Design of Nonlinear Component of Block Cipher Over Non-Chain Semi-Local Ring with its Application to Color Image Encryption

MU Safdar, T Shah, A Ali - Arabian Journal for Science and Engineering, 2024 - Springer
The innovative approach to encryption proposed in this manuscript is designed to increase
the security of data in various applications. This approach incorporates innovative concepts …

[HTML][HTML] Local feature based self-embedding fragile watermarking scheme for tampered detection and recovery utilizing AMBTC with fuzzy logic

M Jana, B Jana, S Joardar - Journal of King Saud University-Computer and …, 2022 - Elsevier
The aim of designing self-embedding fragile watermarking is copy-right protection, tamper
localization and image recovery. This paper proposes a self-embedding fragile …

Robust data hiding scheme for highly compressed image exploiting btc with hamming code

K Datta, B Jana, PK Singh, MD Chakraborty - Multimedia Tools and …, 2024 - Springer
Compression techniques can be used on digital content to minimize duplication and
maintain internet traffic, while ensuring the quality of the decoded object. Two functionalities …

Reversible data hiding strategy exploiting circular distance interpolation utilizing optimal pixel adjustment with error substitution

M Jana, B Jana, S Joardar - Multimedia Tools and Applications, 2024 - Springer
Numerous reversible data hiding schemes have been proposed with the goal of ensuring
both security and availability of the original image. However, in the case of medical images …

A new DCT based robust image watermarking scheme using cellular automata

M Jana, B Jana - Information Security Journal: A Global …, 2022 - Taylor & Francis
Modern research in image watermarking focuses not only on security but also increasing the
payload without having any detectable signature within the media. In this paper, a new …

[HTML][HTML] Two-layers robust data hiding scheme for highly compressed image exploiting AMBTC with difference expansion

K Datta, B Jana, MD Chakraborty - … of King Saud University-Computer and …, 2022 - Elsevier
When the secret message is placed inside a highly compressed image, the transmission will
be more secure and cost efficient. In this article, two-layer data embedding and extraction …

Adaptive reversible data hiding scheme based on difference division interpolation

H Zhang, H Sun, F Meng - Expert Systems with Applications, 2024 - Elsevier
Reversible data hiding (RDH) technology is an effective means to ensure the secrecy of
information transmission. In particular, the interpolation-based RDH algorithm is widely used …

[PDF][PDF] A literature survey on stenography approach based on different LSB technique

K Saraswati, PS Sharma - no, 2021 - jctjournals.com
In today world digital Image processing is used in many fields like computer vision, remote
sensing, medical imaging, robotics, satellite images and aerial photography etc. There are …

A Robust Reversible Watermarking Scheme Using Attack-Simulation-Based Adaptive Normalization and Embedding

Y Tang, C Wang, S Xiang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
For copyright protection and perfect recovery of the original image in case of no attacks, it is
necessary to develop robust reversible watermarking (RRW) methods that counteract both …

[HTML][HTML] Optimized steganography techniques based on PVDS and genetic algorithm

A Fahim, Y Raslan - Alexandria Engineering Journal, 2023 - Elsevier
Due to the rapid development of confidential digital communication over international
networks, security is the most significant factor. Steganography is the science of concealed …