ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
An efficient video Steganography technique for secured data transmission
2016 International Conference on Data Mining and Advanced Computing (SAPIENCE)
◽
10.1109/sapience.2016.7684125
◽
2016
◽
Cited By ~ 1
Author(s):
Dhanya Job
◽
Varghese Paul
Keyword(s):
Data Transmission
◽
Video Steganography
◽
Secured Data
◽
Efficient Video
Download Full-text
Related Documents
Cited By
References
Video Steganography using Zero Order Hold Method for Secured Data Transmission
International Journal of Computer Applications
◽
10.5120/ijca2017915587
◽
2017
◽
Vol 176
(5)
◽
pp. 44-48
◽
Cited By ~ 1
Author(s):
Shashidhara H.
◽
Usha B.
Keyword(s):
Data Transmission
◽
Zero Order
◽
Video Steganography
◽
Secured Data
Download Full-text
Huffman Algorithm for Secured Data Transmission
International Journal of Psychosocial Rehabilitation
◽
10.37200/ijpr/v23i3/pr190143
◽
2019
◽
Vol 23
(3)
◽
pp. 456-463
Author(s):
Kanniga E
Keyword(s):
Data Transmission
◽
Huffman Algorithm
◽
Secured Data
Download Full-text
Integrated Collective Node Behavior Analysis with Onion Protocol for Best and Secured Data Transmission
2018 International Conference on Communication and Signal Processing (ICCSP)
◽
10.1109/iccsp.2018.8524443
◽
2018
◽
Cited By ~ 2
Author(s):
V Ohm Sri Eswar
◽
B Vinil
◽
B Ankayarkanni
◽
Albert
Keyword(s):
Behavior Analysis
◽
Data Transmission
◽
Secured Data
Download Full-text
An Secured Data Transmission in Manet Networks with Optimizing Link State Routing Protocol Using ACO-CBRP Protocols
2018 International Conference on Soft-computing and Network Security (ICSNS)
◽
10.1109/icsns.2018.8573630
◽
2018
◽
Author(s):
S.Satheesh Kumar
◽
M. Karthick
Keyword(s):
Routing Protocol
◽
Data Transmission
◽
Link State
◽
Secured Data
◽
Manet Networks
Download Full-text
Synchronization of Discrete-Time Chaotic Systems for Secured Data Transmission
Chaos in Automatic Control
◽
10.1201/9781315220925-15
◽
2018
◽
pp. 527-551
Author(s):
I. Belmouhoub
◽
M. Djemai
Keyword(s):
Discrete Time
◽
Data Transmission
◽
Chaotic Systems
◽
Secured Data
Download Full-text
Secured Data Transmission Using Multi-Objective Trust Based Bat Optimization Algorithm and Enhanced Homomorphic Cryptosystem for WSN
International Journal of Intelligent Engineering and Systems
◽
10.22266/ijies2022.0228.20
◽
2022
◽
Vol 15
(1)
◽
Keyword(s):
Optimization Algorithm
◽
Data Transmission
◽
Multi Objective
◽
Homomorphic Cryptosystem
◽
Secured Data
Download Full-text
Encryption and Decryption of Image for Secured Data Transmission
10.1007/978-981-16-4625-6_15
◽
2021
◽
pp. 145-155
Author(s):
C. Thirumarai Selvi
◽
R. S. Sankarasubramanian
◽
M. MuthuKrishnan
Keyword(s):
Data Transmission
◽
Encryption And Decryption
◽
Secured Data
Download Full-text
Secure data transmission using video Steganography
2011 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY
◽
10.1109/eit.2011.5978601
◽
2011
◽
Cited By ~ 30
Author(s):
R. Balaji
◽
G. Naveen
Keyword(s):
Data Transmission
◽
Video Steganography
◽
Secure Data
◽
Secure Data Transmission
Download Full-text
Comparative analysis of different techniques of encryption for secured data transmission
2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI)
◽
10.1109/icpcsi.2017.8392158
◽
2017
◽
Cited By ~ 6
Author(s):
Aquino Valentim Mota
◽
Sami Azam
◽
Bharanidharan Shanmugam
◽
Kheng Cher Yeo
◽
Krishnan Kannoorpatti
Keyword(s):
Comparative Analysis
◽
Data Transmission
◽
Secured Data
Download Full-text
Secured Data Transmission Using Wavelet Based Steganography and Cryptography by Using AES Algorithm
Procedia Computer Science
◽
10.1016/j.procs.2016.05.177
◽
2016
◽
Vol 85
◽
pp. 62-69
◽
Cited By ~ 5
Author(s):
M. Indra Sena Reddy
◽
A.P. Siva Kumar
Keyword(s):
Data Transmission
◽
Aes Algorithm
◽
Secured Data
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close