z-logo
open-access-imgOpen Access
Comparative analysis of reversible data hiding schemes
Author(s) -
Jose Asha,
Subramaniam Kamalraj
Publication year - 2020
Publication title -
iet image processing
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.401
H-Index - 45
eISSN - 1751-9667
pISSN - 1751-9659
DOI - 10.1049/iet-ipr.2019.1066
Subject(s) - information hiding , computer science , histogram , encryption , authentication (law) , feature extraction , artificial intelligence , computer vision , pattern recognition (psychology) , data mining , image (mathematics) , computer security
The data hiding method embeds the data into covers such as video, audio, and images, which are used for integrity authentication, media protection, communication covert, copyright protection etc. In this work, several reversible data hiding (RDH) algorithms are analysed. Here, RDH algorithms are classified into six categories. They are histogram shifting centred RDH, code division multiplexing‐based RDH, compression‐based RDH, contrast enhancement with RDH, and expansion‐based RDH, and RDH for encrypted images. In RDH,no information is lost when the message is recovered as the message is embedded into the host image. The embedded message is extracted using an extraction procedure. This study critically reviews the technological advancement for the past decade on the aspects of classification, pre‐processing, feature extraction, and analysis technique. The current trend in RDH is to insert confidential data into a video by using RDH in the encoded area that has a wide selection of applications on the confidential communication inside the area of cybersecurity.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here