An Extensive Survey of Data Hiding Techniques

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis of Data Hiding Techniques in Encrypted Images - A Survey

As the use digital techniques for transmitting and storing images are increasing; it is becoming an important issue how to protect the confidentiality, integrity and authenticity of images. This study paper extends to the performance parameters used in encryption processes and analyzing on their security issues which have been developed and are in practice today.

متن کامل

A Survey on Data Hiding Techniques in Encrypted Images

The transmission of confidential data over the network requires more security. So, for improving security in data transmission, we can hide the data inside an encrypted image. Hence the confidentiality of the image and the data embedded in the image is maintained. The data embedded can be extracted without any error, and also the cover image can be restored with error free. This type of techniq...

متن کامل

A Survey of Information Hiding Techniques

To protect your secret information from the intruders it is necessary to convert information into unidentified form. So it is impossible to get your original information for intruders. So security is most challenging aspects for all users who want to share their secret information. With the wild growth of internet and the fast communication techniques in recent years the security and the confid...

متن کامل

Privacy Preserving Data Mining: An Extensive Survey

— Proper integration of privacy into data mining operations is so crucial for the wide-spread acceptance of knowledge-based applications. The data mining applications involve data rich environments such as Biomedicine in terms of electronic health records, Internet in terms of web usage logs and Wireless Networks in terms of mobility data from sensors and a lot more. Privacy in data mining can ...

متن کامل

Introduction to Data Hiding Techniques

Digital watermarking technology has been actively studied and developed by a number of institutions and companies since mid ‘90s. This area draws more and more attention as one of the key technology elements for content management, copyright protection and copy control of digital contents. This article discusses several different types of digital watermark application, particularly the applicat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Indian Journal of Science and Technology

سال: 2016

ISSN: 0974-5645,0974-6846

DOI: 10.17485/ijst/2016/v9i28/90457