Loading

Difference of Watermarking & Steganography
J. Priscilla Sasi1, P. Arul2

1J. Priscilla Sasi, Research Scholar, Department of Computer Science, Government Arts College, Trichy (Tamil Nadu), India.
2P. Arul, Assistant Professor, Department of Computer Science, Government Arts College, Trichy (Tamil Nadu), India.
Manuscript received on 27 November 2019 | Revised Manuscript received on 19 December 2019 | Manuscript Published on 31 December 2019 | PP: 37-39 | Volume-8 Issue-4S3 December 2019 | Retrieval Number: D10391284S319/2019©BEIESP | DOI: 10.35940/ijrte.D1039.1284S319
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In the current world, the sensitive data are being transferred from source to destination in a much secured way in a common internet is inexorable. There are various technological aspects involved among the data world to protect the sensitive information or data hiding. Watermarking and Steganography are such important techniques which plays a prominent role in such data hiding. Earlier various techniques are been widely used like finger printing, Cryptography for encryption and decryption etc. But in the recent days the Digital Watermarking and Steganography are two range of techniques in such information hiding in a covered or secret way embedding to any host data which can be extracted with proper algorithms after the receiver receives the information. The combination of all these techniques can also bring a change in the internet industry. The information can be concealed and send across in a platform to the receiver with all these hidden techniques whereas the receiver of the data also need to know on the extraction techniques so that the information is been securely sent and received in a two-way communication. This paper deals about the comparing the common factors or attributes among the Watermarking and Steganography techniques.
Keywords: Watermarking, Steganography, Encryption, Decryption, Data hiding, Data Security.
Scope of the Article: Big Data Security