Research Article
Comparative Analysis of (5/3) and Haar IWT Based Steganography
V. Thanikaiselvan,
P. Arulmozhivarman,
Siddhanta Chakrabarty,
Ashutosh Agarwa1,
S. Subashanthini and Rengarajan Amirtharajan
A steganography embedding method based on edge identification and
XOR coding Expert Systems with Applications |
Chaotic Reversible Watermarking Method Based on IWT with Tamper Detection for Transferring Electronic Health Record Security and Communication Networks |
Shaik, A., V. Thanikaiselvan and R. Amitharajan, 2017. Data security through data hiding in images: A review. J. Artif. Intell., 10: 1-21. CrossRefDirect Link |
Covert information sharing with novel fuzzy adaptive
edge detection Security and Privacy |
Data Security Through Data Hiding in Images: A
Review Journal of Artificial Intelligence Vol. 10, Issue 1, 1, 2016 |