2011
DOI: 10.1007/978-3-642-21984-9_64
|View full text |Cite
|
Sign up to set email alerts
|

Histogram Shifting as a Data Hiding Technique: An Overview of Recent Developments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…Generation of RVE using random sequential adsorption (RSA) method FEM is among the prominent tools for modeling and simulation of a variety of engineering problems. However, the geometrical complexity and numerical limitations of FEM methods impose a limitation on the number of elements used and the accuracy of the results [50][51][52]. For this reason, the modeling of a composite is typically limited to the simulation of a RVE.…”
Section: Finite Element Modelingmentioning
confidence: 99%
“…Generation of RVE using random sequential adsorption (RSA) method FEM is among the prominent tools for modeling and simulation of a variety of engineering problems. However, the geometrical complexity and numerical limitations of FEM methods impose a limitation on the number of elements used and the accuracy of the results [50][51][52]. For this reason, the modeling of a composite is typically limited to the simulation of a RVE.…”
Section: Finite Element Modelingmentioning
confidence: 99%
“…As shown in figure 7(b), the maximum peak to peak areal power density is 0.12 mW cm −2 . The power density reported here is sufficient for many MEMS applications [35][36][37][38][39][40][41][42] which is more than many existing cantilever based TENGs [27,43,44].…”
Section: Electrical Characterizationmentioning
confidence: 87%
“…It gives the result that creates it suitable to transfer data without being censored and the data interrupted. Data security is broadly based on encryption and for few cases based on an extra layer of security [5]. A high embedding performance is offered by transform domain JPEG image steganography method [6].…”
Section: Introductionmentioning
confidence: 99%