2020
DOI: 10.1002/ett.3984
|View full text |Cite
|
Sign up to set email alerts
|

Application of Lah transform for security and privacy of data through information hiding in telecommunication

Abstract: Due to rapid growth of digital communication attributed to advancement of Internet technologies, at every time instant huge amount of multimedia information is created and transmitted on the Internet. However, ownership identification, copyright violation, and identity theft are proving as the serious concerns because of the malicious attacks or hacking of open information. Attackers can alter or delete the information, and claim the ownership or prevent the receiver to get the data. Hence, researchers try to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
11
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(11 citation statements)
references
References 30 publications
0
11
0
Order By: Relevance
“…Ghosal et al 37 improved the security and privacy of the data transferred in telecommunication networks via a steganography technique known as Lah transform (LhT). To obtain the variable payload, the secret bits are inserted into the LhT coefficients in different proportions.…”
Section: Review Of Related Workmentioning
confidence: 99%
“…Ghosal et al 37 improved the security and privacy of the data transferred in telecommunication networks via a steganography technique known as Lah transform (LhT). To obtain the variable payload, the secret bits are inserted into the LhT coefficients in different proportions.…”
Section: Review Of Related Workmentioning
confidence: 99%
“…Despite this, this paradigm achieves stability, reliability, and privacy concerns. Ghosal et al 26 proposed Lah transform (LhT) method for data privacy and security via information hiding in telecommunication. It considers the security parameter in which the experimental result provided higher peak signal‐to‐noise ratio values with a complex embedding process.…”
Section: Review Of Related Workmentioning
confidence: 99%
“…ere are several transformations that operate on various integer sequences. Some of them are Binomial Transform [11], Discrete Cosine Transform (DCT) [12], Laguerre Transform [13], Lah Transform [14], Discrete Wavelet Transform (DWT) [15], Discrete Fourier Transform (DFT), and Catalan Transform [16]. In the real life processes, these transformations are basically utilized in various Steganographic schemes and techniques [12][13][14].…”
Section: Introductionmentioning
confidence: 99%
“…Some of them are Binomial Transform [11], Discrete Cosine Transform (DCT) [12], Laguerre Transform [13], Lah Transform [14], Discrete Wavelet Transform (DWT) [15], Discrete Fourier Transform (DFT), and Catalan Transform [16]. In the real life processes, these transformations are basically utilized in various Steganographic schemes and techniques [12][13][14]. In addition, there are numerous other usages of the above displayed transforms but despite that certain shortcomings of some of the transform techniques are still observed.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation