A Comparison of Different Data Hiding Techniques

Authors(3) :-Aditya Gupta, Prabal Verma, Rakesh Singh Sambyal

Data or information is exceptionally urgent asset to us. In this manner securing the data turns into all the more fundamental. The transmission through which we send information does not provide a good level of information security, so different techniques for securing information are required. Hiding of this important asset is an exceptionally critical part today. It gave strategies to scrambling the data with the goal that it ends up unintelligible for any unintended client. This paper surveys the methods that exist for hiding of information and by what means can these be consolidated to give another level of security.

Authors and Affiliations

Aditya Gupta
Department of Computer Science and Engineering, BGSBU, Rajouri. Jammu & Kashmir, India
Prabal Verma
Department of Computer Science and Engineering, BGSBU, Rajouri. Jammu & Kashmir, India
Rakesh Singh Sambyal
Department of Information Technology and Engineering, BGSBU, Rajouri, Jammu & Kashmir, India

Steganography,Cryptography,Watermarking

  1. Bender, W., Gruhl, D., Morimoto, N., & Lu, A. (1996). Techniques for data hiding. IBM systems journal, 35(3.4), 313-336.
  2. Boneh, D., & Franklin, M. (2001, August). Identity-based encryption from the Weil pairing. In Annual international cryptology conference (pp. 213-229). Springer, Berlin, Heidelberg.
  3. Aziz, B., & Nourdine, E. (2008, April). A recent survey on key management schemes in manet. In Information and Communication Technologies: From Theory to Applications, 2008. ICTTA 2008. 3rd International Conference on (pp. 1-6). IEEE.
  4. Slavin, K. R. (1999). U.S. Patent No. 5,956,407. Washington, DC: U.S. Patent and Trademark Office.
  5. Nuzzolese, A. G., Pandelli, S., & Ungaro, L. (2005). Steganography vs. Cryptography.
  6. Johnson, N. F., Duric, Z., & Jajodia, S. (2001). Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking: Attacks and Countermeasures (Vol. 1). Springer Science & Business Media.
  7. Manoj, I. V. S. (2010). Cryptography and steganography. International Journal of Computer Applications (0975–8887), 1(12), 63-68

Publication Details

Published in : Volume 4 | Issue 1 | March-April 2018
Date of Publication : 2018-04-25
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 183-188
Manuscript Number : CSEIT411831
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Aditya Gupta, Prabal Verma, Rakesh Singh Sambyal, "A Comparison of Different Data Hiding Techniques", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 1, pp.183-188, March-April-2018. |          | BibTeX | RIS | CSV

Article Preview