2022
DOI: 10.1002/spy2.229
|View full text |Cite
|
Sign up to set email alerts
|

An efficient image steganography approach based on QR factorization and singular value decomposition in non‐subsampled contourlet transform domain

Abstract: As the amount of information communicated through the virtual world grows dramatically day by day, data security becomes a significant concern while communicating over the internet. Steganography can play an integral part in safeguarding the data from unauthorized users through a hiding mechanism. This article describes a three-step steganographic algorithm. This algorithm applied QR factorization and singular value decomposition (SVD) in the non-subsampled contourlet transform (NSCT) domain. First, this algor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 30 publications
0
1
0
Order By: Relevance
“…Due to the lack of information from the original sample in the virtual samples generated by the QR reconstruction method [33,34] , this article adopts the QR reconstruction weighted fusion method. It can maintain the basic properties of the matrix unchanged and the necessary information is not missing, while increasing the number of samples while ensuring the quality of virtual samples.…”
Section: Qr Decompositionmentioning
confidence: 99%
“…Due to the lack of information from the original sample in the virtual samples generated by the QR reconstruction method [33,34] , this article adopts the QR reconstruction weighted fusion method. It can maintain the basic properties of the matrix unchanged and the necessary information is not missing, while increasing the number of samples while ensuring the quality of virtual samples.…”
Section: Qr Decompositionmentioning
confidence: 99%