[HTML][HTML] A review on applications of chaotic maps in pseudo-random number generators and encryption
Because of the COVID-19 pandemic, most of the tasks have shifted to an online platform.
Sectors such as e-commerce, sensitive multi-media transfer, online banking have …
Sectors such as e-commerce, sensitive multi-media transfer, online banking have …
Triple-layer image security using a zigzag embedding pattern
S Farrag, W Alexan, HH Hussein - … International Conference on …, 2019 - ieeexplore.ieee.org
This paper proposes a triple-layer, high capacity, message security scheme. The first two
layers are of a cryptographic nature, whereas the third layer is of a steganographic nature. In …
layers are of a cryptographic nature, whereas the third layer is of a steganographic nature. In …
IMG‐forensics: Multimedia‐enabled information hiding investigation using convolutional neural network
Abstract Information hiding aims to embed a crucial amount of confidential data records into
the multimedia, such as text, audio, static and dynamic image, and video. Image‐based …
the multimedia, such as text, audio, static and dynamic image, and video. Image‐based …
Payload enhancement on least significant bit image steganography using edge area dilation
DRIM Setiadi - International Journal of Electronics and …, 2019 - yadda.icm.edu.pl
This research proposes a method to enhance the payload message by embedding
messages on the dilated edge areas by the Least Significant Bit (LSB) method. To add …
messages on the dilated edge areas by the Least Significant Bit (LSB) method. To add …
Improved data hiding method for securing color images
Recently, data hiding techniques have become very popular in several vital applications,
especially in telemedicine. The reason for this is their ability to give good results such as …
especially in telemedicine. The reason for this is their ability to give good results such as …
Big data in property management
Big data transform all kinds of businesses, including property management. Although the
application of big data has great potential, it also presents challenges. The purpose of this …
application of big data has great potential, it also presents challenges. The purpose of this …
[HTML][HTML] Pairwise Coded mCAP with Chaotic Dual-Mode Index Modulation for Secure Bandlimited VLC Systems
In this paper, for the first time, we propose and experimentally demonstrate a novel pairwise
coding (PWC)-based multiband carrierless amplitude and phase (m CAP) modulation with …
coding (PWC)-based multiband carrierless amplitude and phase (m CAP) modulation with …
[HTML][HTML] CNN-based ternary classification for image steganalysis
This study proposes a convolutional neural network (CNN)-based steganalytic method that
allows ternary classification to simultaneously identify WOW and UNIWARD, which are …
allows ternary classification to simultaneously identify WOW and UNIWARD, which are …
Secure Image Steganography Approach for Hiding Compressed Data
KM Abdul-Zaher, AA El-Magd Sewesy… - Soft Computing for …, 2022 - Springer
Steganography is the technique of hiding a secret message inside a normal, non-
confidential file, or message to avoid detection. The main challenge in steganography is to …
confidential file, or message to avoid detection. The main challenge in steganography is to …
Image steganography: hiding secrets in random LSB pixels
D Kaur, HK Verma, RK Singh - Soft Computing: Theories and Applications …, 2020 - Springer
Steganography is the art of secret communication and evolved rapidly in the research
community, and hiding data in images is relatively secure against spoofing; buying these …
community, and hiding data in images is relatively secure against spoofing; buying these …