A Recent Survey on Information-Hiding Techniques

As the touchy development of Web and high-speed communication channels in some recent years, the privacy, security and access protection of the sensitive information becomes the prime concern. To guard this sensitive information from illegal access, a num

  • PDF / 612,157 Bytes
  • 14 Pages / 439.37 x 666.142 pts Page_size
  • 54 Downloads / 214 Views

DOWNLOAD

REPORT


1 Introduction The Internet era started in late 1960s and 1970s to fulfil the requirement to enable communication in the battlefield to communicate critical information could prove beneficial in the war situations and to exchange research information between the researchers across different universities and different countries. Growth of Internet is very helpful in the field of communication. But the dark side of this growth (easy sharing of information) is unauthorized access of information and misuse of information has increased by time. So, the confidentiality and security of the susceptible information have been of greatest importance and subject of top priority. Top reasons for this confidentiality and security are unreliability and less security of fundamental communication network over which the transfer of important information is carried out. Person who is having proper knowledge of network programming and having right application programs can eavesdrop and change communication information and also can intercept the data transfer which could be very unsafe. So to overcome the security and authenticate access problem of sensitive information, there are many solution proposed like watermarking, steganography, etc. [1]. Basically watermarking and steganography both come under data-hiding techniques, where aim is to hide secret and sensitive information from unauthenticated peoples [2]. Digital watermarking concerns with hiding of information to the digital media itself. The embedding happens by changing the content of the digital media. Here, embedding of information is not done in the framework data. In digital watermarking J. Shukla (B) MANIT, Bhopal, India e-mail: [email protected] M. Shandilya Department of ECE, MANIT, Bhopal, India e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2019 R. K. Shukla et al. (eds.), Data, Engineering and Applications, https://doi.org/10.1007/978-981-13-6347-4_6

57

58

J. Shukla and M. Shandilya

criteria is that the modifications of the media are unnoticeable. On the other hand, steganography is the most useful data-hiding technique in present days. Steganography is basically Greek word meanings covered or secret writing [3]. Hiding the presence of the message is the objective of steganography techniques, so that an eavesdropper or onlooker is unaware that the information is present or not. Various applications create interest in the topic of information hiding [4]. (1) Security or intelligence agencies and military want inconspicuous transportation of information. Still as the data is coded, the discovery of presence of any doubtful signal in the current battle field possibly will soon result in the assault on the suspected. Due to this, military communication employs meteor scatter transmission or spread spectrum modulation techniques to make signals difficult for the opponent to detect. (2) Law breakers give lot of importance to inconspicuous communications. Their favoured technologies comprise of those mobile phones that change their indi