2017
DOI: 10.1007/s11042-017-5200-1
|View full text |Cite
|
Sign up to set email alerts
|

Secure data hiding scheme using shape generation algorithm: a key based approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 36 publications
0
2
0
Order By: Relevance
“…Chaudhari and Tiwari [30] work on heuristic-based association rule hiding using oracle real application clusters by introducing the concept of the impact factor of the transaction on the rule. Yadav and Ojha [31] work on data hiding in a generic grid that could be of pixels or bits.…”
Section: Output Privacymentioning
confidence: 99%
“…Chaudhari and Tiwari [30] work on heuristic-based association rule hiding using oracle real application clusters by introducing the concept of the impact factor of the transaction on the rule. Yadav and Ojha [31] work on data hiding in a generic grid that could be of pixels or bits.…”
Section: Output Privacymentioning
confidence: 99%
“…Some studies show higher security schemes were also implemented using the similarities of the pixel neighbourhood, redundancy, inherent features in the image, etc. [31][32][33][34][35][36]. Chaotic system-based various schemes have provided enhanced security performance.…”
Section: Introductionmentioning
confidence: 99%