REVERSIBLE DATA HIDING TECHNIQUES AND ITS APPLICATION IN INFORMATION SECURITY

Main Article Content

Phuoc-Hung Vo

Abstract

Reversible data hiding is widely recognized as one of the most employed methods for copyright protection and data security. This technique involves embedding a unique piece of information, referred to as a watermark or secret data, without being detected by human or machine visual systems. Moreover, the original image is completely restored after embedded information is extracted by the recipient. Reversible data hiding technique has many vital applications, such as camouflage in communication to protect confidential information or embedding information into photos to protect digital image content. However, the problem with this technique is to maintain a good trade-off between imperceptibility and a higher bit embedding rate. This research provides a thorough review of existing methods of image steganography. Moreover, the paper also discusses the strategy to select different cover media for numerous applications in modern life.

Downloads

Download data is not yet available.

Article Details

How to Cite
1.
Vo P-H. REVERSIBLE DATA HIDING TECHNIQUES AND ITS APPLICATION IN INFORMATION SECURITY. journal [Internet]. 20Jul.2023 [cited 19May2024];13(6). Available from: https://journal.tvu.edu.vn/index.php/journal/article/view/2103
Section
Articles

References

[1] Chamlawi R, Khan A. Digital image authentication and recovery: Employing integer transform based information embedding and extraction. Information Sciences. 2010;180(24): 4909–
4928. https://doi.org/10.1016/j.ins.2010.08.039.
[2] Cox I, Miller M, Bloom J, Fridrich J, Kalker T. Digital watermarking and steganography. Massachusetts,
USA: Morgan Kaufmann; 2007.
[3] Khan A, Tahir SF, Majid A, Choi TS.
Machine learning based adaptive watermark
decoding in view of anticipated attack.
Pattern Recognition. 2008;41(8): 2594–2610.
https://doi.org/10.1016/j.patcog.2008.01.007.
[4] Mehto A, Mehra N. Adaptive lossless medical
image watermarking algorithm based on DCT &
DWT. Procedia Computer Science. 2016;78: 88–94.
https://doi.org/10.1016/j.procs.2016.02.015.
[5] Rahman AU, Sultan K, Musleh D, Aldhafferi N,
Alqahtani A, Mahmud M. Robust and fragile medical
image watermarking: A joint venture of coding and
chaos theories. Journal of Healthcare Engineering.
2018. https://doi.org/10.1155/2018/8137436.
[6] Korus P. Digital image integrity – a survey
of protection and verification techniques.
Digital Signal Processing. 2017;71: 1–26.
https://doi.org/10.1016/j.dsp.2017.08.009.
[7] Vo PH, Nguyen TS, Huynh VT, Do TN. A
novel reversible data hiding scheme with twodimensional histogram shifting mechanism.
Multimedia Tools Applications. 2018;77: 28777–
28797.https://doi.org/10.1007/s11042-018-5991-8.
[8] Vo PH, Nguyen TS, Huynh VT, Do TN. A
robust hybrid watermarking scheme based on
DCT and SVD for copyright protection of
stereo images. In: 4th NAFOSTED Conference
on Information and Computer Science,
Hanoi, Vietnam. IEEE; 2017. p.331–335.
https://doi.org/10.1109/NAFOSTED.2017.8108087.