Review on Algorithms and Techniques of Reversible Data Hiding

Abstract

Nowadays, with the rapid development of information technology more and more images and data are available on the internet..So there is a need to provide some kind of authentication to such important data. With the increase in technology, the reversible data hiding (RDH) in encrypted images, has gain lots of importance. The reversible data hiding[1] is also known as the new watermarking technique which is used to authenticate an image by embedding some data on it as a watermark.A novel method is proposed by reserving room for embedding data before encryption of the image takes place with the available RDH algorithm and methods.Now the authentic person can hide the data easily on the image to provide authentication.This is the review paper about the current reversible data hiding algorithms available.

Authors and Affiliations

Shilpy Mukherjee, A R Mahajan

Keywords

Related Articles

A Novel Technique For Efficient Data Access In MDTN

It is pleasing to offer differentiated access services such thatdata access policies are distinct over user attributes or roles,which are direct by the key authorities. We propose a securedata recovery scheme using C...

An Efficient Content Sharing Scheme For Delay-Tolerant Smart Phone Networks

Some smart phones in the network store content that they are ready to share with others. All Smartphone users are eager to assist and provide a limited amount of their resources such as bandwidth, storage and process...

Optimal Price Setting For Video Stream Redistribution in Mobile Networks

Now a days mobile device became a necessity for the people and with this 3G network service consumer can watch he video program by subscribing data plans from the various service providers. Due to heavy use of mobile...

A Study on Jamming and Wormhole Attacks in Wireless Mesh Network

Wireless Mesh Networks (WMNs) is a network ,where data is transmitted using mesh networking. It is an arising technology in recent days due to its simple installation, low cost ,self connectivity of nodes ,flexibility a...

Review on Novel Approach to Filter Unwanted Messages in On-line Social Networks

Nowadays, online social networking websites are used frequently. These websites are known as social sites. Social networking sites works like an online internet users community. Depending on the websites many of these...

Download PDF file
  • EP ID EP27847
  • DOI -
  • Views 258
  • Downloads 0

How To Cite

Shilpy Mukherjee, A R Mahajan (2014). Review on Algorithms and Techniques of Reversible Data Hiding. International Journal of Research in Computer and Communication Technology, 3(3), -. https://europub.co.uk./articles/-A-27847