RIWT and QR factorization based hybrid robust image steganography using block selection algorithm for IoT devices

[1]  Jong Hyuk Park,et al.  An effective handling of secure data stream in IoT , 2017, Appl. Soft Comput..

[2]  Jiankun Hu,et al.  New secure healthcare system using cloud of things , 2017, Cluster Computing.

[3]  Manoj Singh Gaur,et al.  Contourlet Based Image Watermarking Scheme Using Schur Factorization and SVD , 2012 .

[4]  Rengarajan Amirtharajan,et al.  Lightweight chaotic image encryption algorithm for real-time embedded system: Implementation and analysis on 32-bit microcontroller , 2018, Microprocess. Microsystems.

[5]  Alaa Mohamed Riad,et al.  A machine learning model for improving healthcare services on cloud computing environment , 2018 .

[6]  A. K. Pal,et al.  An SVD Based Location Specific Robust Color Image Watermarking Scheme Using RDWT and Arnold Scrambling , 2018, Wirel. Pers. Commun..

[7]  Hedieh Sajedi,et al.  Using contourlet transform and cover selection for secure steganography , 2010, International Journal of Information Security.

[8]  lobna yehia,et al.  Hybrid Security Techniques for Internet of Things Healthcare Applications , 2015, IOT 2015.

[9]  Mukaddim Pathan,et al.  Secure privacy vault design for distributed multimedia surveillance system , 2016, Future Gener. Comput. Syst..

[10]  Kim-Kwang Raymond Choo,et al.  Multimedia big data computing and Internet of Things applications: A taxonomy and process model , 2018, J. Netw. Comput. Appl..

[11]  Bee Ee Khoo,et al.  A new robust and secure digital image watermarking scheme based on the integer wavelet transform and singular value decomposition , 2014, Digit. Signal Process..

[12]  Huazhong Shu,et al.  Color image watermarking based on quaternion Fourier transform and improved uniform log-polar mapping , 2015, Comput. Electr. Eng..

[13]  Zhengwei Zhang,et al.  Robust Reversible Watermarking Algorithm Based on RIWT and Compressed Sensing , 2018 .

[14]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[15]  M. I. Khalil Medical Image Steganography: Study of Medical Image Quality Degradation when Embedding Data in the Frequency Domain , 2017 .

[16]  Gang Chen,et al.  Full 4-D quaternion discrete Fourier transform based watermarking for color images , 2014, Digit. Signal Process..

[17]  Namita Tiwari,et al.  Evaluation of Various LSB based Methods of Image Steganography on GIF File Format , 2010 .

[18]  Jemal H. Abawajy,et al.  Federated Internet of Things and Cloud Computing Pervasive Patient Health Monitoring System , 2017, IEEE Communications Magazine.

[19]  Luigi Atzori,et al.  Trustworthiness Management in the Social Internet of Things , 2014, IEEE Transactions on Knowledge and Data Engineering.

[20]  Robert M. Haralick,et al.  Textural Features for Image Classification , 1973, IEEE Trans. Syst. Man Cybern..

[21]  Jing-Ming Guo,et al.  Security analyses of the watermarking scheme based on redundant discrete wavelet transform and singular value decomposition , 2014 .

[22]  Danai Chasaki,et al.  Security challenges in the internet of things , 2015, Int. J. Space Based Situated Comput..

[23]  Vijay H. Mankar,et al.  Image steganography using redundant discrete wavelet transform and QR factorization , 2016, Comput. Electr. Eng..

[24]  Ibrahim Kamel,et al.  High-capacity steganography: a global-adaptive-region discrete cosine transform approach , 2017, Multimedia Tools and Applications.