A survey paper on various reversible data hiding techniques in encrypted images

Data hiding is a process of hiding information. There are various techniques used for hiding data. Data hiding can be done in audio, video, image, text, and picture. This method is steganography i.e., embedding data in another data. Usually we use image for data hiding especially digital images. For...

Full description

Saved in:
Bibliographic Details
Published in:2015 IEEE International Advance Computing Conference (IACC) pp. 1139 - 1143
Main Authors: Jitha, Raj T., Sivadasan, E. T.
Format: Conference Proceeding
Language:English
Published: IEEE 01-06-2015
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Data hiding is a process of hiding information. There are various techniques used for hiding data. Data hiding can be done in audio, video, image, text, and picture. This method is steganography i.e., embedding data in another data. Usually we use image for data hiding especially digital images. For embedding data in images there are many techniques are used. Some techniques will embed data but embedding cause some distortion to image, some techniques can embed only small amount of data, and some techniques will cause distortion during the extraction of data. So the various methods that are used for embedding and extraction of data are described in this.
AbstractList Data hiding is a process of hiding information. There are various techniques used for hiding data. Data hiding can be done in audio, video, image, text, and picture. This method is steganography i.e., embedding data in another data. Usually we use image for data hiding especially digital images. For embedding data in images there are many techniques are used. Some techniques will embed data but embedding cause some distortion to image, some techniques can embed only small amount of data, and some techniques will cause distortion during the extraction of data. So the various methods that are used for embedding and extraction of data are described in this.
Author Jitha, Raj T.
Sivadasan, E. T.
Author_xml – sequence: 1
  givenname: Raj T.
  surname: Jitha
  fullname: Jitha, Raj T.
  email: jitharaj1@gmail.com
  organization: Dept. of CSE, Vidya Acad. of Sci. & Technol., Thrissur, India
– sequence: 2
  givenname: E. T.
  surname: Sivadasan
  fullname: Sivadasan, E. T.
  email: sivadasan@vidyaacademy.ac.in
  organization: Dept. of CSE, Vidya Acad. of Sci. & Technol., Thrissur, India
BookMark eNotj8tqwzAQRVVoF22aH2g3-gGnGku2NUvjvgKBbLIPsjRKBKnsyg_w3zfQrO7iwDncJ3Yfu0iMvYDYAAh829bvTbPJBRSbCgqlNdyxNVYaVIWohSr1I9vXfJjSTAvvTU-Jd5HPJoVuGniimdIQ2gtxZ0bDz8GFeOIj2XMMvxMNPERO0aalH8nx8GNONDyzB28uA61vu2KHz49D853t9l_bpt5lAcWYoUWvVGsVGocgvTFeGFtIia0pPQnIdQ6lxZbsFbXC5eBACuHIiBwLL1fs9V8biOjYp2s8LcfbS_kHeIhNkA
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/IADCC.2015.7154881
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library Online
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library Online
  url: http://ieeexplore.ieee.org/Xplore/DynWel.jsp
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781479980468
1479980471
1479980463
9781479980475
EndPage 1143
ExternalDocumentID 7154881
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i90t-9c9f44bc49ad913faaf0ac5339ba6fe0128216c9becaafb0d21d1300dea0295f3
IEDL.DBID RIE
IngestDate Thu Jun 29 18:38:45 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-9c9f44bc49ad913faaf0ac5339ba6fe0128216c9becaafb0d21d1300dea0295f3
PageCount 5
ParticipantIDs ieee_primary_7154881
PublicationCentury 2000
PublicationDate 2015-June
PublicationDateYYYYMMDD 2015-06-01
PublicationDate_xml – month: 06
  year: 2015
  text: 2015-June
PublicationDecade 2010
PublicationTitle 2015 IEEE International Advance Computing Conference (IACC)
PublicationTitleAbbrev IADCC
PublicationYear 2015
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.6378642
Snippet Data hiding is a process of hiding information. There are various techniques used for hiding data. Data hiding can be done in audio, video, image, text, and...
SourceID ieee
SourceType Publisher
StartPage 1139
SubjectTerms data encryption
Data hiding
Data mining
data Recovery
Distortion
Encryption
encryption Key
Image coding
Receivers
Watermarking
Title A survey paper on various reversible data hiding techniques in encrypted images
URI https://ieeexplore.ieee.org/document/7154881
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NS8MwFA9uJ08qm_hNDh7NljZtlxxHtzEvKriDt_GSvGJBu9Kug_33Jt2cCF68hXzCe_A-kt_vhZB7LSBCEQILNNcsSiBmoIRh0kqJzmTGWYt2n7-Ont7kZOrL5DwcuDCI2ILPcOCb7Vu-XZnGX5UNRz6-9jzrzkjJHVfrmwfD1fBxPElTD9aKB_uJv35MaR3G7OR_R52S_g_zjr4cfMoZOcKiR57HtG6qDW5pCSVWdFXQjUtxXc5OfQEml-7rD6Qe60nfc7-OHiqz1jQvqNu12pYutKT5pzMfdZ8sZtNFOmf7jxBYrviaKaOyKNImUmBVIDKAjINxcZrSkGToXUwYJEY5dbghzW0YWP9KZRF4qOJMnJNusSrwglDXGUvjTJpORCSMBeDSgBUBYuzmm0vS87JYlrtSF8u9GK7-7r4mx17cO-TUDemuqwZvSae2zV2rnC-fwJUD
link.rule.ids 310,311,782,786,791,792,798,27934,54767
linkProvider IEEE
linkToHtml http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3LS8MwGA86D3pS2cS3OXi0W9okbXMce7DhnII7eBt5fMWCdqVdB_vvTbo5Ebx4C3nC98H3SH6_LwjdKyoZ0EB6viLKY6HknhRUe7GJY7Amkyc12n30Gk3f4v7Alcl52HFhAKAGn0HbNeu3fLPQlbsq60QuvnY86wPOojDasLW-mTBEdMbdfq_n4Fq8vZ3668-U2mUMj_932Alq_XDv8MvOq5yiPcia6LmLy6pYwRrnMocCLzK8skmuzdqxK8FkE371AdihPfF76tbhXW3WEqcZtrsW69wGlzj9tAakbKHZcDDrjbztVwheKsjSE1okjCnNhDTCp4mUCZHaRmpCyTAB52QCP9TCKsQOKWIC37h3KgOSBIIn9Aw1skUG5wjbTh5ra9RUSBnVRkoSa2moD8DtfH2Bmk4W83xT7GK-FcPl39136HA0e5rMJ-Pp4xU6cqLf4KiuUWNZVHCD9ktT3daK-gKkG5hU
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2015+IEEE+International+Advance+Computing+Conference+%28IACC%29&rft.atitle=A+survey+paper+on+various+reversible+data+hiding+techniques+in+encrypted+images&rft.au=Jitha%2C+Raj+T.&rft.au=Sivadasan%2C+E.+T.&rft.date=2015-06-01&rft.pub=IEEE&rft.spage=1139&rft.epage=1143&rft_id=info:doi/10.1109%2FIADCC.2015.7154881&rft.externalDocID=7154881