Survey on a Highly Secured Reversible Data Hiding: Principles, Techniques and Recent Studies

نویسنده

  • Minaxi Doorwar
چکیده

Today data hacking is a very big problem in networking field. There are many security techniques available to solving this problem. There are many research processing techniques related to internet security, cryptography and steganography etc. One of these is datahiding, using this concept we can provide security, authentication to the system. Data hiding cannot recover original cover. While Reversible data hiding is a novel concept, which can recover original cover without any loss of image. With Reversible Data Hiding (RDH) we can perform embedding operation after encryption. In this technology initially a content-owner encrypts the uncompressed original image after that data hider module compressed the encrypted image and creates space for embedding additional data. At the receiver side, host can extract the data and additional data and recover original message. This concept improves payload & security of the system. Keywords-Data–hacking, Data-hiding, Reversible data hiding (RDH), Cryptography, Steganography, etc.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Reversible Data Hiding: Principles, Techniques, and Recent Studies

In this paper, we are going to have a survey on one of data hiding techniques called "Reversible Data Hiding (RDH)". Due to this, basic principles and notions of RHD are introduced. Also, primary techniques as the principles of RHD are talked. They are: Pair-Wise Logical Computation (PWLC) data hiding technique and Data Hiding by Template ranking with symmetrical Central pixels (DHTC) technique...

متن کامل

A Survey on Data Hiding Techniques in Encrypted Images

The transmission of confidential data over the network requires more security. So, for improving security in data transmission, we can hide the data inside an encrypted image. Hence the confidentiality of the image and the data embedded in the image is maintained. The data embedded can be extracted without any error, and also the cover image can be restored with error free. This type of techniq...

متن کامل

Reversible Data Hiding and its Methods: A Survey

Hiding information destroys the host image even though the distortion introduced by hiding is imperceptible to the human visual system. Reversible data hiding techniques are designed to solve the problem of lossless embedding of large messages in digital images so that after the embedded message is extracted, the image can be restored completely to its original state before embedding occurred. ...

متن کامل

Symmetric Key Cryptography on Images in AES Algorithm and Hiding Data Losslessly

Reversible (lossless) data embedding (hiding) has drawn lots of interest recently. Being reversible, the original cover content can be completely restored. This paper proposes a novel reversible data hiding scheme with a lower computational complexity and can be used in applications where both the image and the hidden information is highly confidential. It consists of three phases –AES image en...

متن کامل

A recent survey of reversible watermarking techniques

 1 Abstract— The art of secretly hiding and communicating information has gained immense importance in the last 2 two decades due to the advances in generation, storage, and communication technology of digital content. 3 Watermarking is one of the promising solutions for tamper detection and protection of digital content. However, 4 watermarking can cause damage to the sensitive information pr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014