COMPARATIVE ANALYSIS OF DATA HIDING TECHNIQUES
Sneha Dahiya
Vol. 6, Issue 1, Jan-Dec 2020
Page Number: 91 - 94
Abstract:
Information or data is an uncommonly pressing resource for us. As such, getting the information transforms into even more convenient. The program by which we used to send data doesn't give a decent measure of data security, so various strategies for getting data are required. Concealing this significant resource is a particularly basic part today, and it offered methodologies to scrambling the information to wind up complicated for any random customer. This paper reviews the strategies for concealing data and how these can be solidified to give one more degree of safety.
References
- Bender, W., Gruhl, D., Morimoto, N., & Lu, A. (1996). Techniques for data hiding. IBM systems journal, 35(3.4), 313-336.
- Boneh, D., & Franklin, M. (2001, August). Identity-based encryption from the Weil pairing. In Annual international cryptology conference (pp. 213-229). Springer, Berlin, Heidelberg.
- Aziz, B., & Nourdine, E. (2008, April). A recent survey on key management schemes in manet. In Information and Communication Technologies: From Theory to Applications, 2008. ICTTA 2008. 3rd International Conference on (pp. 1-6). IEEE
- Slavin, K. R. (1999). U.S. Patent No. 5,956,407. Washington, DC: U.S. Patent and Trademark Office.
- Nuzzolese, A. G., Pandelli, S., & Ungaro, L. (2005). Steganography vs. Cryptography.
- Johnson, N. F., Duric, Z., & Jajodia, S. (2001). Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking: Attacks and Countermeasures (Vol. 1). Springer Science & Business Media.
- Manoj, I. V. S. (2010). Cryptography and steganography. International Journal of Computer Applications (0975–8887), 1(12), 63-68
Back Download