Open Access   Article Go Back

Survey on Data Hiding Techniques for Secure Image Transmission

Thanima Davis1 , Manish T.I2 , Dr. M. Azath3

Section:Survey Paper, Product Type: Journal Paper
Volume-3 , Issue-1 , Page no. 141-144, Jan-2015

Online published on Jan 31, 2015

Copyright © Thanima Davis, Manish T.I , Dr. M. Azath . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Thanima Davis, Manish T.I , Dr. M. Azath, “Survey on Data Hiding Techniques for Secure Image Transmission,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.1, pp.141-144, 2015.

MLA Style Citation: Thanima Davis, Manish T.I , Dr. M. Azath "Survey on Data Hiding Techniques for Secure Image Transmission." International Journal of Computer Sciences and Engineering 3.1 (2015): 141-144.

APA Style Citation: Thanima Davis, Manish T.I , Dr. M. Azath, (2015). Survey on Data Hiding Techniques for Secure Image Transmission. International Journal of Computer Sciences and Engineering, 3(1), 141-144.

BibTex Style Citation:
@article{Davis_2015,
author = {Thanima Davis, Manish T.I , Dr. M. Azath},
title = {Survey on Data Hiding Techniques for Secure Image Transmission},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2015},
volume = {3},
Issue = {1},
month = {1},
year = {2015},
issn = {2347-2693},
pages = {141-144},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=379},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=379
TI - Survey on Data Hiding Techniques for Secure Image Transmission
T2 - International Journal of Computer Sciences and Engineering
AU - Thanima Davis, Manish T.I , Dr. M. Azath
PY - 2015
DA - 2015/01/31
PB - IJCSE, Indore, INDIA
SP - 141-144
IS - 1
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2533 2412 downloads 2488 downloads
  
  
           

Abstract

Now a days, there are many possible ways to transmitting the data. Any communication of internet and networks application requires security. During the transmission confidential data can be hacked in different ways. So privacy and security are very important issues at the time of transmission over the internet. Steganography is the art of hiding information in other information. It is going to gain its importance due to the exponential growth and confidential communication of potential computer users over the internet. In image Steganography, secret communication is achieved to embed a message into cover image and generate a stego- image. There are different type data hidings techniques are used for secure data transmission. In this paper describes the different data hiding techniques for secure data transmission.

Key-Words / Index Term

Secure image transmission, Data hiding, Steganography

References

[1]. Information Hiding: First International Workshop, R. J. Anderson, Editor, Lecture Notes in Computer Science 1174, Isaac Newton Institute, Cambridge, England, Springer-Verlag May 1996
[2]. An overview of image steganography by T. Morkel.
[3]. MamtaJuneja and Parvinder Singh Sandhu, (2013) “A New Approach for Information security using an Improved Steganography Technique”, Journal of Info.Pro.Systems, Vol 9, No:3, pp.405-424
[4]. N. F. Johnson and S. Katzenbeisser, “A Survey of steganographic techniques.in Information Hiding Techniques for Steganography and Digital Watermarking”, Artech House, (2000), pp. 43-78
[5]. J. Fridrich, M. Goljan, and R. Du, “Invertible authentication,” In Proc. of the SPIE, Security and Watermarking of Multimedia Jan. 2001.
[6]. D. Zou, Y. Q. Shi, Z. Ni, and W. Su, “A semi-fragile lossless digital watermarking scheme based on integer wavelet transform,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 10, pp. 1294-1300, Oct. 2006.
[7]. S. W. Jung, L. T. Ha, and S. J. Ko, “A new histogram modification based reversible data hiding algorithm considering the human visual system,” IEEE Signal Processing Letters, vol. 18, no. 2, pp 95-98, Feb. 2011 .
[8]. Wen-Chung Kuo, Dong-Jin Jiang, Yu-Chih Huang, “A Reversible Data Hiding Scheme Based on Block Division”, Congress on Image and Signal Processing, Vol. 1, 27-30 May 2008.
[9]. J. Tian, “Reversible data embedding using difference expansion,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896,Aug. 2003.
[10]. L. Kamstra and H. J. A. M. Heijmans, Reversible data embedding into images using wavelet techniques and sorting,” IEEE Transactions on Image Processing, vol. 14, no. 12, pp. 2082-2090, Dec. 2005.
[11].D. M. Thodi and J. J. Rodríguez, “Expansion embedding techniques for reversible watermarking,” IEEE Transactions on Image Processing, vol. 16, no. 3, pp. 721-730, Mar. 2007.
[12].Y. Hu, H. K. Lee, and J. Li, “DE-based reversible data hiding with improved overflow location map,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 19, no. 2, pp. 250-260, Feb. 2009.
[13].Coltuc, “Improved embedding for prediction-based reversible watermarking,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 873-882, Sept. 2011.