Abstract

In this digital world of data transmission, information is at the heart of computers, transactions and international economic dealings. In ensuring the security of data and information researchers have come up with different schemes and techniques that can provide protection for data and information during transmission. The protection of sensitive information involves many interdependent policies and technological issues relating to information confidentiality, integrity, authenticity, anonymity, and utility. In this paper, we review literature on steganography protection schemes and highlight several developments that has ensured intellectual property protection over time. Keywords: Watermarking, Steganography, Fingerprinting, Cryptography, Intellectual Properties, Protection, Concealment, Adaptive Image Steganography

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call