Data hiding is a technique used to protect confidential information. The aim of a particular data hiding scheme is to make a more secure and robust method of information exchange so that confidential and private data can be protected against attacks and illegal access. The aim of this paper is to review on different data hiding schemes, covering the decoding, decrypting and extracting schemes. This paper also highlighted three major schemes that are widely used in research and real practice. The discussion include findings on the most recent work on decryption schemes.
CITATION STYLE
Din, R., Sabri, R. S., Mustapha, A., & Utama, S. (2018, August 1). A comparative review on data hiding schemes. Indonesian Journal of Electrical Engineering and Computer Science. Institute of Advanced Engineering and Science. https://doi.org/10.11591/ijeecs.v11.i2.pp768-774
Mendeley helps you to discover research relevant for your work.