2021
DOI: 10.3390/app112210928
|View full text |Cite
|
Sign up to set email alerts
|

Data Hiding and Its Applications: Digital Watermarking and Steganography

Abstract: Data hiding techniques [...]

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…The digital medium can be classified into various types, such as text, image, audio, and video, and it is referred to as the cover for secret data. Data hiding techniques are widely used to ensure copyright protection,communication security, data integrity, confidentiality, non-repudiation, and authentication and so on [53].Data hiding techniques can be divided into two types: steganography and watermarking [54].…”
Section: 2data Hiding Techniquesmentioning
confidence: 99%
“…The digital medium can be classified into various types, such as text, image, audio, and video, and it is referred to as the cover for secret data. Data hiding techniques are widely used to ensure copyright protection,communication security, data integrity, confidentiality, non-repudiation, and authentication and so on [53].Data hiding techniques can be divided into two types: steganography and watermarking [54].…”
Section: 2data Hiding Techniquesmentioning
confidence: 99%
“…Therefore, the secure use of BIM data is becoming increasingly important. Digital watermarking technology has emerged as a cutting-edge solution for copyright protection by hiding copyright information in data to carry out copyright identification, infringement traceability, and content authentication [7][8][9][10][11]. The robust watermark tightly integrates copyright information with the data to resist a wide range of attacks, making robust watermarking technology for BIM data important content in the field of data security [12][13][14].…”
Section: Introductionmentioning
confidence: 99%
“…Steganography is the science and art of information concealment, it is generally used to transport hidden information in digital objects such as video, image, audio, and other objects that are used by computers, although the objects have the greatest use are digital images because authors allow embedding high rates of information [4]. In steganography, there are spatial methods such as least significant bit (LSB) [5], pixel value differentiation (PVD) [6], tri-way pixel value differentiation (TPVD) [7], bit plane caps segmentation (BPCS) [8], which represents spatial information manipulation, and the methods that use discrete wavelet transformation (DWT), discrete cosine transformation (DCT) and discrete Fourier transformation (DFT) are responsible for embedding information through frequency-based transformations [9].…”
Section: Introductionmentioning
confidence: 99%