2017
DOI: 10.1007/s11042-016-4177-5
|View full text |Cite
|
Sign up to set email alerts
|

FEC merged with double security approach based on encrypted image steganography for different purpose in the presence of noise and different attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 26 publications
(7 citation statements)
references
References 27 publications
0
7
0
Order By: Relevance
“…Decoding is done the same way as described in this paper for LT decoding. LDPC decoding is performed using the BP algorithm [25]. From the previous prelude, it can be concluded that the computational complexity of Raptor code equals O (Symbol size) for generating the encoded symbol from the source block.…”
Section: Rate‐less Fountain Code Utilizing For Mimomentioning
confidence: 99%
“…Decoding is done the same way as described in this paper for LT decoding. LDPC decoding is performed using the BP algorithm [25]. From the previous prelude, it can be concluded that the computational complexity of Raptor code equals O (Symbol size) for generating the encoded symbol from the source block.…”
Section: Rate‐less Fountain Code Utilizing For Mimomentioning
confidence: 99%
“…The PSNR value of the new algorithm is compared with PSNR of the SLSB algorithm. Low when PSNR value is high, this describes better quality [16]. The PSNR equation is shown below:…”
Section: Measurement and Evaluationmentioning
confidence: 99%
“…On the other hand. the power e ciency of the communications systems is considered in several research papers [12][13][14][15][16][17][18][19]. The power is main constraint for the application of the data protection techniques.…”
Section: Introductionmentioning
confidence: 99%