2021
DOI: 10.1016/j.compeleceng.2020.106964
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting Laguerre transform in image steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(13 citation statements)
references
References 10 publications
0
13
0
Order By: Relevance
“…Five different methods such as FSO‐PSO, IORA, JDICA, RFID‐WSN, and proposed with 100 to 500 sensor nodes are used. When compared to the existing methods, the proposed methodology provides less false alarm rate to the effective normal, black hole, and gray hole attack detection 43,44 . Based on the cooperative count, trust value, and data transmission using mutation data, the proposed technique successfully investigates each sensor characteristic in the H‐WSN.…”
Section: Resultsmentioning
confidence: 99%
“…Five different methods such as FSO‐PSO, IORA, JDICA, RFID‐WSN, and proposed with 100 to 500 sensor nodes are used. When compared to the existing methods, the proposed methodology provides less false alarm rate to the effective normal, black hole, and gray hole attack detection 43,44 . Based on the cooperative count, trust value, and data transmission using mutation data, the proposed technique successfully investigates each sensor characteristic in the H‐WSN.…”
Section: Resultsmentioning
confidence: 99%
“…In Even-Odd based data hiding, the parity of pixel value [11][12][13] or quantized high-frequency coefficient [14][15][16][17][18] is used to correspond to the bit to be hidden. Like LSB technique, a single pixel or quantized transform coefficient is used as the carrier of information, and its parity is directly used to represent the hidden bit.…”
Section: Fig 1 a Simple Model Of Information Hidingmentioning
confidence: 99%
“…The data to be hidden in the transform domain is hidden in the cover multimedia using transposition. The most familiar methods are Discrete Cosine Transform (DCT) [31,32], Discrete Haar Wavelet Transform (DWT) [33], and Discrete Fourier Transform (DFT). Considering that the cover used in DCT will be an image, it divides the image into 8 × 8 blocks.…”
Section: Steganography: An Overviewmentioning
confidence: 99%