Application of Lah transform for security and privacy of data through information hiding in telecommunication

@article{Ghosal2021ApplicationOL,
  title={Application of Lah transform for security and privacy of data through information hiding in telecommunication},
  author={Sudipta Kr Ghosal and Souradeep Mukhopadhyay and Sabbir Hossain and Ram Sarkar},
  journal={Trans. Emerg. Telecommun. Technol.},
  year={2021},
  volume={32}
}
A reversible data hiding scheme based on (5, 3) Hamming code using extra information on overlapped pixel blocks of grayscale images
TLDR
The experiment results obtained from 10,000 natural images in BOWS-2 prove that the proposed scheme can achieve a higher embedding rate, better stego-image perceptual quality, and higher security against detection and extraction attacks compared with the existing approaches.
An adaptive, secure and imperceptive image watermarking using swarm intelligence, Arnold transform, SVD and DWT
TLDR
The existing algorithm based on DWT-SVD is improved and made adaptive with particle swarm optimization (PSO) which increases the robustness and imperceptibility and Arnold transform based algorithm is proposed which outperform over the existing algorithm in terms of Peak Signal to Noise Ratio (PSNR) and Normalized Similarity Ratio (NSR).
Catalan Transform of k-Balancing Sequences
In this work, the Catalan transformation (CT) of k-balancing sequences, Bk,n 􏽮 􏽯n≥0, is introduced. Furthermore, the obtained Catalan transformation CBk,n 􏽮 􏽯n≥0 was shown as the product of lower
Image steganography using deep learning based edge detection
This paper introduces a deep learning-based Steganography method for hiding secret information within the cover image. For this, we use a convolutional neural network (CNN) with Deep Supervision
Secured image steganography based on Catalan transform
TLDR
Experimental results confirm that the Peak Signal to Noise Ratio (PSNR) values obtained by the proposed method are always above the acceptable level (i.e., 30 dB) and at the same time, it outperforms many state-of-the-art methods.
Statistical image watermark decoder based on local frequency-domain Exponent-Fourier moments modeling
TLDR
This paper proposes a statistical image watermark decoder based on the local frequency-domain Exponent-Fourier moments modeling, which can achieve the tradeoff among imperceptibility, robustness and data payload.

References

SHOWING 1-10 OF 38 REFERENCES
A novel chaotic steganography method with three approaches for color and grayscale images based on FIS and DCT with flexible capacity
TLDR
A new chaotic steganography method based on Fuzzy Inference System (FIS), using Discrete Cosine Transform (DCT) on color and grayscale images is proposed, which demonstrates that high level of transparency and robustness for MF, and if more capacity is needed, although both algorithms HMF and MHF have desirable results, but HMF provides higher level of Transparency andMHF more robustness against noises and attacks.
Deep-Learning-Based Small Surface Defect Detection via an Exaggerated Local Variation-Based Generative Adversarial Network
TLDR
A generative adversarial network (GAN) in conjunction with a convolutional neural network (CNN) is proposed to guarantee the accuracy of tiny surface defect detection by producing exaggerated defect image samples.
LSB based steganography with OCR: an intelligent amalgamation
TLDR
An Optical Character Recognition (OCR) based Steganographic technique is introduced, in which message, in its feature form, is embedded in the cover image, strengthening the data hiding objective of steganography.
A Hybrid Deep Learning-Based Model for Anomaly Detection in Cloud Datacenter Networks
TLDR
The results obtained demonstrate that the proposed cloud-based anomaly detection model is superior in comparison to the other state-of-the-art models (used for network anomaly detection), in terms of accuracy, detection rate, false positive rate, and F-score.
A data hiding scheme based on multidirectional line encoding and integer wavelet transform
TLDR
The experimental results show that the proposed data hiding method is not only superior in terms of embedding capacity and image quality than previous methods, but also secure to steganalysis and robust to attacks.
A survey of security and privacy issues in the Internet of Things from the layered context
TLDR
The security issues at each layer in the IoT protocol stack are examined, the underlying challenges and key security requirements are identified and a brief overview of existing security solutions to safeguard the IoT from the layered context are provided.
Deep learning models for traffic flow prediction in autonomous vehicles: A review, solutions, and challenges
TLDR
Various deep learning models for traffic flow prediction in autonomous vehicles are explored and compared with respect to their applicability in modern smart transportation systems.
...
1
2
3
4
...