A Comparison of Different Data Hiding Techniques

Authors

  • Aditya Gupta  Department of Computer Science and Engineering, BGSBU, Rajouri. Jammu & Kashmir, India
  • Prabal Verma  Department of Computer Science and Engineering, BGSBU, Rajouri. Jammu & Kashmir, India
  • Rakesh Singh Sambyal  Department of Information Technology and Engineering, BGSBU, Rajouri, Jammu & Kashmir, India

Keywords:

Steganography,Cryptography,Watermarking

Abstract

Data or information is exceptionally urgent asset to us. In this manner securing the data turns into all the more fundamental. The transmission through which we send information does not provide a good level of information security, so different techniques for securing information are required. Hiding of this important asset is an exceptionally critical part today. It gave strategies to scrambling the data with the goal that it ends up unintelligible for any unintended client. This paper surveys the methods that exist for hiding of information and by what means can these be consolidated to give another level of security.

References

  1. Bender, W., Gruhl, D., Morimoto, N., & Lu, A. (1996). Techniques for data hiding. IBM systems journal, 35(3.4), 313-336.
  2. Boneh, D., & Franklin, M. (2001, August). Identity-based encryption from the Weil pairing. In Annual international cryptology conference (pp. 213-229). Springer, Berlin, Heidelberg.
  3. Aziz, B., & Nourdine, E. (2008, April). A recent survey on key management schemes in manet. In Information and Communication Technologies: From Theory to Applications, 2008. ICTTA 2008. 3rd International Conference on (pp. 1-6). IEEE.
  4. Slavin, K. R. (1999). U.S. Patent No. 5,956,407. Washington, DC: U.S. Patent and Trademark Office.
  5. Nuzzolese, A. G., Pandelli, S., & Ungaro, L. (2005). Steganography vs. Cryptography.
  6. Johnson, N. F., Duric, Z., & Jajodia, S. (2001). Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking: Attacks and Countermeasures (Vol. 1). Springer Science & Business Media.
  7. Manoj, I. V. S. (2010). Cryptography and steganography. International Journal of Computer Applications (0975–8887), 1(12), 63-68

Downloads

Published

2018-04-25

Issue

Section

Research Articles

How to Cite

[1]
Aditya Gupta, Prabal Verma, Rakesh Singh Sambyal, " A Comparison of Different Data Hiding Techniques, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 1, pp.183-188, March-April-2018.