Skip to main content
Top
Published in: Pattern Recognition and Image Analysis 4/2019

01-10-2019 | MATHEMATICAL THEORY OF IMAGES AND SIGNALS REPRESENTING, PROCESSING, ANALYSIS, RECOGNITION AND UNDERSTANDING

A Comprehensive Review of Digital Data Hiding Techniques

Authors: A. Rasmi, B. Arunkumar, V. Mohammed Anees

Published in: Pattern Recognition and Image Analysis | Issue 4/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper makes a study and overview of the currently existing data hiding schemes, from its primitive stages through the potential application. In the modern times with the advent of web technology information masking in digital imagery plays a main task of guaranteed protection and peer to peer data transfer between the intended users. Multitude schemes had predicted and employed on covering up secrecy from hackers. Initially availing signal concealment can be categorized into watermark, steganography cryptography, and so each has its unique benefits as well as demerits, fundamentally the insertion strategies have to follow certain features such as high capacity, robustness, security, payload and reliability. This paper gives a brief explanation of the multidisciplinary hiding strategies and their features in a comprised form using the tabular representation, such as watermarking, cryptography, and steganography.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference D. Salomon, Data Privacy and Security (Springer, New York, 2003). ISBN: 978-0-387-00311-5CrossRef D. Salomon, Data Privacy and Security (Springer, New York, 2003). ISBN: 978-0-387-00311-5CrossRef
2.
go back to reference G. Kaur and K. Kaur, “Digital watermarking and other data hiding techniques,” Int. J. Innovative Technol. Explor. Eng. (IJITEE) 2 (5), 181–183 (2013). G. Kaur and K. Kaur, “Digital watermarking and other data hiding techniques,” Int. J. Innovative Technol. Explor. Eng. (IJITEE) 2 (5), 181–183 (2013).
3.
go back to reference C. I. Podilchuk and E. J. Delp, “Digital watermarking: Algorithms and applications,” IEEE Signal Process. Mag. 18 (4), 33–46 (2001).CrossRef C. I. Podilchuk and E. J. Delp, “Digital watermarking: Algorithms and applications,” IEEE Signal Process. Mag. 18 (4), 33–46 (2001).CrossRef
4.
go back to reference X. Jiang, “Digital watermarking and its application in image copyright protection,” in Proc. 2010 International Conference on Intelligent Computation Technology and Automation (ICICTA 2010) (Changsha, China, 2010), IEEE, Vol. 2, pp. 114–117. X. Jiang, “Digital watermarking and its application in image copyright protection,” in Proc. 2010 International Conference on Intelligent Computation Technology and Automation (ICICTA 2010) (Changsha, China, 2010), IEEE, Vol. 2, pp. 114–117.
5.
go back to reference E. Hussein and M. A. Belal, “Digital watermarking techniques, applications and attacks applied to digital media: A survey,” Int. J. Eng. Res. Technol. (IJERT) 1 (7), 1–8 (2012).CrossRef E. Hussein and M. A. Belal, “Digital watermarking techniques, applications and attacks applied to digital media: A survey,” Int. J. Eng. Res. Technol. (IJERT) 1 (7), 1–8 (2012).CrossRef
6.
go back to reference J. Liu and X. He, “A review study on digital watermarking,” in Proc. 1st International Conference on Information and Commmunication Technologies (ICICT 2005) (Karachi, Pakistan, 2005), IEEE, pp. 337–341. J. Liu and X. He, “A review study on digital watermarking,” in Proc. 1st International Conference on Information and Commmunication Technologies (ICICT 2005) (Karachi, Pakistan, 2005), IEEE, pp. 337–341.
7a.
