Subscribe Now Subscribe Today
Science Alert
 
Blue
   
Curve Top
Journal of Artificial Intelligence
  Year: 2017 | Volume: 10 | Issue: 1 | Page No.: 1-21
DOI: 10.3923/jai.2017.1.21
 
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Data Security Through Data Hiding in Images: A Review

Ahmad Shaik , V. Thanikaiselvan and Rengarajan Amitharajan

Abstract:
High speed communication networks facilitate the simple and rapid mode of online information sharing with high data rates. But the channels which are used for data sharing are not secure. The subject of data security emerges in such scenarios. To achieve this, different security methods are being used in digital communication. Cryptography is one of the popular techniques, but the scrambled appearance of encrypted information can lead to high probability of attacks. Hiding information in a cover is one of the alternatives to cryptography. The main objective of this study is to provide an overall idea about the popular as well as emerging data hiding techniques in spatial and transform domains. This study deals with both reversible and non-reversible data hiding methods. Also, this study briefly discusses some common steganalytic techniques and concludes with an idea of the future scope of Reversible Data Hiding (RDH). The wide range of these techniques will provide a good overview about current trends in transform domain steganography to the researchers who are interested in steganography.
PDF Fulltext XML References Citation Report Citation
 RELATED ARTICLES:
  •    Watermarking System for the Security of Medical Image Databases used in Telemedicine
  •    Steganography-Time to Time: A Review
  •    Random Image Steganography and Steganalysis: Present Status and Future Directions
  •    Comparative Analysis of (5/3) and Haar IWT Based Steganography
How to cite this article:

Ahmad Shaik, V. Thanikaiselvan and Rengarajan Amitharajan, 2017. Data Security Through Data Hiding in Images: A Review. Journal of Artificial Intelligence, 10: 1-21.

DOI: 10.3923/jai.2017.1.21

URL: https://scialert.net/abstract/?doi=jai.2017.1.21

COMMENT ON THIS PAPER
 
 
 

 

 
 
 
 
 
 
 
 
 

 
 
 
 
 
 

Curve Bottom