{"title":"可逆数据隐藏技术综述","authors":"R. Rathika, S. Kumaresan","doi":"10.1109/ICACCS.2016.7586375","DOIUrl":null,"url":null,"abstract":"Data transmissions using computer networks has created the need for security. Many robust message encryption techniques have been developed to supply this demand. Steganography is one form of cryptography where we hide data within large texts or images. Reversible data hiding can be considered as a form of steganography in which we hide data within images, but with a variation that, in reversible data hiding the original cover can be recovered losslessly after the embedded messages are extracted. This paper presents a detailed survey on various techniques available for RDH. The techniques include Histogram shifting, LSB modification method, Difference Expansion, Interpolation Technique.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"996 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Survey on reversible data hiding techniques\",\"authors\":\"R. Rathika, S. Kumaresan\",\"doi\":\"10.1109/ICACCS.2016.7586375\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data transmissions using computer networks has created the need for security. Many robust message encryption techniques have been developed to supply this demand. Steganography is one form of cryptography where we hide data within large texts or images. Reversible data hiding can be considered as a form of steganography in which we hide data within images, but with a variation that, in reversible data hiding the original cover can be recovered losslessly after the embedded messages are extracted. This paper presents a detailed survey on various techniques available for RDH. The techniques include Histogram shifting, LSB modification method, Difference Expansion, Interpolation Technique.\",\"PeriodicalId\":176803,\"journal\":{\"name\":\"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)\",\"volume\":\"996 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICACCS.2016.7586375\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACCS.2016.7586375","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Data transmissions using computer networks has created the need for security. Many robust message encryption techniques have been developed to supply this demand. Steganography is one form of cryptography where we hide data within large texts or images. Reversible data hiding can be considered as a form of steganography in which we hide data within images, but with a variation that, in reversible data hiding the original cover can be recovered losslessly after the embedded messages are extracted. This paper presents a detailed survey on various techniques available for RDH. The techniques include Histogram shifting, LSB modification method, Difference Expansion, Interpolation Technique.