[HTML][HTML] A review on applications of chaotic maps in pseudo-random number generators and encryption

RB Naik, U Singh - Annals of Data Science, 2024 - Springer
Because of the COVID-19 pandemic, most of the tasks have shifted to an online platform.
Sectors such as e-commerce, sensitive multi-media transfer, online banking have …

Triple-layer image security using a zigzag embedding pattern

S Farrag, W Alexan, HH Hussein - … International Conference on …, 2019 - ieeexplore.ieee.org
This paper proposes a triple-layer, high capacity, message security scheme. The first two
layers are of a cryptographic nature, whereas the third layer is of a steganographic nature. In …

IMG‐forensics: Multimedia‐enabled information hiding investigation using convolutional neural network

AA Khan, AA Shaikh, O Cheikhrouhou… - IET Image …, 2022 - Wiley Online Library
Abstract Information hiding aims to embed a crucial amount of confidential data records into
the multimedia, such as text, audio, static and dynamic image, and video. Image‐based …

Payload enhancement on least significant bit image steganography using edge area dilation

DRIM Setiadi - International Journal of Electronics and …, 2019 - yadda.icm.edu.pl
This research proposes a method to enhance the payload message by embedding
messages on the dilated edge areas by the Least Significant Bit (LSB) method. To add …

Improved data hiding method for securing color images

MM Abdel-Aziz, KM Hosny, NA Lashin - Multimedia Tools and …, 2021 - Springer
Recently, data hiding techniques have become very popular in several vital applications,
especially in telemedicine. The reason for this is their ability to give good results such as …

Big data in property management

M Stoyanova, J Vasilev, M Cristescu - AIP Conference Proceedings, 2021 - pubs.aip.org
Big data transform all kinds of businesses, including property management. Although the
application of big data has great potential, it also presents challenges. The purpose of this …

[HTML][HTML] Pairwise Coded mCAP with Chaotic Dual-Mode Index Modulation for Secure Bandlimited VLC Systems

Y Nie, W Zhang, Y Yang, X Deng, M Liu, C Chen - Photonics, 2022 - mdpi.com
In this paper, for the first time, we propose and experimentally demonstrate a novel pairwise
coding (PWC)-based multiband carrierless amplitude and phase (m CAP) modulation with …

[HTML][HTML] CNN-based ternary classification for image steganalysis

S Kang, H Park, JI Park - Electronics, 2019 - mdpi.com
This study proposes a convolutional neural network (CNN)-based steganalytic method that
allows ternary classification to simultaneously identify WOW and UNIWARD, which are …

Secure Image Steganography Approach for Hiding Compressed Data

KM Abdul-Zaher, AA El-Magd Sewesy… - Soft Computing for …, 2022 - Springer
Steganography is the technique of hiding a secret message inside a normal, non-
confidential file, or message to avoid detection. The main challenge in steganography is to …

Image steganography: hiding secrets in random LSB pixels

D Kaur, HK Verma, RK Singh - Soft Computing: Theories and Applications …, 2020 - Springer
Steganography is the art of secret communication and evolved rapidly in the research
community, and hiding data in images is relatively secure against spoofing; buying these …