z-logo
open-access-imgOpen Access
A Comparative Review on Data Hiding Schemes
Author(s) -
Roshidi Din,
Raihan Sabirah Sabri,
Aida Mustapha,
Sunariya Utama
Publication year - 2018
Publication title -
indonesian journal of electrical engineering and computer science
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.241
H-Index - 17
eISSN - 2502-4760
pISSN - 2502-4752
DOI - 10.11591/ijeecs.v11.i2.pp768-774
Subject(s) - information hiding , computer science , confidentiality , scheme (mathematics) , computer security , data exchange , encryption , data mining , world wide web , image (mathematics) , mathematics , artificial intelligence , mathematical analysis
Data hiding is a technique used to protect confidential information. The aim of a particular data hiding scheme is to make a more secure and robust method of information exchange so that confidential and private data can be protected against attacks and illegal access. The aim of this paper is to review on different data hiding schemes, covering the decoding, decrypting and extracting schemes. This paper also highlighted three major schemes that are widely used in research and real practice. The discussion include findings on the most recent work on decryption schemes.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here