go back to reference I. J. Cox, M.L. Miller, and J.A. Bloom, Digital Watermarking, 1st ed. (Morgan Kaufmann, San Francisco, 2001); I. J. Cox, M.L. Miller, and J.A. Bloom, Digital Watermarking, 1st ed. (Morgan Kaufmann, San Francisco, 2001);
7b.
go back to reference J. Seitz (ed.), Digital Watermarking for Digital Media, 1st ed. (Information Science, Hershey, PA, 2005). J. Seitz (ed.), Digital Watermarking for Digital Media, 1st ed. (Information Science, Hershey, PA, 2005).
8.
go back to reference M. Arnold, M. Schmucker, and S. D. Wolthusen, Techniques and Applications of Digital Watermarking and Content Protection, 1st ed. (Artech House, Norwood, MA, 2003). M. Arnold, M. Schmucker, and S. D. Wolthusen, Techniques and Applications of Digital Watermarking and Content Protection, 1st ed. (Artech House, Norwood, MA, 2003).
9.
go back to reference P. R. Sharma and J. Mishra, “A comprehensive survey on data hiding technique,” Int. Res. J. Eng. Technol. (IRJET) 02 (04), 1471–1475 (2015). ISSN: 2395-0072 P. R. Sharma and J. Mishra, “A comprehensive survey on data hiding technique,” Int. Res. J. Eng. Technol. (IRJET) 02 (04), 1471–1475 (2015). ISSN: 2395-0072
10.
go back to reference A. Mehndiratta, “Data hiding system using cryptography & steganography: A comprehensive modern investigation,” Int. Res. J. Eng. Technol. (IRJET) 02 (01), 397–403 (2015). A. Mehndiratta, “Data hiding system using cryptography & steganography: A comprehensive modern investigation,” Int. Res. J. Eng. Technol. (IRJET) 02 (01), 397–403 (2015).
11.
go back to reference A. K. Mandal, C. Parakash, and A. Tiwari, “Performance evaluation of cryptographic algorithms: DES and AES,” in Proc. 2012 IEEE Students’ Conference on Electrical, Electronics, and Computer Science (SCEECS 2012) (Bhopal, India, 2012), IEEE, pp. 1–5. A. K. Mandal, C. Parakash, and A. Tiwari, “Performance evaluation of cryptographic algorithms: DES and AES,” in Proc. 2012 IEEE Students’ Conference on Electrical, Electronics, and Computer Science (SCEECS 2012) (Bhopal, India, 2012), IEEE, pp. 1–5.
12.
go back to reference Ratnadewi, R. P. Adhie, Y. Hutama, A. S. Ahmar, and M. I. Setiawan, “Implementation cryptography Data Encryption Standard (DES) and triple Data Encryption Standard (3DES) method in communication system based Near Field Communication (NFC),” J. Phys.: Conf. Ser. 954 (1), 012009, 8 (2018). Ratnadewi, R. P. Adhie, Y. Hutama, A. S. Ahmar, and M. I. Setiawan, “Implementation cryptography Data Encryption Standard (DES) and triple Data Encryption Standard (3DES) method in communication system based Near Field Communication (NFC),” J. Phys.: Conf. Ser. 954 (1), 012009, 8 (2018).
13.
go back to reference S. O. A. F. M. Koko and A. Babiker, “Comparison of various encryption algorithms and techniques for improving secured data communication,” IOSR J. Comput. Eng. (IOSR-JCE) 17 (1), 62–69 (2015). S. O. A. F. M. Koko and A. Babiker, “Comparison of various encryption algorithms and techniques for improving secured data communication,” IOSR J. Comput. Eng. (IOSR-JCE) 17 (1), 62–69 (2015).
14.
go back to reference A. Kumar, D. S. Jakhar, and M. S. Makkar, “Comparative analysis between DES and RSA algorithms,” Int. J. Adv. Res. Comput. Sci. Software Eng. 2 (7), 386–391 (2012). A. Kumar, D. S. Jakhar, and M. S. Makkar, “Comparative analysis between DES and RSA algorithms,” Int. J. Adv. Res. Comput. Sci. Software Eng. 2 (7), 386–391 (2012).
15.
go back to reference X. Zhou and X. Tang, “Research and implementation of RSA algorithm for encryption and decryption,” in Proc. 2011 6th International Forum on Strategic Technology (IFOST 2011) (Harbin, China, 2011), IEEE, Vol. 2, pp. 1118–1121. X. Zhou and X. Tang, “Research and implementation of RSA algorithm for encryption and decryption,” in Proc. 2011 6th International Forum on Strategic Technology (IFOST 2011) (Harbin, China, 2011), IEEE, Vol. 2, pp. 1118–1121.
