Survey on Data Hiding Techniques for Secure Image Transmission

Authors

  • Davis T Department of CSE, Met’s School of engineering, Kerala, India
  • Manish TI Department of CSE, Met’s School of engineering, Kerala, India
  • M Azath Department of CSE, Met’s School of engineering, Kerala, India

Keywords:

Secure image transmission, Data hiding, Steganography

Abstract

Now a days, there are many possible ways to transmitting the data. Any communication of internet and networks application requires security. During the transmission confidential data can be hacked in different ways. So privacy and security are very important issues at the time of transmission over the internet. Steganography is the art of hiding information in other information. It is going to gain its importance due to the exponential growth and confidential communication of potential computer users over the internet. In image Steganography, secret communication is achieved to embed a message into cover image and generate a stego- image. There are different type data hidings techniques are used for secure data transmission. In this paper describes the different data hiding techniques for secure data transmission.

References

. Information Hiding: First International Workshop, R. J. Anderson, Editor, Lecture Notes in Computer Science 1174, Isaac Newton Institute, Cambridge, England, Springer-Verlag May 1996

. An overview of image steganography by T. Morkel.

. MamtaJuneja and Parvinder Singh Sandhu, (2013) “A New Approach for Information security using an Improved Steganography Technique”, Journal of Info.Pro.Systems, Vol 9, No:3, pp.405-424

. N. F. Johnson and S. Katzenbeisser, “A Survey of steganographic techniques.in Information Hiding Techniques for Steganography and Digital Watermarking”, Artech House, (2000), pp. 43-78

. J. Fridrich, M. Goljan, and R. Du, “Invertible authentication,” In Proc. of the SPIE, Security and Watermarking of Multimedia Jan. 2001.

. D. Zou, Y. Q. Shi, Z. Ni, and W. Su, “A semi-fragile lossless digital watermarking scheme based on integer wavelet transform,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 10, pp. 1294-1300, Oct. 2006.

. S. W. Jung, L. T. Ha, and S. J. Ko, “A new histogram modification based reversible data hiding algorithm considering the human visual system,” IEEE Signal Processing Letters, vol. 18, no. 2, pp 95-98, Feb. 2011 .

. Wen-Chung Kuo, Dong-Jin Jiang, Yu-Chih Huang, “A Reversible Data Hiding Scheme Based on Block Division”, Congress on Image and Signal Processing, Vol. 1, 27-30 May 2008.

. J. Tian, “Reversible data embedding using difference expansion,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896,Aug. 2003.

. L. Kamstra and H. J. A. M. Heijmans, Reversible data embedding into images using wavelet techniques and sorting,” IEEE Transactions on Image Processing, vol. 14, no. 12, pp. 2082-2090, Dec. 2005.

.D. M. Thodi and J. J. Rodríguez, “Expansion embedding techniques for reversible watermarking,” IEEE Transactions on Image Processing, vol. 16, no. 3, pp. 721-730, Mar. 2007.

.Y. Hu, H. K. Lee, and J. Li, “DE-based reversible data hiding with improved overflow location map,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 19, no. 2, pp. 250-260, Feb. 2009.

.Coltuc, “Improved embedding for prediction-based reversible watermarking,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 873-882, Sept. 2011.

Downloads

Published

2015-01-31

How to Cite

[1]
T. Davis, T. Manish, and M. Azath, “Survey on Data Hiding Techniques for Secure Image Transmission”, Int. J. Comp. Sci. Eng., vol. 3, no. 1, pp. 141–144, Jan. 2015.

Issue

Section

Research Article