![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Authentication in Higher Region of Convergence of Z Transform Domain (AHRocZ)
In this paper a novel technique for authentication has been proposed in composite real and imaginary components of Z transform domain in higher region of convergence
-
Chapter and Conference Paper
Image Authentication in Frequency Domain through G-Let Dihedral Group (IAFD-D3)
In this paper a G-Let based authentication technique has been proposed to authenticate digital documents by embedding a secret image/message inside the cover image in frequency domain. Cover image is transform...
-
Chapter and Conference Paper
KSOFM Network Based Neural Key Generation for Wireless Communication
In this paper a single layer perceptron (KSOFM Network) based neural key generation for encryption/decryption for wireless communication has been proposed. Identical KSOFM network has been used in both sender ...
-
Chapter and Conference Paper
Color Image Authentication through Visible Patterns (CAV)
In this paper a copyright protection technique based on visual patterns (CAV) has been proposed for color image. This technique manipulates bits of color image to hide the hash of secret without embedding secr...