International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 122 - Issue 17 |
Published: July 2015 |
Authors: Shweta Patil, S. S. Katariya |
![]() |
Shweta Patil, S. S. Katariya . Data Hiding Techniques: A Review. International Journal of Computer Applications. 122, 17 (July 2015), 1-3. DOI=10.5120/21789-5099
@article{ 10.5120/21789-5099, author = { Shweta Patil,S. S. Katariya }, title = { Data Hiding Techniques: A Review }, journal = { International Journal of Computer Applications }, year = { 2015 }, volume = { 122 }, number = { 17 }, pages = { 1-3 }, doi = { 10.5120/21789-5099 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2015 %A Shweta Patil %A S. S. Katariya %T Data Hiding Techniques: A Review%T %J International Journal of Computer Applications %V 122 %N 17 %P 1-3 %R 10.5120/21789-5099 %I Foundation of Computer Science (FCS), NY, USA
In recent years, due to explosive growth in the use of internet the security of sensitive data becomes one of the prime concern. For this various data hiding techniques are in used. Now a days reversible data hiding in encrypted images is in used due to its excellent property which is original cover can be recovered with no loss after extraction of the embedded data. Also it protect the original data. Previously all the methods use vacate room after the encryption (VRAE) method but the problem with that is sometimes errors are occurred at the time of recovery of original image. So we use reversible data hiding by reserving room before the encryption. Also we survey the reversible data hiding techniques with different algorithms used