Open Access Open Access  Restricted Access Subscription Access

Data Hiding Using Watermarking and Steganography Using Image Processing

Prajakta Hatwar, Ankita Balbudhe, Pratik Gahlod, Prasanna Kshirsagar, Rasika Manapure


Data Hiding has risen as a multidisciplinary field and is getting extensive help from the exploration network amid the most recent two decades. The explanation behind the enormous development in this field is most self-evident: to verify the correspondence, validation and to give copyright insurance. Cryptography, alone doesn't give security as the correspondence happens in nearness of outsiders and along these lines message can without much of a stretch be unscrambled by the interlopers. Steganography, Watermarking and Fingerprinting have come up as sub-controls of Information Hiding, and are being utilized in numerous application regions which incorporates military, barrier, showcase applications, insight organizations, ventures, biometrics, banking framework and some more. This paper gives a diagram on Steganography and Watermarking. The paper finishes up with a short examination on Steganography and Watermarking based on certain parameters

Full Text:



Mehdi Kharrazi, Husrev T. Sencar and Nasir Memon “Image Steganography: Conceptsand Practices “Polytechnic University, Brooklyn, NY 11201, USA

Adel AL Mohammad “Steganography-Based Secret and Reliable Communications: Improving Steganographic Capacity and Imperceptibility” A thesis submitted for the degree of Doctor of Philosophy, Department of Information Systems and Computing , Brunel University, August, 2010

R. Popa, An Analysis of Steganographic Techniques, The "Politehnica" University of Timisoara, Faculty of Automatics and Computers, Department of Computer Science and Software Engineering, (

okmarks/digital-atermarking/popa/popa.pdf, 1998)

Fabien A. P. Petitcolas, Ross J. Anderson and Markus G. Kuhn “Information Hiding A Survey”Proceedings of the IEEE, special issue on protection of multimedia content, 87(7):1062{1078, July 1999.

Angela D. Orebaugh “Steganalysis: A Steganography Intrusion Detection System” , George Mason University

Lisa M. Marvel “Image Steganography for Hidden Communication” A Dissertation submitted to the Faculty of the University of Delaware in partial fulfillment


  • There are currently no refbacks.