2021
DOI: 10.1007/s11042-020-10424-4
|View full text |Cite
|
Sign up to set email alerts
|

Secured image steganography based on Catalan transform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 29 publications
0
8
0
Order By: Relevance
“…Five different methods such as FSO‐PSO, IORA, JDICA, RFID‐WSN, and proposed with 100 to 500 sensor nodes are used. When compared to the existing methods, the proposed methodology provides less false alarm rate to the effective normal, black hole, and gray hole attack detection 43,44 . Based on the cooperative count, trust value, and data transmission using mutation data, the proposed technique successfully investigates each sensor characteristic in the H‐WSN.…”
Section: Resultsmentioning
confidence: 99%
“…Five different methods such as FSO‐PSO, IORA, JDICA, RFID‐WSN, and proposed with 100 to 500 sensor nodes are used. When compared to the existing methods, the proposed methodology provides less false alarm rate to the effective normal, black hole, and gray hole attack detection 43,44 . Based on the cooperative count, trust value, and data transmission using mutation data, the proposed technique successfully investigates each sensor characteristic in the H‐WSN.…”
Section: Resultsmentioning
confidence: 99%
“…Mukhopadhyay et al 39 utilized Catalan transform (CT) for steganography in the transform domain. The steganography image is formed by consecutive embedding operations that take place over the entire image.…”
Section: Review Of Related Workmentioning
confidence: 99%
“…The rapid development of the Internet has brought many benefits to people, and at every time an instant huge amount of multimedia information is created and transmitted on the Internet 1 . However, the hackers' attack on computer systems on the Internet challenges the cyberspace security 2,3 . So how to prevent the hackers' network intrusion is one of the most important issues in cyberspace security 4‐6 .…”
Section: Introductionmentioning
confidence: 99%
“…1 However, the hackers' attack on computer systems on the Internet challenges the cyberspace security. 2,3 So how to prevent the hackers' network intrusion is one of the most important issues in cyberspace security. [4][5][6] To solve this problem, intrusion detection technique has been developed and attracts continuous attention.…”
Section: Introductionmentioning
confidence: 99%