Design of Nonlinear Component of Block Cipher Over Non-Chain Semi-Local Ring with its Application to Color Image Encryption
The innovative approach to encryption proposed in this manuscript is designed to increase
the security of data in various applications. This approach incorporates innovative concepts …
the security of data in various applications. This approach incorporates innovative concepts …
[HTML][HTML] Local feature based self-embedding fragile watermarking scheme for tampered detection and recovery utilizing AMBTC with fuzzy logic
M Jana, B Jana, S Joardar - Journal of King Saud University-Computer and …, 2022 - Elsevier
The aim of designing self-embedding fragile watermarking is copy-right protection, tamper
localization and image recovery. This paper proposes a self-embedding fragile …
localization and image recovery. This paper proposes a self-embedding fragile …
Robust data hiding scheme for highly compressed image exploiting btc with hamming code
Compression techniques can be used on digital content to minimize duplication and
maintain internet traffic, while ensuring the quality of the decoded object. Two functionalities …
maintain internet traffic, while ensuring the quality of the decoded object. Two functionalities …
Reversible data hiding strategy exploiting circular distance interpolation utilizing optimal pixel adjustment with error substitution
M Jana, B Jana, S Joardar - Multimedia Tools and Applications, 2024 - Springer
Numerous reversible data hiding schemes have been proposed with the goal of ensuring
both security and availability of the original image. However, in the case of medical images …
both security and availability of the original image. However, in the case of medical images …
A new DCT based robust image watermarking scheme using cellular automata
M Jana, B Jana - Information Security Journal: A Global …, 2022 - Taylor & Francis
Modern research in image watermarking focuses not only on security but also increasing the
payload without having any detectable signature within the media. In this paper, a new …
payload without having any detectable signature within the media. In this paper, a new …
[HTML][HTML] Two-layers robust data hiding scheme for highly compressed image exploiting AMBTC with difference expansion
K Datta, B Jana, MD Chakraborty - … of King Saud University-Computer and …, 2022 - Elsevier
When the secret message is placed inside a highly compressed image, the transmission will
be more secure and cost efficient. In this article, two-layer data embedding and extraction …
be more secure and cost efficient. In this article, two-layer data embedding and extraction …
Adaptive reversible data hiding scheme based on difference division interpolation
H Zhang, H Sun, F Meng - Expert Systems with Applications, 2024 - Elsevier
Reversible data hiding (RDH) technology is an effective means to ensure the secrecy of
information transmission. In particular, the interpolation-based RDH algorithm is widely used …
information transmission. In particular, the interpolation-based RDH algorithm is widely used …
[PDF][PDF] A literature survey on stenography approach based on different LSB technique
K Saraswati, PS Sharma - no, 2021 - jctjournals.com
In today world digital Image processing is used in many fields like computer vision, remote
sensing, medical imaging, robotics, satellite images and aerial photography etc. There are …
sensing, medical imaging, robotics, satellite images and aerial photography etc. There are …
A Robust Reversible Watermarking Scheme Using Attack-Simulation-Based Adaptive Normalization and Embedding
Y Tang, C Wang, S Xiang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
For copyright protection and perfect recovery of the original image in case of no attacks, it is
necessary to develop robust reversible watermarking (RRW) methods that counteract both …
necessary to develop robust reversible watermarking (RRW) methods that counteract both …
[HTML][HTML] Optimized steganography techniques based on PVDS and genetic algorithm
Due to the rapid development of confidential digital communication over international
networks, security is the most significant factor. Steganography is the science of concealed …
networks, security is the most significant factor. Steganography is the science of concealed …