Techniques for data hiding

W Bender, D Gruhl, N Morimoto, A Lu - IBM systems journal, 1996 - ieeexplore.ieee.org
… compression, and the degree to which the data must be immune to interception, modification,
… novel techniques for addressing the data-hiding process and evaluate these techniques in …

Techniques for data hiding

WR Bender, D Gruhl… - Storage and Retrieval for …, 1995 - spiedigitallibrary.org
… the data must be immune to interception, modification, or removal. We explore both traditional
… novel techniques for addressing the data hidingprocess and evaluate these techniques in …

[PDF][PDF] Techniques for data hiding

W Bender, D Gruhl, N Morimoto, A Lu - IBM systems Journal, 2000 - scholar.archive.org
… the data must be immune to interception, modification, or removal. We explore both traditional
… novel techniques for addressing the data hiding process and evaluate these techniques in …

Secure data hiding techniques: a survey

L Singh, AK Singh, PK Singh - Multimedia Tools and Applications, 2020 - Springer
technique uses DWT, chaotic method and artificial bee colony (ABC) algorithm to provide an
efficient data hiding technique… -the-art robust and secure data hiding techniques for various …

[PDF][PDF] A review of data hiding in digital images

ET Lin, EJ Delp - PICS, 1999 - imaging.org
… of data hiding techniques in digital images. In particular we will describe how one can use
Steganography to hide … watermarking techniques currently being developed. The interest in …

Applications for data hiding

W Bender, W Butera, D Gruhl, R Hwang… - IBM systems …, 2000 - ieeexplore.ieee.org
… In “Techniques for Data Hiding”2 the informationhiding problem space was characterized
by … , an information-hiding method can operate with either high embedded data rate or high …

[PDF][PDF] Data hiding: current status and key issues.

NI Wu, MS Hwang - Int. J. Netw. Secur., 2007 - Citeseer
… to hide data: (1) it is simpler and faster to implement the technique; (2) it can more easily offer
a high hiding … kind of image when it comes to secret data hiding. As a matter of fact, we can …

A comprehensive review of digital data hiding techniques

A Rasmi, B Arunkumar, VM Anees - Pattern Recognition and Image …, 2019 - Springer
… of the currently existing data hiding schemes, from its … protection and peer to peer data transfer
between the intended users. … of the multidisciplinary hiding strategies and their features in …

Reversible data hiding

Z Ni, YQ Shi, N Ansari, W Su - … on circuits and systems for video …, 2006 - ieeexplore.ieee.org
data into the image. It can embed more data than many of the existing reversible data hiding
… The first reversible marking technique that is suitable for a large amount of data hiding was …

A recent survey on data hiding techniques

S Singh, AK Singh, SP Ghrera - … Conference on I-SMAC (IoT in …, 2017 - ieeexplore.ieee.org
… Related work for techniques used for data hiding in digital image is … data hiding techniques
and comparison among them. Each technique has its pros and cons and different technique