Importance and Techniques of Information Hiding : A Review

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2014 by IJCTT Journal
Volume-9 Number-5                          
Year of Publication : 2014
Authors : Richa Gupta , Sunny Gupta , Anuradha Singhal
DOI :  10.14445/22312803/IJCTT-V9P149

MLA

Richa Gupta , Sunny Gupta , Anuradha Singhal."Importance and Techniques of Information Hiding : A Review". International Journal of Computer Trends and Technology (IJCTT) V9(5):260-265, March 2014. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Information or data is very crucial resource to us. Thus securing the information becomes all the more necessary. The communication media through which we send data does not provide data security, so other methods of securing data are required. Information hiding plays a very crucial role today. It provided methods for encrypting the information so that it becomes unreadable for any unintended user. This paper reviews the techniques that exist for data hiding and how can these be combined to provide another level of security.

References
[1] Prof. S.N Wawale, Prof A Dasgupta, Review of Data Hiding Techniques, International Journal for Advance Research in Engineering and Technology, Vol. 2, Issue II, Feb 2014
[2] H Kayarkar, Sugata Sanyal, A Survey of Data Hiding Techniques and their Comparative Analysis, arxiv.org
[3] Sabu M Thampi, Information Hiding Techniques : A Tutorial Review, ISTE-STTP on Network Security & Cryptography, LBSCE 2004
[4] http://en.wikipedia.org/wiki/Watermark
[5] http://en.wikipedia.org/wiki/Digital_watermarking
[6] Saranya K , Mohan Priyar, Udhayan J, A Review on Symmetric Key Encryption Tec hniques in Cryptography, International Journal of Science, Engineerin and Technology, Volume 3, Issue 3, March 2014
[7] http://en.wikipedia.org/wiki/Steganography
[8] Mangesh Ghonge, Ankita Dhawale, Atul Tonge, Review of Steganography Techniques, International Journal of Advent Research in Computer & Electronics, Vol. 1, No.1, March 2014

Keywords
Information Hiding, Watermarking, Digital Signature, Cryptography, Steganography.