2021
DOI: 10.1142/s0218126622500931
|View full text |Cite
|
Sign up to set email alerts
|

FPGA Realization of a Reversible Data Hiding Scheme for 5G MIMO-OFDM System by Chaotic Key Generation-Based Paillier Cryptography Along with LDPC and Its Side Channel Estimation Using Machine Learning Technique

Abstract: Multiple-Input and Multiple-Output (MIMO) technology is a significant and timely subject, which is highly motivated by the needs of 5G wireless communications. Data transmission performs MIMO, which is highly sensitive. There are several security issues while transmitting the data such as loss of data and code injection. Two efficient methods are Encryption and Data Hiding protection of data in wireless communication. This dissertation suggests FPGA Implementation of RDHS by Chaotic Key Generation-Based Pailli… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
69
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 102 publications
(72 citation statements)
references
References 18 publications
0
69
0
Order By: Relevance
“…The irrelevant features have low correlation and the classes are filtered depending on univariate filter. The general equation of UEFS is expressed in Equation (9),…”
Section: Feature Selection Using Univariate Ensemble Feature Selectio...mentioning
confidence: 99%
See 2 more Smart Citations
“…The irrelevant features have low correlation and the classes are filtered depending on univariate filter. The general equation of UEFS is expressed in Equation (9),…”
Section: Feature Selection Using Univariate Ensemble Feature Selectio...mentioning
confidence: 99%
“…Consecutively, the cloud utility is debugged on the internet throughout the privacy is the important problem of cloud services 6,7 . Subsequently, the security of data, prevention, and intrusion detection is the main security to be impacted in the cloud infrastructure 8‐12 . Nevertheless, cloud network utilizing the incorporated technologies and virtualization models activate with the help of standard internet protocol 13 .…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…17 Various scholars have executed research in the capacity configuration of EVCSs. 18 Using existing research, key influences affect the optimization method in the load capacity configuration and optimizing objective system.. [19][20][21][22][23] Several works were assessed the public electric vehicle charging station function in the power system; these are divided as two states: (i) internal management of electric vehicle charging station and (ii) external function and contact with the power grid. Most of the work falls under the 1ststate.…”
Section: Introductionmentioning
confidence: 99%
“…Protecting information from clinical image is the important factor to consider when analyzing the clinical imageries. Generic illustration detection tasks have strained the concentration of several researchers, in which the deep learning approach is producing an excellent concert 14–18 . But those methods did not provide the adequate accuracy and error rate is maximized, such drawbacks have motivated do this research work.…”
Section: Introductionmentioning
confidence: 99%