A Walk through Various Data Hiding Techniques

Manoj Kumar, Rohit Tanwar


In the computerized age as a result of the broad utilization of web, information covering up in advanced symbolism assumes a fundamental part to guarantee copyright assurance and power from pernicious assaults. Today the exponential development in web clients request secure information correspondence, for that it is required to send the information as encoded or shrouded shape. Numerous data framework security procedures are accessible.

Information transmission needs security. Information covering up can be accomplished through numerous techniques. Distinctive information concealing procedures are talked about in this paper which incorporates watermarking, steganography, fingerprinting, cryptography and advanced mark.

Full Text:



Thanikaiselvan V, Bansal T, Jain P, Shastri S. 9/7 IWT Domain data hiding in image using adaptive and non adap¬tive methods. Indian Journal of Science and Technology. 2016 Feb; 9(5). Doi: 10.17485/ijst/2016/v9i5/87189.

Harvinder Singh, Anuj kumar and Prateek Bansal, “Analysis and Implementation of Algorithm to Hide Secret Message” International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 2277 128X, Volume 3, Issue 2, February - 2013, pp. 327-333.

Abbas Cheddad , Joan Condell, Kevin Curran, Paul Mc Kevitt “Digital image steganography: Survey and analysis of current methods”, Elsevier Signal Processing volume 90, January 2010, Pages. 727-752.

Farooq Husain, “A Survey of Digital Watermarking Techniques for Multimedia Data”, MIT International Journal of Electronics and Communication Engineering Vol. 2, No. 1, Jan 2012 pp. 37-43.

Kaur G, Kaur K. Digital watermarking and other data hid-ing techniques. IJITEE. 2013; 2(5):181. ISSN: 2278-3075.

Sharma PR, Mishra J. A comprehensive survey on data hid¬ing technique. IRJET e. 2015 Jul; 2(4):1–5. ISSN: 2395 -0056.

Shastri S, Thanikaiselvan V. PVO based reversible data hid¬ing with improved embedding capacity and security. Indian Journal of Science and Technology. 2016 Feb; 9(5). Doi: 10.17485/ijst/2016/v9i5/87191.

Anandpara D, Kothari AD. Working and comparative analysis of various spatial based image steganography tech-niques. International Journal of Computer Applications. 2015 Mar; 113(12):1–5. (0975 – 8887).

Moerland T., “Steganography and Steganalysis”, Leiden Institute of Advanced Computing Science, www.liacs.nl/home/tmoerl/privtech.pdf.

Ahsan K. & Kundur D., “Practical Data hiding in TCP/IP”, Proceedings of the Workshop on Multimedia Security at ACM Multimedia, 2002.

P. Rogaway, T. Shrimpton,‖ Cryptographic Hash-Function Basics:Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance‖ (FSE 2004)

Jim Alves-Foss,‖ An E_cient Secure Authenticated Group Key Exchange Algorithm for Large and Dynamic Groups‖

Coron, J.-S., What is cryptography? IEEE Security and Privacy, 2006. 4(1): p. 70-73.

Wiles, J. and R. Rogers, Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators. Security & Networking. 2007: Syngress. 1.

Jiang, X. Digital watermarking and its application in image copyright protection. in 2010 International Conference on Intelligent Computation Technology and Automation, ICICTA


  • There are currently no refbacks.

© International Journals of Advanced Research in Computer Science and Software Engineering (IJARCSSE)| All Rights Reserved | Powered by Advance Academic Publisher.