Robust encryption system based watermarking theory by using chaotic algorithms: A reviewer paper

HAJ Al-Asady, OQJ Al-Thahab… - Journal of Physics …, 2021 - iopscience.iop.org
In the previous decade, the mixing between chaotic supposition and cryptography frames
considers a significant field of data security. Chaos-based image encryption is given a lot of …

A Coverless video steganography: A Survey

MA Kadhim, MJ Jawad - 2022 5th International Conference on …, 2022 - ieeexplore.ieee.org
In the traditional methods of information hiding, confidential information is embedded in the
carriers by modifying carriers' parameter characteristics, that will certainly leave traces of …

[HTML][HTML] Скрытие информации в аудиосигналах с использованием детерминированного хаоса

ОИ Шелухин, СЮ Рыбаков… - Наукоемкие …, 2021 - cyberleninka.ru
В настоящие время открытие детерминированного хаоса является одним из важных
предметов исследований в различных областях науки. В данной работе …

Reference-free differential histogram-correlative detection of steganography: performance analysis

NM Abdali, ZM Hussain - 2022 - ro.ecu.edu.au
Recent research has demonstrated the effectiveness of utilizing neural networks for detect
tampering in images. However, because accessing a database is complex, which is needed …

[PDF][PDF] Blind Steganalysis Method Using Image Spectral Density and Differential Histogram Correlative Power Spectral Density

HA Shabat, KR Raheem, WMR Shakir - Journal of Image and Graphics, 2024 - joig.net
Recent research has demonstrated the success of employing neural networks for the
purpose of detecting image tampering. Nevertheless, the utilization of referencefree …

Enhanced algorithms for steganography based on least significant bit and secret image compression

M Khaled, AHA El-Atta - 2021 Tenth International Conference …, 2021 - ieeexplore.ieee.org
the data can be secured using various methods, such as cryptography, watermarking, and
steganography. For secure communication, an image is utilized as the cover in image …

Spread embedding technique in LSB image steganography based on chaos theory

EH Rachmawanto, CA Sari, PN Andono… - … on Application for …, 2019 - ieeexplore.ieee.org
Spread spectrum technique is one way to increase the security and imperceptibility of
messages embedded in stego images. The way this method works is by embedding it …

[PDF][PDF] Subject review: information hiding using chaotic map

ZS Dhaief, RA Mustafa, AA Maryoosh - Int J Adv Sci Res Eng, 2021 - academia.edu
It is vital to convert information into an unidentifiable form in order to protect your confidential
information from intruders. As a result, intruders will be unable to obtain your original …

DIGITAL PRIVACY PROTECTION: APPLYING STEGANOGRAPHY IN TEXT MESSAGES

F Baso - Journal of Embedded Systems, Security and Intelligent …, 2024 - journal.unm.ac.id
Digital privacy protection has become a crucial priority in today's digital age, given the
increasing risks of personal data leaks. Steganography, as a technique of concealing …

Research on the Security Algorithm of Reversible Information Hiding in Communication Encrypted Image

J Wang, SF Tan, Y Yuan - Journal of Physics: Conference Series, 2021 - iopscience.iop.org
Considering the embedding capacity and the security of the algorithm, the paper proposes a
reversible information hiding algorithm for encrypted images based on. The information …