An efficient image encryption using deep neural network and chaotic map
SR Maniyath, V Thanikaiselvan - Microprocessors and Microsystems, 2020 - Elsevier
Inspite of progressive growth of cryptography, encrypting sensitive information of an image is
still a computationally complex task. After reviewing existing literature, it is now known that …
still a computationally complex task. After reviewing existing literature, it is now known that …
A novel group theoretic and graphical approach for designing cryptographically strong nonlinear components of block ciphers
Substitution box is a significant and only nonlinear constituent of block cipher. S-box plays a
central role in converting the intelligible message or plain text, into an enciphered format …
central role in converting the intelligible message or plain text, into an enciphered format …
QR code based color image stego-crypto technique using dynamic bit replacement and logistic map
P Mathivanan - Optik, 2021 - Elsevier
This paper uses a novel color image stego-crypto technique to enhance the capacity,
security and robustness of data embedding process. The proposed scheme uses a base64 …
security and robustness of data embedding process. The proposed scheme uses a base64 …
Hybrid image embedding technique using Steganographic Signcryption and IWT-GWO methods
SJ Lim - Microprocessors and Microsystems, 2022 - Elsevier
Image Steganography is the process of hiding information, which can be text, image or video
inside a cover image. Recent steganography research hasn't addressed the problem of loss …
inside a cover image. Recent steganography research hasn't addressed the problem of loss …
Image encryption algorithm using multi-base diffusion and a new four-dimensional chaotic system
S Wang, B Sun, Y Wang, B Du - Multimedia Tools and Applications, 2024 - Springer
Abstract Information security is very important in the era of rapid development of science and
technology. People often use multimedia to communicate in their daily life. Image plays an …
technology. People often use multimedia to communicate in their daily life. Image plays an …
Road extraction from VHR remote-sensing imagery via object segmentation constrained by Gabor features
Automatic road extraction from remote-sensing imagery plays an important role in many
applications. However, accurate and efficient extraction from very high-resolution (VHR) …
applications. However, accurate and efficient extraction from very high-resolution (VHR) …
A robust DCT-2DLDA watermark for color images
TJ Chang, IH Pan, PS Huang, CH Hu - Multimedia Tools and Applications, 2019 - Springer
A blind watermarking algorithm is proposed, which is based on the Discrete Cosine
Transform (DCT) method. It uses Two-Dimensional Linear Discriminant Analysis (2DLDA) …
Transform (DCT) method. It uses Two-Dimensional Linear Discriminant Analysis (2DLDA) …
Lightweight cipher for H. 264 videos in the Internet of multimedia things with encryption space ratio diagnostics
Within an Internet of Multimedia Things, the risk of disclosing streamed video content, such
as that arising from video surveillance, is of heightened concern. This leads to the encryption …
as that arising from video surveillance, is of heightened concern. This leads to the encryption …
Penerapan Normalisasi Histogram untuk Peningkatan Kontras Pencahayaan pada Pengamatan Visual CCTV
Low Contrast can cause low image quality and make it difficult for proper image analysis.
One technique to improve image quality is to increase the lighting contrast. One method that …
One technique to improve image quality is to increase the lighting contrast. One method that …
Preserving chain-of-evidence in surveillance videos for authentication and trust-enabled sharing
Surveillance video recording is a powerful method of deterring unlawful activities. A robust
data protection-by-design solution can be helpful in terms of making a captured video …
data protection-by-design solution can be helpful in terms of making a captured video …