Region of interest-based medical image encryption technique based on chaotic S-boxes

SS Jamal, MM Hazzazi, MF Khan, Z Bassfar… - Expert Systems with …, 2024 - Elsevier
Block cipher has been one of the most reliable options by which data security is achieved.
The strength of block cipher against various attacks is purely dependent on its confusion …

AuCFSR: Authentication and Color Face Self-Recovery Using Novel 2D Hyperchaotic System and Deep Learning Models

A Daoui, M Yamni, T Altameem, M Ahmad, M Hammad… - Sensors, 2023 - mdpi.com
Color face images are often transmitted over public channels, where they are vulnerable to
tampering attacks. To address this problem, the present paper introduces a novel scheme …

[PDF][PDF] A robust data hiding reversible technique for improving the security in e-health care system

S Kanwal, F Tao, A Almogren… - … in Engineering & …, 2022 - researchgate.net
The authenticity and integrity of healthcare is the primary objective. Numerous reversible
watermarking schemes have been developed to improve the primary objective but …

Improved twofish algorithm: a digital image enciphering application

TU Haq, T Shah, GF Siddiqui, MZ Iqbal… - IEEE …, 2021 - ieeexplore.ieee.org
With the growth of networks, the Internet of Things (IoT) and new cyber attacks pose threats
to privacy and security, secure communication is therefore becoming one of the most crucial …

Literature Review for Health Secure Image Steganography and Visual Encryption

AJT Albderi, LB Said… - 2023 Al-Sadiq …, 2023 - ieeexplore.ieee.org
The security image of medical data for transmission is considered highly important during
communication issues because of the sensitive information of medical. Encryption and …

[PDF][PDF] A Review on the Recent Trends of Image Steganography for VANET Applications.

AS Ansari - Computers, Materials & Continua, 2024 - cdn.techscience.cn
Image steganography is a technique of concealing confidential information within an image
without dramatically changing its outside look. Whereas vehicular ad hoc networks …

Polynomial cryptographic optical steganography substitution model for the telehealth system with multimedia data

G Rajaram, S Dash, F Arslan, D Venu… - Optical and Quantum …, 2023 - Springer
Telehealth and cloud-based communication platforms now hide medical data. Text and
multimedia data are hidden using encryption, steganography, and watermarking …

The Design Review of Feature-based Method in Embedding the Hidden Message in Text as the Implementation of Steganography

R Din, S Utama - Borneo International Journal eISSN 2636-9826, 2023 - majmuah.com
Steganography, the art of concealing secret information within cover media, plays an
important role in securing hidden messages and data protection. Text steganography, in …

A new method for locating data hiding in image steganography

S Pramanik - Multimedia Tools and Applications, 2024 - Springer
In the steganographic picture, it remains a challenging problem to determine the best place
for inserting the hidden message with a minimum distortion of the host medium. However …

Dual image based secured reversible data hiding scheme exploiting huffman compression tree combining bit-reversal permutation technique

K Datta, B Jana, MD Chakraborty - Multimedia Tools and Applications, 2024 - Springer
In the area of data hiding and information security, the greater need is to ensure high
embedding capacity of the stego media without hampering the visual quality while ensuring …