Sunteți pe pagina 1din 4

Journal Paper Review Report

Prepared by: Chestere Eube Imbong Baring


K.Ramya, K.Kathiresan, G.T Kalairasi (2014). A Survey on Data Hiding and
Compression Schemes. International journal of advance research in electrical,
electronics and instrumentation engineering 3(11): 1-3.
INTRODUCTION
The increasing variety of threats and ferociousness of attacks has made
protection information a complex challenge. Unravelling issues that involve information
security needs a lot of awareness and techniques. It is incumbent to know such
techniques that enables a certain cases of information to be secured. Data hiding, also
known as information hiding or data encapsulation (encrypting) of information for
security interoperability, it is a software development technique used in object-oriented
programming. It is essentially used to hide internal object details. It ensures the
exclusive data access to class members and protects object integrity by preventing
unintended or intended attacks that could breach the entire security of the system. The
purpose of the study is to synthesize the tenacity of Data Hiding and Compression
schemes techniques as to why these techniques received much less attention from the
research community and from industry than cryptography.
Does the introduction provide sufficient background information for readers not
in the immediate field to understand the problem/hypotheses?
The introduction provides a good, generalized background of the topic that
quickly gives the reader an appreciation of the wide range application for the techniques
used in securing information into a digital cover. The author tends to compare the
techniques in order to give a full understanding with its siginificance, capabilities,
limitations. However, to make the introduction more concise, the author may wish to
provide several references to expound the claim made in the sentence(that is to provide
references to substantiate the claim made in the first sentence that is to provide
references to other groups who do or done research in this area).
Are the reasons for performing the study clearly defined?
I think the motivations for this study needs to be made clearer. In particular, the
author defined
data hiding process, providing different applications and
implementations. Moreover, It would be much clearer to grasp the given applications by
showing illustrations of the processes and digrams. Thus, it will be easier for the
researchers to understand the significance of the methods/techniques. In the statement,
LSB methods Typically achieve high Capacity. The author simply gives the
expectation of the method but he didnt mentioned the relevance of the method. One
way to demonstrate the relevance would cite references (if possible).
Are the study objectives clearly defined?
The objectives is clearly defined in the last sentence of the third paragraph, that the
article focused on mainly the uses and significance of data hiding schemas and

compression techniques such as JPEG, JPEG 2000, Vector Quantization, VQ


compression and SMVQ.

MATERIALS AND METHODOLOGY


Are the methods used appropriate to the aims of the study?
The study focused on the repeated method of experiment since, the authors
main objective is to differentiate and know the significance of the techniques in securing
information into a digital media cover. In a form of survey, Different techniques like
compression techniques was explained through its usage such as JPEG, JPEG 2000,
vector Quantization, VQ compression and SMVQ.
Are any additional experiments required to validate the results of those that were
performed?
I dont think any additional experiments are necessary to validate the results
presented here, because the results themselves are not what is important but the
techniques used to obtain these results that is important. Moreover, one exception to
this reasoning would be if the author could demonstrate that the results obtained using
the present method are consistent with the results obtained using a different technique.
The adequacy of methods used by the author is vital to the present paper( especially
given the length limitations on the paper), but it may be something that would be helpful
in a longer run, more detailed paper.
Are appropriate references cited where previously established methods are
used?
There are several instances where assertions are made that are not
substantiated with references. These have been noted in appropriate section of the
report.
RESULTS / FINDINGS OF THE STUDY
Are the results clearly explained and presented in appropriate format?
Because Data Hiding and Compression Technique schema was already
explained in the other papers, the author wished to reduce the explanation of the topic
and instead, provided a more in-depth discussion and significance of the data hiding in
information security platform and different types of Compression schemes.
Are the results clearly explained and presented in appropriate format?
There are no figures and tables provided. I would suggest, since it is in a form of
survey and a comparison between the related topics were discussed, corresponding

trends and a graphical representation of techniques should also be given. It would be


much easier and clearer for the researchers to adapt and grasp the essence of the
topics were discussed, which seems to be more relevant to the topic of the paper.
DISCUSSION
Are the findings properly described in the context of the published literature?
All expected output for a specific data was relatively consistent and organized.
The author may wish to mention why it is important to know the techniques discussed.
Are the limitations of the study discussed? If not, what are the major limitations
that should be discussed?
No significant limitations are discussed. It may be worthwhile to state the
transactions involved in using data hiding and Compression techniques as opposed to
some other method.
CONCLUSIONS

Are the conclusions of the study supported by appropriate evidence or are the
claims exaggerated?
At the end of the discussion, the author gives a succinct and impending the core
purpose of the study in which, The conclusion says that data hiding schemas and
compression techniques such as JPEG, JPEG 2000, vector quantization, VQ
Compression and SMVQ with JDCH techniques are more suitable for effective data
hiding capacity and also improve the quality of the image. Therefore, the point of the
author is that all of the techniques discussed, relatively, combining various techniques
can be done to get more efficient data hiding structure.
MAJOR COMMENTS/SUGGESTIONS
Are there any improvements, recommendations needed to apply in the
review for future study?

Regarding the figures and graphical representations: I recommend adding


tables and figures based on the topics discussed as it will give an in-depth
understanding to the reviewers/researchers. Through figures, we can
measure the probability and the adequacy of the study.
Because the author mentioned in the abstract that Compression
techniques and data hiding techniques received much less attention
from the research community and from industry that cryptography, I
expected this to be a major theme in the paper. It will answer the question,

what is the relationship of cryptography to data hiding and compression


techniques which leaves a questionable thought. However, if this is a
significant advantage of this survey, it should be discussed further in the
paper. It could be the culprit of the topic and researchers may be able to
capture the essence of the differences and essence of each techniques
discussed.

S-ar putea să vă placă și