We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 2,244 results
  1. Secured Reversible Data Hiding Scheme with NMI Interpolation and Arnold Transformation

    A novel and efficient 2-level secure reversible data hiding (RDH) method has been proposed based on image interpolation and Arnold transformation. An...
    Conference paper 2024
  2. A New Method for Secure Transmission of Medical Images Using Wavelet Transform and Steganography

    Protection of data is the major concern as digitization has become a new meta and technology is reaching its peaks. The proposed method in the paper...
    S. Jayanth, Y. Sushwanth, ... M. Pavan in IoT Based Control Networks and Intelligent Systems
    Conference paper 2023
  3. Encryption and Decryption of Image for Secured Data Transmission

    This work combines Arnold transform method with the spatial domain to encrypt a covered image and also recovers the covered image by the application...
    C. Thirumarai Selvi, R. S. Sankarasubramanian, M. MuthuKrishnan in Futuristic Communication and Network Technologies
    Conference paper 2022
  4. Data Protection Using Scrambling Technique

    Nowadays, securing information is one of the major concerns. It deals with preventing the data from unauthorized access, modification, cloning,...
    Conference paper 2023
  5. K-NN SEMANTIC Inquiry on Scrambled Social Information BASE

    In the present world of technology, the Data Mining has wide applications in different division, similar to bank segment, restorative field and...
    Sheo Kumar, Mrutyunjaya S. Yalawar in ICDSMLA 2019
    Conference paper 2020
  6. An image encryption method based on multi-space confusion using hyperchaotic 2D Vincent map derived from optimization benchmark function

    A novel multi-space confusion image encryption (MSC-IE) method based on 2D Vincent map is presented in this study. In order to provide a more secure...

    Uğur Erkan, Abdurrahim Toktas, ... Genwen Hu in Nonlinear Dynamics
    Article 07 October 2023
  7. An Image Compression-Encryption Algorithm Based on Compressed Sensing and Chaotic Oscillator

    In this chapter, a chaotic oscillator is presented. Various dynamical behaviors of the oscillator are analyzed. The complex dynamics of the proposed...
    Aboozar Ghaffari, Fahimeh Nazarimehr, ... Esteban Tlelo-Cuautle in Cybersecurity
    Chapter 2022
  8. Image content based secure reversible data hiding scheme using block scrambling and integer wavelet transform

    In this article, we propose a novel image dependent based Reversible Data Hiding (RDH) scheme. Suitable regions for data hiding within an image is...

    Ankita Meenpal, Saikat Majumder in Sādhanā
    Article 18 March 2022
  9. A novel adaptive image privacy protection method based on Latin square

    Recently, there has been a rise in image encryption methods using Latin squares. However, a significant portion of these methods relies on fixed key...

    Yucheng Chen, Huiqing Huang, ... Weiming Wei in Nonlinear Dynamics
    Article 23 April 2024
  10. Image encryption algorithm based on the Matryoshka transform and modular-inverse matrix

    The transmission of digital image in Internet is convenient, but at the same time the great risk of information leakage is existed. To meet the...

    **aoqiang Zhang, Xueheng Zhang in Nonlinear Dynamics
    Article 06 November 2023
  11. Enhanced Scrambled Prime Key Encryption Using Chaos Theory and Steganography

    In this paper we have analyzed the strength and weakness of scrambled prime key encryption proposed by Haidar et al. [10] for data encryption using...
    Shanmukha Shreyas Vedantam, Kushalnath Devaruppala, Ravi Shankar Nanduri in Intelligent Data Communication Technologies and Internet of Things
    Conference paper 2020
  12. Unraveling the Rubik’s Cube with Autodidactic Iteration Algorithm

    The autodidactic iteration algorithm was designed in hopes of finding an approximate solution to combinatorial optimization puzzles such as the...
    Conference paper 2022
  13. Directly and instantly seeing through random diffusers by self-imaging in scattering speckles

    Imaging through scattering medium is challenging but important for different applications. Most advances rely on computational image reconstruction...

    Jietao Liu, Wenhong Yang, ... Qiaoqiang Gan in PhotoniX
    Article Open access 03 January 2023
  14. Image encryption based on 2DNA encoding and chaotic 2D logistic map

    DNA has recently been investigated as a possible medium concerning ultra-compact information storage and ultra-scale computation. The development of...

    Asmaa Hasan Alrubaie, Maisa’a Abid Ali Khodher, Ahmed Talib Abdulameer in Journal of Engineering and Applied Science
    Article Open access 16 June 2023
  15. A Novel Multiblock Region-Based Arnold Transformation for Image Watermarking Combined with DWT-PSO Technique

    To ensure safe transmission of data over the internet, digital watermarking is considered to be most promising technique without compromising any...
    Kumari Rinki, Pushpneel Verma, Ranjeet Kumar Singh in Evolution in Computational Intelligence
    Conference paper 2022
  16. An image encryption scheme based on block compressed sensing and Chen’s system

    Image encryption is a common way of information protection. However, most of the existing image encryption schemes have a low transmission efficiency...

    Yuling Luo, Yuting Liang, ... Fangxiao Wang in Nonlinear Dynamics
    Article 05 December 2022
  17. A color image encryption algorithm based on hyperchaotic map and Rubik’s Cube scrambling

    At present, many encryption algorithms for color images either decompose color images into three gray images and encrypt them, respectively, or...

    Haojie Qiu, Xuemei Xu, ... Chuwen **ao in Nonlinear Dynamics
    Article 25 August 2022
  18. A Payload Scrambling Technique for Secure Image Steganography

    Communication is the basic need of everyone. It may be in the form of text, image or video. No one wants to public his/ her message to everyone....
    Sandeep Rathor, Vishal Rawal, Kumari Chhavi in Advances in Data and Information Sciences
    Conference paper 2022
  19. An Encryption Scheme Based on Grain Stream Cipher and Chaos for Privacy Protection of Image Data on IoT Network

    IoT-enabled devices can collect information and act based on instructions over the Internet; they can sometimes communicate device to device. The IoT...

    Punam Kumari, Bhaskar Mondal in Wireless Personal Communications
    Article 03 April 2023
  20. A blind audio watermarking based on singular value decomposition and quantization

    In this work, we have proposed a robust audio watermarking technique in which a binary image is embedded into a host audio signal for copyright...

    Chinmay Maiti, Bibhas Chandra Dhara in International Journal of Speech Technology
    Article 02 August 2022
Did you find what you were looking for? Share feedback.