Application of Lah transform for security and privacy of data through information hiding in telecommunication
Published 2020 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Application of Lah transform for security and privacy of data through information hiding in telecommunication
Authors
Keywords
-
Journal
Transactions on Emerging Telecommunications Technologies
Volume -, Issue -, Pages -
Publisher
Wiley
Online
2020-06-02
DOI
10.1002/ett.3984
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- LSB based steganography with OCR: an intelligent amalgamation
- (2020) Agneet Chatterjee et al. MULTIMEDIA TOOLS AND APPLICATIONS
- A novel chaotic steganography method with three approaches for color and grayscale images based on FIS and DCT with flexible capacity
- (2020) Mahboubeh Nazari et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Steganography in discrete wavelet transform based on human visual system and cover model
- (2019) Mohammad Fakhredanesh et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Hybrid Deep-Learning-Based Anomaly Detection Scheme for Suspicious Flow Detection in SDN: A Social Multimedia Perspective
- (2019) Sahil Garg et al. IEEE TRANSACTIONS ON MULTIMEDIA
- Image steganography using contourlet transform and matrix decomposition techniques
- (2019) Mansi S. Subhedar et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Blockchain‐based security aspects in heterogeneous Internet‐of‐Things networks: A survey
- (2019) Fabiola Hazel Pohrmen et al. Transactions on Emerging Telecommunications Technologies
- A Hybrid Deep Learning-Based Model for Anomaly Detection in Cloud Datacenter Networks
- (2019) Sahil Garg et al. IEEE Transactions on Network and Service Management
- A data hiding scheme based on multidirectional line encoding and integer wavelet transform
- (2019) Hua Zhang et al. SIGNAL PROCESSING-IMAGE COMMUNICATION
- Deep-Learning-Based Small Surface Defect Detection via an Exaggerated Local Variation-Based Generative Adversarial Network
- (2019) Jian Lian et al. IEEE Transactions on Industrial Informatics
- Enhanced payload and trade-off for image steganography via a novel pixel digits alteration
- (2019) Vinita Verma et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Deep learning models for traffic flow prediction in autonomous vehicles: A review, solutions, and challenges
- (2019) Arzoo Miglani et al. Vehicular Communications
- LA-MHR: Learning Automata Based Multilevel Heterogeneous Routing for Opportunistic Shared Spectrum Access to Enhance Lifetime of WSN
- (2018) Sudeep Tanwar et al. IEEE Systems Journal
- A high payload steganography mechanism based on wavelet packet transformation and neutrosophic set
- (2018) Randa Atta et al. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION
- A steganography embedding method based on edge identification and XOR coding
- (2016) Hayat Al-Dmour et al. EXPERT SYSTEMS WITH APPLICATIONS
- Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain
- (2016) Samer Atawneh et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Arithmetic complexity of certain linear transformations
- (2015) S. B. Gashkov MATHEMATICAL NOTES
- Least significant qubit (LSQb) information hiding algorithm for quantum image
- (2015) Shen Wang et al. MEASUREMENT
- A hash-based image encryption algorithm
- (2009) Abbas Cheddad et al. OPTICS COMMUNICATIONS
- A high quality steganographic method with pixel-value differencing and modulus function
- (2007) Chung-Ming Wang et al. JOURNAL OF SYSTEMS AND SOFTWARE
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExplorePublish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn More