشار 2013-01-01
با دنبال کردن یک ژورنال هنگامی که شماره جدید این ژورنال منتشر می شود به شما از طریق ایمیل اطلاع داده می شود.
کلمات کلیدی
میزبانی شده توسط پلتفرم ابری doprax.com
copyright © 2015-2023