2022
DOI: 10.1007/s11042-022-14072-8
|View full text |Cite
|
Sign up to set email alerts
|

ECG steganography using Base64 encoding and pixel swapping technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 33 publications
0
0
0
Order By: Relevance
“…To mitigate the risks associated with exchange hacks and exit scams, traders should choose reputable exchanges with strong security measures, such as cold storage of user funds, regular security audits, and insurance coverage (Table 1). It is also advisable to diversify your assets across multiple exchanges and withdraw your funds to a secure wallet when not actively trading (Mathivanan and Balaji Ganesh, 2023;Mathivanan and Maran, 2023). In lending and borrowing there is major risk is counterparty risk.…”
Section: Review Of Literaturementioning
confidence: 99%
“…To mitigate the risks associated with exchange hacks and exit scams, traders should choose reputable exchanges with strong security measures, such as cold storage of user funds, regular security audits, and insurance coverage (Table 1). It is also advisable to diversify your assets across multiple exchanges and withdraw your funds to a secure wallet when not actively trading (Mathivanan and Balaji Ganesh, 2023;Mathivanan and Maran, 2023). In lending and borrowing there is major risk is counterparty risk.…”
Section: Review Of Literaturementioning
confidence: 99%
“…Enormous amounts of multimedia data are produced and transferred in our daily lives and the fields of industry, medical treatment, and the military. As the most commonly used information carrier, digital images occupy a crucial place in multimedia data [1][2][3]. Although watermarking techniques can assist creators in protecting their work's copyright [4,5], a reliable method to avoid the leakage of sensitive information within images is still lacking.…”
Section: Introductionmentioning
confidence: 99%
“…In the era of digital information transmission, privacy and security issues are becoming increasingly prominent in the fields of information processing and transmission [1,2]. Confronted with the challenge of how to effectively hide sensitive information, reversible data hiding (RDH) has garnered significant interest.…”
Section: Introductionmentioning
confidence: 99%