Importance and Techniques of Information Hiding : A Review
Richa Gupta , Sunny Gupta , Anuradha Singhal."Importance and Techniques of Information Hiding : A Review". International Journal of Computer Trends and Technology (IJCTT) V9(5):260-265, March 2014. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract -
Information or data is very crucial resource to us. Thus securing the information becomes all the more necessary. The communication media through which we send data does not provide data security, so other methods of securing data are required. Information hiding plays a very crucial role today. It provided methods for encrypting the information so that it becomes unreadable for any unintended user. This paper reviews the techniques that exist for data hiding and how can these be combined to provide another level of security.
References
[1] Prof. S.N Wawale, Prof A Dasgupta, Review of Data Hiding Techniques, International Journal for Advance Research in Engineering and Technology, Vol. 2, Issue II, Feb 2014
[2] H Kayarkar, Sugata Sanyal, A Survey of Data Hiding Techniques and their Comparative Analysis, arxiv.org
[3] Sabu M Thampi, Information Hiding Techniques : A Tutorial Review, ISTE-STTP on Network Security & Cryptography, LBSCE 2004
[4] http://en.wikipedia.org/wiki/Watermark
[5] http://en.wikipedia.org/wiki/Digital_watermarking
[6] Saranya K , Mohan Priyar, Udhayan J, A Review on Symmetric Key Encryption Tec hniques in Cryptography, International Journal of Science, Engineerin and Technology, Volume 3, Issue 3, March 2014
[7] http://en.wikipedia.org/wiki/Steganography
[8] Mangesh Ghonge, Ankita Dhawale, Atul Tonge, Review of Steganography Techniques, International Journal of Advent Research in Computer & Electronics, Vol. 1, No.1, March 2014
Keywords
Information Hiding, Watermarking, Digital Signature, Cryptography, Steganography.