An optimized color image watermarking technique using differential evolution and svd–dwt domain
Priyanka, S Maheshkar - Proceedings of Fifth International Conference on …, 2016 - Springer
We present a new image watermarking technique for color images. Tradeoff between
imperceptibility, robustness, and security is achieved by this technique. This technique is …
imperceptibility, robustness, and security is achieved by this technique. This technique is …
User data privacy in multimedia domain using 3–3 LSB-based color image steganography with RC4 and Bernoulli map protection
Social media sites such as Facebook, Twitter, etc. have become commonplace in everyday
life. With the emergence of the internet, the amount of data being created and communicated …
life. With the emergence of the internet, the amount of data being created and communicated …
Image encryption with a new fibonacci transform
In this article, we have defined a transformation called fibonacci transform using the property
of the fibonacci series. This transformation is extended to achieve image en-cryption. The …
of the fibonacci series. This transformation is extended to achieve image en-cryption. The …
Image encryption technique based on pixel exchange and XOR operation
KA Santoso, F Fatmawati, H Suprajitno - UNEJ e-Proceeding, 2017 - jurnal.unej.ac.id
Recently the information system develops quickly, especially information system via internet.
It's happened because the Internet can be used by anyone, anywhere and anytime. The …
It's happened because the Internet can be used by anyone, anywhere and anytime. The …
The modification of caesar cryptosystem based on binary vertices colouring
KA Santoso, IH Agustin… - Journal of Physics …, 2020 - iopscience.iop.org
Recently information technology has developed rapidly like the development of computer
hardware and software. By the existence of internet technology, the process of data transfer …
hardware and software. By the existence of internet technology, the process of data transfer …
[引用][C] A Cascaded Toolkit for Secure Data Transmission
R Das, S Dutta - 2019 - Department of Computer Science …