Data Hiding Technique in Information Technology: A Review

  • Mojirade A. AWODUN Bamidele Olumilua University of Education, Science and Technology, Ikere-Ekiti, Ekiti State, Nigeria.
  • Mobolaji O. TENIBIAJE Bamidele Olumilua University of Education, Science and Technology, Ikere-Ekiti, Ekiti State, Nigeria.
Keywords: Data Hiding, Information Technology, internet technology, Cryptography, steganography

Abstract

Data hiding techniques has received much attention in several application areas and with the widespread growth of digital information and improved internet technologies, the demand for improved information security has greatly increased due to identity theft, data distribution, privacy leakage and illegal copying. Data hiding can be done in text, image, audio, video and in other form of information. The traditional data hiding techniques have to be upgraded and need to be used in conjunction with other techniques for the integration, confidentiality and security of digital information. Cryptography, steganography and watermarking are various techniques proposed to protect and secure the Digital information.

Author Biographies

Mojirade A. AWODUN, Bamidele Olumilua University of Education, Science and Technology, Ikere-Ekiti, Ekiti State, Nigeria.

Department of Computing and Information Science, School of Physical Sciences, 

Mobolaji O. TENIBIAJE, Bamidele Olumilua University of Education, Science and Technology, Ikere-Ekiti, Ekiti State, Nigeria.

Department of Computing and Information Science, School of Physical Sciences, 

References

Abdul. Elminaam, D. S., Abdul Kader, H. M., & Hadhoud, M. M. (2009). Performance Evaluation of Symmetric Encryption Algorithms. Communications of the IBIMA, 8, ISSN: 1943-7765
Abikoye, O. C., Adewole, K. S., & Oladipupo, A. J. (2012). Efficient Data Hiding System Using Cryptography and Steganography. International Journal of Applied Information Systems, 4, ISSN: 2249-0868.
Bandyopadhyay, S.K., & Roy, S. (2010). Information Security through Data Encryption And Data Hiding. International Journal Of Computer Applications, 4(12), ISSN: 0975 – 8887.
Bellare Mihir, Rogaway Phillip. (2005). Introduction To Modern Cryptography, 10.
Abdulzahra, H, Ahmad, R. & Noor, N. M. (2014). “Combining cryptography and steganography for data hiding in images,” ACACOS, Applied Computational Science, pp. 978–960, 2014
Hardikkumar, V. D. (2012). Steganography, Cryptography, Watermarking: A Comparative Study. Journal of Global Research in Computer Science, 3(12).
Hal, B., David, H., & Michael, S. (2006). Data Hiding Tactics For Windows And Unix File Systems. www.Berghel.Net/Publications/Data_Hiding/Data_Hiding.Php
Ingemar, J. C. (2008). Digital Watermarking And Steganography. Morgan Kaufmann, Burlington, Ma, Usa.
Ishaque, M. Qudus, K., AbdulSattar, S. (2011). Investigation Of Steganalysis Algorithms For Multiple Cover Media. Ubiquitous Computing And Communication Journal, 6(5).
Iman, C. & Abi-Char, P. (2015). Comparative Analysis of block Cipher- Based Encryption Algorithms: A survey. Information Security and Computer Fraud, 3(1), 1-7.
Khan, A., & Mirza, A. M. (2007). Genetic Perceptual Shaping: Utilizing Cover Image And Conceivable Attack Information During Watermark Embedding. Infusion, 8(4), 354-365.
Megias D., Mazurczyk W. & Kuribayashi M. (2021), Data Hiding and its Applications: Digital watermarking and Steganography. Appl. Sc. 2021, 11, 10928. https://doi.org/10.3390/app112210928.
Monika, A., & Pradeep, M. (2012). Cryptography Based On Blowfish Algorithm. International Journal Of Engineering And Advanced Technology (IJEAT), 1(6). ISSN: 2249 – 8958
Navneet, K. & Sunny, B. (2014). Audio Steganography Techniques-A Survey. Navneet Kaur Int. Journal of Engineering Research And Applications. 4(6). Pp.94-100. ISSN : 2248-9622,
Nosrati, M., Karimi, R., Nosrati, H., & Nosrati, A. (2011). Embedding Stego-Text In Cover Images Using Linked List Concepts And Lsb Technique. Journal Of American Science, 7(6), 97-100.
Pramendra Kumar & Vijay Kumar S. (2014). Information Security Based on Steganography & Cryptography Techniques: A Review. International Journal of Advanced Research in Computer Science and Software Engineering. 4(10).
Raju, H., Shantanu, P., & Agostino, C. (2010). Watermarking Techniques for Relational Databases: Survey, Classification and Comparison. The Journal of Universal Computer Science, 16(21),
Rogers, D. M. (2005). Anti-Forensic Presentation Given To Lockheed Martin. San Diego.
Sadoon Hussein Abdullah. (2009). Steganography Methods And Some Application (The Hidden Secret Data In Image).
Vikram, M. A., & Keyuri, M. Z. (2014). Methods And Approach For Secure Steganography. Vikram M Agrawal Et Al, Int. J. Computer Technology & Applications. 5 (3), ISSN 1045-1080.
http://www.webopedia.com/TERM/C/cryptography.html 2014.
http://www.watermarkingworld.com/digital_watermarking
Cory Janssen(2014)
Published
2024-09-19