Conclusions

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This book is on reversible Steganography and authentication via transform encoding. The prime focus of the book is to present a computability and reversibility of transform equation and to avoid imaginary components of the transform computations. Reversibility computations of transformation techniques are done here, namely DFT, DCT, wavelets, Z-transform, Binomial and Grouplet. The chaos-based authentication pseudorandom number sequence generations and image or message encryptions are also done. In general, the book focuses on the real part of the transform computations for embedding and extraction, but in cases of Z-transform, complex conjugate part is also used for embedding and authentication.

Cite

CITATION STYLE

APA

Mandal, J. K. (2020). Conclusions. In Studies in Computational Intelligence (Vol. 901, p. 315). Springer. https://doi.org/10.1007/978-981-15-4397-5_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free