[PDF][PDF] A security enhanced robust steganography algorithm for data hiding

S Singh, TJ Siddiqui - … Journal of Computer Science Issues (IJCSI), 2012 - researchgate.net
In this paper, a new robust steganography algorithm based on discrete cosine transform
(DCT), Arnold transform and chaotic system is proposed. The chaotic system is used to …

A hybrid optimization approach based on clustering and chaotic sequences

J Gálvez, E Cuevas, H Becerra, O Avalos - International Journal of …, 2020 - Springer
Evolutionary computation algorithms represent a class of stochastic methods that can be
applied to a wide set of different complex optimization problems. Recently, the combination …

Multifocus watermarking approach based on discrete cosine transform

SR Waheed, MH Alkawaz, A Rehman… - Microscopy …, 2016 - Wiley Online Library
Image fusion process consolidates data and information from various images of same sight
into a solitary image. Each of the source images might speak to a fractional perspective of …

A Novel Image Authentication with Tamper Localization and Self‐Recovery in Encrypted Domain Based on Compressive Sensing

R Zhang, D Xiao, Y Chang - Security and Communication …, 2018 - Wiley Online Library
This paper proposes a novel tamper detection, localization, and recovery scheme for
encrypted images with Discrete Wavelet Transformation (DWT) and Compressive Sensing …

Non blind digital watermarking technique using DCT and cross chaos map

C Pradhan, V Saxena, AK Bisoi - … International Conference on …, 2012 - ieeexplore.ieee.org
Digital watermarking is the process of embedding secret information into a digital signal
which may be used to verify its authenticity or the identity of its owners. In this paper, a non …

[PDF][PDF] Imperceptible watermarking technique using Arnold's transform and cross chaos map in DCT Domain

C Pradhan, V Saxena, AK Bisoi - International Journal of Computer …, 2012 - Citeseer
Digital watermarking is the process of embedding secret information into a digital signal
which may be used to verify its authenticity or the identity of its owners. In this paper, we …

Blind watermarking techniques using DCT and arnold 2D cat map for color images

C Pradhan, BJ Saha, KK Kabi… - … on Communication and …, 2014 - ieeexplore.ieee.org
The modern era of digital communication facilities bring digital watermarking techniques
which is required to copyright and authenticate owner's information which further tracks …

[PDF][PDF] Digital Watermarking using Asymmetric Key Cryptography and Spatial Domain Technique

KK Singh, S Dwivedi - International Journal of Advance Research in …, 2014 - academia.edu
Earlier the digital watermarking was evaluated according to imperceptibility, capacity and
robustness. In this paper based on security considerations we address a new secure …

An AAC steganography scheme for adaptive embedding with distortion minimization model

Z Zhang, X Yi, X Zhao - Multimedia Tools and Applications, 2020 - Springer
Nowadays, most prevailing approaches to advanced audio coding (AAC) steganography
are content non-adaptive which have low embedding capacity and poor security. In this …

Robust image watermarking algorithm using DCT coefficients relation in YCoCg-R color space

M Moosazadeh, G Ekbatanifard - 2016 Eighth International …, 2016 - ieeexplore.ieee.org
In this paper, a digital image watermarking method in YCoCg-R color space is proposed that
uses YCoCg-R color space as a new working environment and coefficients Relation for …