A comparative review on data hiding schemes

4Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.

Abstract

Data hiding is a technique used to protect confidential information. The aim of a particular data hiding scheme is to make a more secure and robust method of information exchange so that confidential and private data can be protected against attacks and illegal access. The aim of this paper is to review on different data hiding schemes, covering the decoding, decrypting and extracting schemes. This paper also highlighted three major schemes that are widely used in research and real practice. The discussion include findings on the most recent work on decryption schemes.

Cite

CITATION STYLE

APA

Din, R., Sabri, R. S., Mustapha, A., & Utama, S. (2018, August 1). A comparative review on data hiding schemes. Indonesian Journal of Electrical Engineering and Computer Science. Institute of Advanced Engineering and Science. https://doi.org/10.11591/ijeecs.v11.i2.pp768-774

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free