An efficient image encryption using deep neural network and chaotic map

SR Maniyath, V Thanikaiselvan - Microprocessors and Microsystems, 2020 - Elsevier
Inspite of progressive growth of cryptography, encrypting sensitive information of an image is
still a computationally complex task. After reviewing existing literature, it is now known that …

A novel group theoretic and graphical approach for designing cryptographically strong nonlinear components of block ciphers

A Razaq, A Ullah, H Alolaiyan, A Yousaf - Wireless Personal …, 2021 - Springer
Substitution box is a significant and only nonlinear constituent of block cipher. S-box plays a
central role in converting the intelligible message or plain text, into an enciphered format …

QR code based color image stego-crypto technique using dynamic bit replacement and logistic map

P Mathivanan - Optik, 2021 - Elsevier
This paper uses a novel color image stego-crypto technique to enhance the capacity,
security and robustness of data embedding process. The proposed scheme uses a base64 …

Hybrid image embedding technique using Steganographic Signcryption and IWT-GWO methods

SJ Lim - Microprocessors and Microsystems, 2022 - Elsevier
Image Steganography is the process of hiding information, which can be text, image or video
inside a cover image. Recent steganography research hasn't addressed the problem of loss …

Image encryption algorithm using multi-base diffusion and a new four-dimensional chaotic system

S Wang, B Sun, Y Wang, B Du - Multimedia Tools and Applications, 2024 - Springer
Abstract Information security is very important in the era of rapid development of science and
technology. People often use multimedia to communicate in their daily life. Image plays an …

Road extraction from VHR remote-sensing imagery via object segmentation constrained by Gabor features

L Chen, Q Zhu, X Xie, H Hu, H Zeng - ISPRS international journal of geo …, 2018 - mdpi.com
Automatic road extraction from remote-sensing imagery plays an important role in many
applications. However, accurate and efficient extraction from very high-resolution (VHR) …

A robust DCT-2DLDA watermark for color images

TJ Chang, IH Pan, PS Huang, CH Hu - Multimedia Tools and Applications, 2019 - Springer
A blind watermarking algorithm is proposed, which is based on the Discrete Cosine
Transform (DCT) method. It uses Two-Dimensional Linear Discriminant Analysis (2DLDA) …

Lightweight cipher for H. 264 videos in the Internet of multimedia things with encryption space ratio diagnostics

A Shifa, MN Asghar, S Noor, N Gohar, M Fleury - Sensors, 2019 - mdpi.com
Within an Internet of Multimedia Things, the risk of disclosing streamed video content, such
as that arising from video surveillance, is of heightened concern. This leads to the encryption …

Penerapan Normalisasi Histogram untuk Peningkatan Kontras Pencahayaan pada Pengamatan Visual CCTV

S Saluky, Y Marine, N Bahiyah - Jurnal Informatika …, 2023 - ejournal.poltekharber.ac.id
Low Contrast can cause low image quality and make it difficult for proper image analysis.
One technique to improve image quality is to increase the lighting contrast. One method that …

Preserving chain-of-evidence in surveillance videos for authentication and trust-enabled sharing

N Kanwal, MN Asghar, MS Ansari, M Fleury… - IEEE …, 2020 - ieeexplore.ieee.org
Surveillance video recording is a powerful method of deterring unlawful activities. A robust
data protection-by-design solution can be helpful in terms of making a captured video …