A Comparison of Different Data Hiding Techniques
Keywords:
Steganography,Cryptography,WatermarkingAbstract
Data or information is exceptionally urgent asset to us. In this manner securing the data turns into all the more fundamental. The transmission through which we send information does not provide a good level of information security, so different techniques for securing information are required. Hiding of this important asset is an exceptionally critical part today. It gave strategies to scrambling the data with the goal that it ends up unintelligible for any unintended client. This paper surveys the methods that exist for hiding of information and by what means can these be consolidated to give another level of security.
References
- Bender, W., Gruhl, D., Morimoto, N., & Lu, A. (1996). Techniques for data hiding. IBM systems journal, 35(3.4), 313-336.
- Boneh, D., & Franklin, M. (2001, August). Identity-based encryption from the Weil pairing. In Annual international cryptology conference (pp. 213-229). Springer, Berlin, Heidelberg.
- Aziz, B., & Nourdine, E. (2008, April). A recent survey on key management schemes in manet. In Information and Communication Technologies: From Theory to Applications, 2008. ICTTA 2008. 3rd International Conference on (pp. 1-6). IEEE.
- Slavin, K. R. (1999). U.S. Patent No. 5,956,407. Washington, DC: U.S. Patent and Trademark Office.
- Nuzzolese, A. G., Pandelli, S., & Ungaro, L. (2005). Steganography vs. Cryptography.
- Johnson, N. F., Duric, Z., & Jajodia, S. (2001). Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking: Attacks and Countermeasures (Vol. 1). Springer Science & Business Media.
- Manoj, I. V. S. (2010). Cryptography and steganography. International Journal of Computer Applications (0975–8887), 1(12), 63-68
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT
This work is licensed under a Creative Commons Attribution 4.0 International License.