RIWT and QR factorization based hybrid robust image steganography using block selection algorithm for IoT devices
暂无分享,去创建一个
[1] Jong Hyuk Park,et al. An effective handling of secure data stream in IoT , 2017, Appl. Soft Comput..
[2] Jiankun Hu,et al. New secure healthcare system using cloud of things , 2017, Cluster Computing.
[3] Manoj Singh Gaur,et al. Contourlet Based Image Watermarking Scheme Using Schur Factorization and SVD , 2012 .
[4] Rengarajan Amirtharajan,et al. Lightweight chaotic image encryption algorithm for real-time embedded system: Implementation and analysis on 32-bit microcontroller , 2018, Microprocess. Microsystems.
[5] Alaa Mohamed Riad,et al. A machine learning model for improving healthcare services on cloud computing environment , 2018 .
[6] A. K. Pal,et al. An SVD Based Location Specific Robust Color Image Watermarking Scheme Using RDWT and Arnold Scrambling , 2018, Wirel. Pers. Commun..
[7] Hedieh Sajedi,et al. Using contourlet transform and cover selection for secure steganography , 2010, International Journal of Information Security.
[8] lobna yehia,et al. Hybrid Security Techniques for Internet of Things Healthcare Applications , 2015, IOT 2015.
[9] Mukaddim Pathan,et al. Secure privacy vault design for distributed multimedia surveillance system , 2016, Future Gener. Comput. Syst..
[10] Kim-Kwang Raymond Choo,et al. Multimedia big data computing and Internet of Things applications: A taxonomy and process model , 2018, J. Netw. Comput. Appl..
[11] Bee Ee Khoo,et al. A new robust and secure digital image watermarking scheme based on the integer wavelet transform and singular value decomposition , 2014, Digit. Signal Process..
[12] Huazhong Shu,et al. Color image watermarking based on quaternion Fourier transform and improved uniform log-polar mapping , 2015, Comput. Electr. Eng..
[13] Zhengwei Zhang,et al. Robust Reversible Watermarking Algorithm Based on RIWT and Compressed Sensing , 2018 .
[14] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[15] M. I. Khalil. Medical Image Steganography: Study of Medical Image Quality Degradation when Embedding Data in the Frequency Domain , 2017 .
[16] Gang Chen,et al. Full 4-D quaternion discrete Fourier transform based watermarking for color images , 2014, Digit. Signal Process..
[17] Namita Tiwari,et al. Evaluation of Various LSB based Methods of Image Steganography on GIF File Format , 2010 .
[18] Jemal H. Abawajy,et al. Federated Internet of Things and Cloud Computing Pervasive Patient Health Monitoring System , 2017, IEEE Communications Magazine.
[19] Luigi Atzori,et al. Trustworthiness Management in the Social Internet of Things , 2014, IEEE Transactions on Knowledge and Data Engineering.
[20] Robert M. Haralick,et al. Textural Features for Image Classification , 1973, IEEE Trans. Syst. Man Cybern..
[21] Jing-Ming Guo,et al. Security analyses of the watermarking scheme based on redundant discrete wavelet transform and singular value decomposition , 2014 .
[22] Danai Chasaki,et al. Security challenges in the internet of things , 2015, Int. J. Space Based Situated Comput..
[23] Vijay H. Mankar,et al. Image steganography using redundant discrete wavelet transform and QR factorization , 2016, Comput. Electr. Eng..
[24] Ibrahim Kamel,et al. High-capacity steganography: a global-adaptive-region discrete cosine transform approach , 2017, Multimedia Tools and Applications.