Retraction Note: Dual layer security of data using LSB inversion image steganography with elliptic curve cryptography encryption algorithm
Gespeichert in:
Veröffentlicht in: | Multimedia tools and applications 2023-08, Vol.82 (20), p.31865-31865 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 31865 |
---|---|
container_issue | 20 |
container_start_page | 31865 |
container_title | Multimedia tools and applications |
container_volume | 82 |
creator | Shanthakumari, R. Malliga, S. |
description | |
doi_str_mv | 10.1007/s11042-023-16005-5 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2842277217</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2842277217</sourcerecordid><originalsourceid>FETCH-LOGICAL-c2085-d4bb7d4ec45294c5a44ca47f1818e8a53f0bbeb58001496c11c3355bcc7ee41d3</originalsourceid><addsrcrecordid>eNp9kMtOwzAQRSMEEqXwA6wssQ74WafsoDylCiQea8txJmmqNAm2U5Rf4KtxGhA7Vh5L99zRnCg6JficYCwvHCGY0xhTFpMZxiIWe9GECMliKSnZDzNLcCwFJofRkXNrjMlMUD6Jvl7AW2182dToqfFwiW46XaFK92CRA9PZ0veoyVGmvUadK-sCLV-vUVlvwbqBKje6AOQ8FLpuCqvbVY8-S79CUFVl60uDQskWkLF9638DUO--A6-roglLVpvj6CDXlYOTn3cavd_dvi0e4uXz_ePiahkbihMRZzxNZcbBcEHn3AjNudFc5iQhCSRasBynKaQiCTfy-cwQYhgTIjVGAnCSsWl0Nva2tvnowHm1bjpbh5WKJpzSwZgMKTqmjG2cs5Cr1oZTba8IVoNzNTpXwbnaOVciQGyEXAjXBdi_6n-obw7eh3E</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2842277217</pqid></control><display><type>article</type><title>Retraction Note: Dual layer security of data using LSB inversion image steganography with elliptic curve cryptography encryption algorithm</title><source>SpringerLink Journals - AutoHoldings</source><creator>Shanthakumari, R. ; Malliga, S.</creator><creatorcontrib>Shanthakumari, R. ; Malliga, S.</creatorcontrib><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-023-16005-5</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Computer Communication Networks ; Computer Science ; Data Structures and Information Theory ; Multimedia Information Systems ; Retraction Note ; Special Purpose and Application-Based Systems</subject><ispartof>Multimedia tools and applications, 2023-08, Vol.82 (20), p.31865-31865</ispartof><rights>Springer Science+Business Media, LLC, part of Springer Nature 2023</rights><rights>Springer Science+Business Media, LLC, part of Springer Nature 2023.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c2085-d4bb7d4ec45294c5a44ca47f1818e8a53f0bbeb58001496c11c3355bcc7ee41d3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11042-023-16005-5$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11042-023-16005-5$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Shanthakumari, R.</creatorcontrib><creatorcontrib>Malliga, S.</creatorcontrib><title>Retraction Note: Dual layer security of data using LSB inversion image steganography with elliptic curve cryptography encryption algorithm</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Data Structures and Information Theory</subject><subject>Multimedia Information Systems</subject><subject>Retraction Note</subject><subject>Special Purpose and Application-Based Systems</subject><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>BENPR</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNp9kMtOwzAQRSMEEqXwA6wssQ74WafsoDylCiQea8txJmmqNAm2U5Rf4KtxGhA7Vh5L99zRnCg6JficYCwvHCGY0xhTFpMZxiIWe9GECMliKSnZDzNLcCwFJofRkXNrjMlMUD6Jvl7AW2182dToqfFwiW46XaFK92CRA9PZ0veoyVGmvUadK-sCLV-vUVlvwbqBKje6AOQ8FLpuCqvbVY8-S79CUFVl60uDQskWkLF9638DUO--A6-roglLVpvj6CDXlYOTn3cavd_dvi0e4uXz_ePiahkbihMRZzxNZcbBcEHn3AjNudFc5iQhCSRasBynKaQiCTfy-cwQYhgTIjVGAnCSsWl0Nva2tvnowHm1bjpbh5WKJpzSwZgMKTqmjG2cs5Cr1oZTba8IVoNzNTpXwbnaOVciQGyEXAjXBdi_6n-obw7eh3E</recordid><startdate>20230801</startdate><enddate>20230801</enddate><creator>Shanthakumari, R.</creator><creator>Malliga, S.</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20230801</creationdate><title>Retraction Note: Dual layer security of data using LSB inversion image steganography with elliptic curve cryptography encryption algorithm</title><author>Shanthakumari, R. ; Malliga, S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c2085-d4bb7d4ec45294c5a44ca47f1818e8a53f0bbeb58001496c11c3355bcc7ee41d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Data Structures and Information Theory</topic><topic>Multimedia Information Systems</topic><topic>Retraction Note</topic><topic>Special Purpose and Application-Based Systems</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Shanthakumari, R.</creatorcontrib><creatorcontrib>Malliga, S.</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Shanthakumari, R.</au><au>Malliga, S.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Retraction Note: Dual layer security of data using LSB inversion image steganography with elliptic curve cryptography encryption algorithm</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2023-08-01</date><risdate>2023</risdate><volume>82</volume><issue>20</issue><spage>31865</spage><epage>31865</epage><pages>31865-31865</pages><issn>1380-7501</issn><eissn>1573-7721</eissn><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-023-16005-5</doi><tpages>1</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1380-7501 |
ispartof | Multimedia tools and applications, 2023-08, Vol.82 (20), p.31865-31865 |
issn | 1380-7501 1573-7721 |
language | eng |
recordid | cdi_proquest_journals_2842277217 |
source | SpringerLink Journals - AutoHoldings |
subjects | Computer Communication Networks Computer Science Data Structures and Information Theory Multimedia Information Systems Retraction Note Special Purpose and Application-Based Systems |
title | Retraction Note: Dual layer security of data using LSB inversion image steganography with elliptic curve cryptography encryption algorithm |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-02T21%3A51%3A08IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Retraction%20Note:%20Dual%20layer%20security%20of%20data%20using%20LSB%20inversion%20image%20steganography%20with%20elliptic%20curve%20cryptography%20encryption%20algorithm&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=Shanthakumari,%20R.&rft.date=2023-08-01&rft.volume=82&rft.issue=20&rft.spage=31865&rft.epage=31865&rft.pages=31865-31865&rft.issn=1380-7501&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-023-16005-5&rft_dat=%3Cproquest_cross%3E2842277217%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2842277217&rft_id=info:pmid/&rfr_iscdi=true |