مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

642
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

172
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

A SURVEY ON DIGITAL DATA HIDING SCHEMES: PRINCIPALS, ALGORITHMS, AND APPLICATIONS (INVITED PAPER)

Pages

  5-36

Abstract

 This paper investigates digital DATA HIDING schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital DATA HIDING system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, or video and the final receiver, which is Human Auditory System (HAS) or Human Visual System (HVS), is also beneficial. For the speech/audio case, HAS will be briefly reviewed to find out how to make the most of its weaknesses for embedding as much data as possible. The same discussion also holds for the image WATERMARKING. Although several audio and image DATA HIDING schemes have been proposed so far, they can be divided into a few categories. Hence, conventional schemes along with their recently published extensions are introduced. Besides, a general comparison is made among these methods leading researchers/designers to choose the appropriate schemes based on their applications. Regarding the old scenario of the prisoner-warden and the evil intention of the warden to eavesdrop and/or destroy the data that Alice sends to Bob, there are both intentional and unintentional attacks to digital information hiding systems, which have the same effect based on our definition. These attacks can also be considered for testing the performance or benchmarking, of the WATERMARKING algorithm. They are also known as STEGANALYSIS methods which will be discussed at the end of the paper.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    AKHAEE, MOHAMMAD ALI, & MARVASTI, FAROKH. (2013). A SURVEY ON DIGITAL DATA HIDING SCHEMES: PRINCIPALS, ALGORITHMS, AND APPLICATIONS (INVITED PAPER). THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 5(1 ), 5-36. SID. https://sid.ir/paper/241812/en

    Vancouver: Copy

    AKHAEE MOHAMMAD ALI, MARVASTI FAROKH. A SURVEY ON DIGITAL DATA HIDING SCHEMES: PRINCIPALS, ALGORITHMS, AND APPLICATIONS (INVITED PAPER). THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY[Internet]. 2013;5(1 ):5-36. Available from: https://sid.ir/paper/241812/en

    IEEE: Copy

    MOHAMMAD ALI AKHAEE, and FAROKH MARVASTI, “A SURVEY ON DIGITAL DATA HIDING SCHEMES: PRINCIPALS, ALGORITHMS, AND APPLICATIONS (INVITED PAPER),” THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, vol. 5, no. 1 , pp. 5–36, 2013, [Online]. Available: https://sid.ir/paper/241812/en

    Related Journal Papers

    Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button