16.
go back to reference U. Somani, K. Lakhani, and M. Mundra, “Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing,” in Proc. 2010 1st International Conference on Parallel Distributed and Grid Computing (PDGC 2010) (Solan, India, 2010), IEEE, pp. 211–216. U. Somani, K. Lakhani, and M. Mundra, “Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing,” in Proc. 2010 1st International Conference on Parallel Distributed and Grid Computing (PDGC 2010) (Solan, India, 2010), IEEE, pp. 211–216.
17.
go back to reference S. Manku and K. Vasanth, “Blowfish encryption algorithm for information security,” ARPN J. Eng. Appl. Sci. 10 (10), 4717–4719 (2015). S. Manku and K. Vasanth, “Blowfish encryption algorithm for information security,” ARPN J. Eng. Appl. Sci. 10 (10), 4717–4719 (2015).
18.
go back to reference D. Anandpara and A. D. Kothari, “Working and comparative analysis of various spatial based image steganography techniques,” Int. J. Comput. Appl. 113 (12), 8–12 (2015). D. Anandpara and A. D. Kothari, “Working and comparative analysis of various spatial based image steganography techniques,” Int. J. Comput. Appl. 113 (12), 8–12 (2015).
19.
go back to reference P. R. Patel and Y. Patel, “Survey on different methods of image steganography” Int. J. Innovative Res. Comput. Commun. Eng. (IJIRCCE) 2 (12), 7614–7618 (2014). P. R. Patel and Y. Patel, “Survey on different methods of image steganography” Int. J. Innovative Res. Comput. Commun. Eng. (IJIRCCE) 2 (12), 7614–7618 (2014).
20.
go back to reference S. Kaur, A. Kaur, and K. Singh, “A survey of image steganography,” Int. J. Rev. Electron. Commun. Eng. (IJRECE) 2 (3), 102–105 (2014). S. Kaur, A. Kaur, and K. Singh, “A survey of image steganography,” Int. J. Rev. Electron. Commun. Eng. (IJRECE) 2 (3), 102–105 (2014).
21.
go back to reference Y. Li, H.-X. Chen, and Y. Zhao, “A new method of data hiding based on H.264 encoded video sequences,” in Proc. IEEE 10th International Conference on Signal Processing (ICSP 2010) (Beijing, China, 2010), IEEE, pp. 1833–1836. Y. Li, H.-X. Chen, and Y. Zhao, “A new method of data hiding based on H.264 encoded video sequences,” in Proc. IEEE 10th International Conference on Signal Processing (ICSP 2010) (Beijing, China, 2010), IEEE, pp. 1833–1836.
22.
go back to reference B. Saha and S. Sharma, “Steganographic techniques of data hiding using digital images,” Def. Sci. J. 62 (1), 11–18 (2012).CrossRef B. Saha and S. Sharma, “Steganographic techniques of data hiding using digital images,” Def. Sci. J. 62 (1), 11–18 (2012).CrossRef
23.
go back to reference V. Rabara and V. Shah, “Image based steganography review of LSB and Hash-LSB techniques”, Int. J. Adv. Eng. Res. Dev. (IJAERD) 1 (11), 44–48 (2014). V. Rabara and V. Shah, “Image based steganography review of LSB and Hash-LSB techniques”, Int. J. Adv. Eng. Res. Dev. (IJAERD) 1 (11), 44–48 (2014).
Metadata
Title
A Comprehensive Review of Digital Data Hiding Techniques
Authors
A. Rasmi
B. Arunkumar
V. Mohammed Anees
Publication date
01-10-2019
Publisher
Pleiades Publishing
Published in
Pattern Recognition and Image Analysis / Issue 4/2019
Print ISSN: 1054-6618
Electronic ISSN: 1555-6212
DOI
https://doi.org/10.1134/S105466181904014X

Other articles of this Issue 4/2019

Pattern Recognition and Image Analysis 4/2019 Go to the issue

MATHEMATICAL THEORY OF IMAGES AND SIGNALS REPRESENTING, PROCESSING, ANALYSIS, RECOGNITION AND UNDERSTANDING

Descriptive Image Analysis: Part II. Descriptive Image Models

Premium Partner