2015
DOI: 10.1016/j.bspc.2015.07.004
|View full text |Cite
|
Sign up to set email alerts
|

ECG steganography using curvelet transform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
17
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 59 publications
(17 citation statements)
references
References 25 publications
0
17
0
Order By: Relevance
“…Therefore, from Table 4 and Figure 7 demonstrate the robustness of the presented technique against image-processing attacks (Y-Axis). Some authors [14][15][16] have used the curvelet transform for embedding the information into the ECG signals as discussed above. In the adaptive threshold [15] and the quantization approach [16] authors proposed the steganography ECG using curvelet.…”
Section: Fmentioning
confidence: 99%
See 4 more Smart Citations
“…Therefore, from Table 4 and Figure 7 demonstrate the robustness of the presented technique against image-processing attacks (Y-Axis). Some authors [14][15][16] have used the curvelet transform for embedding the information into the ECG signals as discussed above. In the adaptive threshold [15] and the quantization approach [16] authors proposed the steganography ECG using curvelet.…”
Section: Fmentioning
confidence: 99%
“…Some authors [14][15][16] have used the curvelet transform for embedding the information into the ECG signals as discussed above. In the adaptive threshold [15] and the quantization approach [16] authors proposed the steganography ECG using curvelet. In their study, they followed the steganography definition to make watermark invisible.…”
Section: Fmentioning
confidence: 99%
See 3 more Smart Citations