2018
DOI: 10.1007/s11042-017-5557-1
|View full text |Cite|
|
Sign up to set email alerts
|

RETRACTED ARTICLE: Image steganography using cosine transform with large-scale multimedia applications

Abstract: The Editor-in-Chief has retracted this article [1], which was published as part of special issue "Multi-source Weak Data Management using Big Data", because its content has been duplicated from an unpublished manuscript authored by Laeeq Aslam, Muhammad Amir, Ijaz Mansoor Qureshi and Sharjeel Abid Butt without permission. In addition, there is evidence of figure duplication without appropriate permission, as well as evidence suggesting authorship manipulation and an attempt to subvert the peer review process. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…Compressed sensing is applied to secret data, and its singular value is embedded into the low-frequency sub-band of the cover. For large-scale multimedia applications, Li et al proposed an image steganography technology that uses cosine transform to obtain an image steganography capacity of 21.5 bpp when the signal-to-noise ratio is 38.24 dB [ 28 ]. Another high-capacity image steganography scheme is proposed by Rabie et al [ 29 ], which uses the multi-scale Laplacian pyramid of the cover image in wavelet domain to realize data embedding, and they use the method of curve fitting adaptive region to find the appropriate hiding position in the DCT domain.…”
Section: Introductionmentioning
confidence: 99%
“…Compressed sensing is applied to secret data, and its singular value is embedded into the low-frequency sub-band of the cover. For large-scale multimedia applications, Li et al proposed an image steganography technology that uses cosine transform to obtain an image steganography capacity of 21.5 bpp when the signal-to-noise ratio is 38.24 dB [ 28 ]. Another high-capacity image steganography scheme is proposed by Rabie et al [ 29 ], which uses the multi-scale Laplacian pyramid of the cover image in wavelet domain to realize data embedding, and they use the method of curve fitting adaptive region to find the appropriate hiding position in the DCT domain.…”
Section: Introductionmentioning
confidence: 99%
“…Information hiding has become a pivotal characteristic of digital society. Against this backdrop, several methods such as steganography and cryptography with complex algorithms have been developed to secure information privacy [2]. Cryptography is intended to conceal the content of messages via data encryption or scrambling, but it cannot hide their existence [3].…”
Section: Introductionmentioning
confidence: 99%
“…Cryptography is intended to conceal the content of messages via data encryption or scrambling, but it cannot hide their existence [3]. In contrast, steganography hides the very existence of secret information while being communicated in cover media files [2][3][4][5]. If successful, it attracts no suspicion at all of the presence of such secret information from the point of view of an external observer.…”
Section: Introductionmentioning
confidence: 99%
“…In recent times, the rapid growth in computer technology has become core in our lives. complex algorithms have been developed to secure information privacy [2]. Cryptography is intended to conceal the content of messages via data encryption or scrambling, but it cannot It has been an ongoing debate whether steganography is actually used by terrorists or criminals.…”
mentioning
confidence: 99%