Skip to main content
Erschienen in: Pattern Recognition and Image Analysis 4/2019

01.10.2019 | MATHEMATICAL THEORY OF IMAGES AND SIGNALS REPRESENTING, PROCESSING, ANALYSIS, RECOGNITION AND UNDERSTANDING

A Comprehensive Review of Digital Data Hiding Techniques

verfasst von: A. Rasmi, B. Arunkumar, V. Mohammed Anees

Erschienen in: Pattern Recognition and Image Analysis | Ausgabe 4/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper makes a study and overview of the currently existing data hiding schemes, from its primitive stages through the potential application. In the modern times with the advent of web technology information masking in digital imagery plays a main task of guaranteed protection and peer to peer data transfer between the intended users. Multitude schemes had predicted and employed on covering up secrecy from hackers. Initially availing signal concealment can be categorized into watermark, steganography cryptography, and so each has its unique benefits as well as demerits, fundamentally the insertion strategies have to follow certain features such as high capacity, robustness, security, payload and reliability. This paper gives a brief explanation of the multidisciplinary hiding strategies and their features in a comprised form using the tabular representation, such as watermarking, cryptography, and steganography.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat D. Salomon, Data Privacy and Security (Springer, New York, 2003). ISBN: 978-0-387-00311-5CrossRef D. Salomon, Data Privacy and Security (Springer, New York, 2003). ISBN: 978-0-387-00311-5CrossRef
2.
Zurück zum Zitat G. Kaur and K. Kaur, “Digital watermarking and other data hiding techniques,” Int. J. Innovative Technol. Explor. Eng. (IJITEE) 2 (5), 181–183 (2013). G. Kaur and K. Kaur, “Digital watermarking and other data hiding techniques,” Int. J. Innovative Technol. Explor. Eng. (IJITEE) 2 (5), 181–183 (2013).
3.
Zurück zum Zitat C. I. Podilchuk and E. J. Delp, “Digital watermarking: Algorithms and applications,” IEEE Signal Process. Mag. 18 (4), 33–46 (2001).CrossRef C. I. Podilchuk and E. J. Delp, “Digital watermarking: Algorithms and applications,” IEEE Signal Process. Mag. 18 (4), 33–46 (2001).CrossRef
4.
Zurück zum Zitat X. Jiang, “Digital watermarking and its application in image copyright protection,” in Proc. 2010 International Conference on Intelligent Computation Technology and Automation (ICICTA 2010) (Changsha, China, 2010), IEEE, Vol. 2, pp. 114–117. X. Jiang, “Digital watermarking and its application in image copyright protection,” in Proc. 2010 International Conference on Intelligent Computation Technology and Automation (ICICTA 2010) (Changsha, China, 2010), IEEE, Vol. 2, pp. 114–117.
5.
Zurück zum Zitat E. Hussein and M. A. Belal, “Digital watermarking techniques, applications and attacks applied to digital media: A survey,” Int. J. Eng. Res. Technol. (IJERT) 1 (7), 1–8 (2012).CrossRef E. Hussein and M. A. Belal, “Digital watermarking techniques, applications and attacks applied to digital media: A survey,” Int. J. Eng. Res. Technol. (IJERT) 1 (7), 1–8 (2012).CrossRef
6.
Zurück zum Zitat J. Liu and X. He, “A review study on digital watermarking,” in Proc. 1st International Conference on Information and Commmunication Technologies (ICICT 2005) (Karachi, Pakistan, 2005), IEEE, pp. 337–341. J. Liu and X. He, “A review study on digital watermarking,” in Proc. 1st International Conference on Information and Commmunication Technologies (ICICT 2005) (Karachi, Pakistan, 2005), IEEE, pp. 337–341.
7a.
Zurück zum Zitat I. J. Cox, M.L. Miller, and J.A. Bloom, Digital Watermarking, 1st ed. (Morgan Kaufmann, San Francisco, 2001); I. J. Cox, M.L. Miller, and J.A. Bloom, Digital Watermarking, 1st ed. (Morgan Kaufmann, San Francisco, 2001);
