2022
DOI: 10.1155/2022/1505133
|View full text |Cite
|
Sign up to set email alerts
|

Histogram Shifting-Based Quick Response Steganography Method for Secure Communication

Abstract: Steganography is a tool which allows the data for transmission by concealing secret information in a tremendously growing network. In this paper, a novel technique quick response method (QRM) is proposed for the purpose of encryption and decryption. Existing system uses side match vector quantization (SMVQ) technique which has some challenges such as security issues and performance issues. To handle the security and performance issues, the proposed system uses two methods, namely, quick response method and shi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
3
1

Relationship

1
9

Authors

Journals

citations
Cited by 23 publications
(8 citation statements)
references
References 23 publications
0
8
0
Order By: Relevance
“…For the second question given by the researcher, the majority of the respondents agree and are willing to go through various types of security verification before voting. Furthermore, the third question given by the researcher concerns various types of verification that can be implemented inside the application [12]. e verification given by the researcher consists of six types, which are account password verification; e-mail OTP verification; phone OTP verification; captcha verification; fingerprint verification; and face-recognition verification [13].…”
Section: Resultsmentioning
confidence: 99%
“…For the second question given by the researcher, the majority of the respondents agree and are willing to go through various types of security verification before voting. Furthermore, the third question given by the researcher concerns various types of verification that can be implemented inside the application [12]. e verification given by the researcher consists of six types, which are account password verification; e-mail OTP verification; phone OTP verification; captcha verification; fingerprint verification; and face-recognition verification [13].…”
Section: Resultsmentioning
confidence: 99%
“…In the research presented by Peter and collaborators, as detailed in [14], a new method called the quick response method is introduced to serve encryption and decryption purposes. The existing system relies on the side match vector quantization technique, which faces challenges related to security and performance.…”
Section: (Vii) Randomized Techniquesmentioning
confidence: 99%
“…A hybrid Scalable-Minimized-Butterfly-Fat-Tree (H-SMBFT) topology was introduced in [15] for on-chip communication. e designed topology minimizes the latency and energy consumption, but the throughput analysis was not performed.…”
Section: Related Workmentioning
confidence: 99%