Robust encryption system based watermarking theory by using chaotic algorithms: A reviewer paper
HAJ Al-Asady, OQJ Al-Thahab… - Journal of Physics …, 2021 - iopscience.iop.org
In the previous decade, the mixing between chaotic supposition and cryptography frames
considers a significant field of data security. Chaos-based image encryption is given a lot of …
considers a significant field of data security. Chaos-based image encryption is given a lot of …
A Coverless video steganography: A Survey
MA Kadhim, MJ Jawad - 2022 5th International Conference on …, 2022 - ieeexplore.ieee.org
In the traditional methods of information hiding, confidential information is embedded in the
carriers by modifying carriers' parameter characteristics, that will certainly leave traces of …
carriers by modifying carriers' parameter characteristics, that will certainly leave traces of …
[HTML][HTML] Скрытие информации в аудиосигналах с использованием детерминированного хаоса
ОИ Шелухин, СЮ Рыбаков… - Наукоемкие …, 2021 - cyberleninka.ru
В настоящие время открытие детерминированного хаоса является одним из важных
предметов исследований в различных областях науки. В данной работе …
предметов исследований в различных областях науки. В данной работе …
Reference-free differential histogram-correlative detection of steganography: performance analysis
NM Abdali, ZM Hussain - 2022 - ro.ecu.edu.au
Recent research has demonstrated the effectiveness of utilizing neural networks for detect
tampering in images. However, because accessing a database is complex, which is needed …
tampering in images. However, because accessing a database is complex, which is needed …
[PDF][PDF] Blind Steganalysis Method Using Image Spectral Density and Differential Histogram Correlative Power Spectral Density
HA Shabat, KR Raheem, WMR Shakir - Journal of Image and Graphics, 2024 - joig.net
Recent research has demonstrated the success of employing neural networks for the
purpose of detecting image tampering. Nevertheless, the utilization of referencefree …
purpose of detecting image tampering. Nevertheless, the utilization of referencefree …
Enhanced algorithms for steganography based on least significant bit and secret image compression
M Khaled, AHA El-Atta - 2021 Tenth International Conference …, 2021 - ieeexplore.ieee.org
the data can be secured using various methods, such as cryptography, watermarking, and
steganography. For secure communication, an image is utilized as the cover in image …
steganography. For secure communication, an image is utilized as the cover in image …
Spread embedding technique in LSB image steganography based on chaos theory
Spread spectrum technique is one way to increase the security and imperceptibility of
messages embedded in stego images. The way this method works is by embedding it …
messages embedded in stego images. The way this method works is by embedding it …
[PDF][PDF] Subject review: information hiding using chaotic map
It is vital to convert information into an unidentifiable form in order to protect your confidential
information from intruders. As a result, intruders will be unable to obtain your original …
information from intruders. As a result, intruders will be unable to obtain your original …
DIGITAL PRIVACY PROTECTION: APPLYING STEGANOGRAPHY IN TEXT MESSAGES
F Baso - Journal of Embedded Systems, Security and Intelligent …, 2024 - journal.unm.ac.id
Digital privacy protection has become a crucial priority in today's digital age, given the
increasing risks of personal data leaks. Steganography, as a technique of concealing …
increasing risks of personal data leaks. Steganography, as a technique of concealing …
Research on the Security Algorithm of Reversible Information Hiding in Communication Encrypted Image
J Wang, SF Tan, Y Yuan - Journal of Physics: Conference Series, 2021 - iopscience.iop.org
Considering the embedding capacity and the security of the algorithm, the paper proposes a
reversible information hiding algorithm for encrypted images based on. The information …
reversible information hiding algorithm for encrypted images based on. The information …