7b.
Zurück zum Zitat J. Seitz (ed.), Digital Watermarking for Digital Media, 1st ed. (Information Science, Hershey, PA, 2005). J. Seitz (ed.), Digital Watermarking for Digital Media, 1st ed. (Information Science, Hershey, PA, 2005).
8.
Zurück zum Zitat M. Arnold, M. Schmucker, and S. D. Wolthusen, Techniques and Applications of Digital Watermarking and Content Protection, 1st ed. (Artech House, Norwood, MA, 2003). M. Arnold, M. Schmucker, and S. D. Wolthusen, Techniques and Applications of Digital Watermarking and Content Protection, 1st ed. (Artech House, Norwood, MA, 2003).
9.
Zurück zum Zitat P. R. Sharma and J. Mishra, “A comprehensive survey on data hiding technique,” Int. Res. J. Eng. Technol. (IRJET) 02 (04), 1471–1475 (2015). ISSN: 2395-0072 P. R. Sharma and J. Mishra, “A comprehensive survey on data hiding technique,” Int. Res. J. Eng. Technol. (IRJET) 02 (04), 1471–1475 (2015). ISSN: 2395-0072
10.
Zurück zum Zitat A. Mehndiratta, “Data hiding system using cryptography & steganography: A comprehensive modern investigation,” Int. Res. J. Eng. Technol. (IRJET) 02 (01), 397–403 (2015). A. Mehndiratta, “Data hiding system using cryptography & steganography: A comprehensive modern investigation,” Int. Res. J. Eng. Technol. (IRJET) 02 (01), 397–403 (2015).
11.
Zurück zum Zitat A. K. Mandal, C. Parakash, and A. Tiwari, “Performance evaluation of cryptographic algorithms: DES and AES,” in Proc. 2012 IEEE Students’ Conference on Electrical, Electronics, and Computer Science (SCEECS 2012) (Bhopal, India, 2012), IEEE, pp. 1–5. A. K. Mandal, C. Parakash, and A. Tiwari, “Performance evaluation of cryptographic algorithms: DES and AES,” in Proc. 2012 IEEE Students’ Conference on Electrical, Electronics, and Computer Science (SCEECS 2012) (Bhopal, India, 2012), IEEE, pp. 1–5.
12.
Zurück zum Zitat Ratnadewi, R. P. Adhie, Y. Hutama, A. S. Ahmar, and M. I. Setiawan, “Implementation cryptography Data Encryption Standard (DES) and triple Data Encryption Standard (3DES) method in communication system based Near Field Communication (NFC),” J. Phys.: Conf. Ser. 954 (1), 012009, 8 (2018). Ratnadewi, R. P. Adhie, Y. Hutama, A. S. Ahmar, and M. I. Setiawan, “Implementation cryptography Data Encryption Standard (DES) and triple Data Encryption Standard (3DES) method in communication system based Near Field Communication (NFC),” J. Phys.: Conf. Ser. 954 (1), 012009, 8 (2018).
13.
Zurück zum Zitat S. O. A. F. M. Koko and A. Babiker, “Comparison of various encryption algorithms and techniques for improving secured data communication,” IOSR J. Comput. Eng. (IOSR-JCE) 17 (1), 62–69 (2015). S. O. A. F. M. Koko and A. Babiker, “Comparison of various encryption algorithms and techniques for improving secured data communication,” IOSR J. Comput. Eng. (IOSR-JCE) 17 (1), 62–69 (2015).
14.
Zurück zum Zitat A. Kumar, D. S. Jakhar, and M. S. Makkar, “Comparative analysis between DES and RSA algorithms,” Int. J. Adv. Res. Comput. Sci. Software Eng. 2 (7), 386–391 (2012). A. Kumar, D. S. Jakhar, and M. S. Makkar, “Comparative analysis between DES and RSA algorithms,” Int. J. Adv. Res. Comput. Sci. Software Eng. 2 (7), 386–391 (2012).
15.
Zurück zum Zitat X. Zhou and X. Tang, “Research and implementation of RSA algorithm for encryption and decryption,” in Proc. 2011 6th International Forum on Strategic Technology (IFOST 2011) (Harbin, China, 2011), IEEE, Vol. 2, pp. 1118–1121. X. Zhou and X. Tang, “Research and implementation of RSA algorithm for encryption and decryption,” in Proc. 2011 6th International Forum on Strategic Technology (IFOST 2011) (Harbin, China, 2011), IEEE, Vol. 2, pp. 1118–1121.
16.
Zurück zum Zitat U. Somani, K. Lakhani, and M. Mundra, “Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing,” in Proc. 2010 1st International Conference on Parallel Distributed and Grid Computing (PDGC 2010) (Solan, India, 2010), IEEE, pp. 211–216. U. Somani, K. Lakhani, and M. Mundra, “Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing,” in Proc. 2010 1st International Conference on Parallel Distributed and Grid Computing (PDGC 2010) (Solan, India, 2010), IEEE, pp. 211–216.
17.
Zurück zum Zitat S. Manku and K. Vasanth, “Blowfish encryption algorithm for information security,” ARPN J. Eng. Appl. Sci. 10 (10), 4717–4719 (2015). S. Manku and K. Vasanth, “Blowfish encryption algorithm for information security,” ARPN J. Eng. Appl. Sci. 10 (10), 4717–4719 (2015).
18.
Zurück zum Zitat D. Anandpara and A. D. Kothari, “Working and comparative analysis of various spatial based image steganography techniques,” Int. J. Comput. Appl. 113 (12), 8–12 (2015). D. Anandpara and A. D. Kothari, “Working and comparative analysis of various spatial based image steganography techniques,” Int. J. Comput. Appl. 113 (12), 8–12 (2015).
19.
Zurück zum Zitat P. R. Patel and Y. Patel, “Survey on different methods of image steganography” Int. J. Innovative Res. Comput. Commun. Eng. (IJIRCCE) 2 (12), 7614–7618 (2014). P. R. Patel and Y. Patel, “Survey on different methods of image steganography” Int. J. Innovative Res. Comput. Commun. Eng. (IJIRCCE) 2 (12), 7614–7618 (2014).
20.
Zurück zum Zitat S. Kaur, A. Kaur, and K. Singh, “A survey of image steganography,” Int. J. Rev. Electron. Commun. Eng. (IJRECE) 2 (3), 102–105 (2014). S. Kaur, A. Kaur, and K. Singh, “A survey of image steganography,” Int. J. Rev. Electron. Commun. Eng. (IJRECE) 2 (3), 102–105 (2014).
21.
Zurück zum Zitat Y. Li, H.-X. Chen, and Y. Zhao, “A new method of data hiding based on H.264 encoded video sequences,” in Proc. IEEE 10th International Conference on Signal Processing (ICSP 2010) (Beijing, China, 2010), IEEE, pp. 1833–1836. Y. Li, H.-X. Chen, and Y. Zhao, “A new method of data hiding based on H.264 encoded video sequences,” in Proc. IEEE 10th International Conference on Signal Processing (ICSP 2010) (Beijing, China, 2010), IEEE, pp. 1833–1836.
22.
Zurück zum Zitat B. Saha and S. Sharma, “Steganographic techniques of data hiding using digital images,” Def. Sci. J. 62 (1), 11–18 (2012).CrossRef B. Saha and S. Sharma, “Steganographic techniques of data hiding using digital images,” Def. Sci. J. 62 (1), 11–18 (2012).CrossRef
23.
Zurück zum Zitat V. Rabara and V. Shah, “Image based steganography review of LSB and Hash-LSB techniques”, Int. J. Adv. Eng. Res. Dev. (IJAERD) 1 (11), 44–48 (2014). V. Rabara and V. Shah, “Image based steganography review of LSB and Hash-LSB techniques”, Int. J. Adv. Eng. Res. Dev. (IJAERD) 1 (11), 44–48 (2014).
Metadaten
Titel
A Comprehensive Review of Digital Data Hiding Techniques
verfasst von
A. Rasmi
B. Arunkumar
V. Mohammed Anees
Publikationsdatum
01.10.2019
Verlag
Pleiades Publishing
Erschienen in
Pattern Recognition and Image Analysis / Ausgabe 4/2019
Print ISSN: 1054-6618
Elektronische ISSN: 1555-6212
DOI
https://doi.org/10.1134/S105466181904014X

Weitere Artikel der Ausgabe 4/2019

Pattern Recognition and Image Analysis 4/2019 Zur Ausgabe

MATHEMATICAL THEORY OF IMAGES AND SIGNALS REPRESENTING, PROCESSING, ANALYSIS, RECOGNITION AND UNDERSTANDING

Descriptive Image Analysis: Part II. Descriptive Image Models

MATHEMATICAL THEORY OF IMAGES AND SIGNALS REPRESENTING, PROCESSING, ANALYSIS, RECOGNITION AND UNDERSTANDING

Generalized Spectral-Analytical Method and Its Applications in Image Analysis and Pattern Recognition Problems

Premium Partner