Search
Search Results
-
Secured Reversible Data Hiding Scheme with NMI Interpolation and Arnold Transformation
A novel and efficient 2-level secure reversible data hiding (RDH) method has been proposed based on image interpolation and Arnold transformation. An... -
A New Method for Secure Transmission of Medical Images Using Wavelet Transform and Steganography
Protection of data is the major concern as digitization has become a new meta and technology is reaching its peaks. The proposed method in the paper... -
Encryption and Decryption of Image for Secured Data Transmission
This work combines Arnold transform method with the spatial domain to encrypt a covered image and also recovers the covered image by the application... -
Data Protection Using Scrambling Technique
Nowadays, securing information is one of the major concerns. It deals with preventing the data from unauthorized access, modification, cloning,... -
K-NN SEMANTIC Inquiry on Scrambled Social Information BASE
In the present world of technology, the Data Mining has wide applications in different division, similar to bank segment, restorative field and... -
An image encryption method based on multi-space confusion using hyperchaotic 2D Vincent map derived from optimization benchmark function
A novel multi-space confusion image encryption (MSC-IE) method based on 2D Vincent map is presented in this study. In order to provide a more secure...
-
An Image Compression-Encryption Algorithm Based on Compressed Sensing and Chaotic Oscillator
In this chapter, a chaotic oscillator is presented. Various dynamical behaviors of the oscillator are analyzed. The complex dynamics of the proposed... -
Image content based secure reversible data hiding scheme using block scrambling and integer wavelet transform
In this article, we propose a novel image dependent based Reversible Data Hiding (RDH) scheme. Suitable regions for data hiding within an image is...
-
A novel adaptive image privacy protection method based on Latin square
Recently, there has been a rise in image encryption methods using Latin squares. However, a significant portion of these methods relies on fixed key...
-
Image encryption algorithm based on the Matryoshka transform and modular-inverse matrix
The transmission of digital image in Internet is convenient, but at the same time the great risk of information leakage is existed. To meet the...
-
Enhanced Scrambled Prime Key Encryption Using Chaos Theory and Steganography
In this paper we have analyzed the strength and weakness of scrambled prime key encryption proposed by Haidar et al. [10] for data encryption using... -
Unraveling the Rubik’s Cube with Autodidactic Iteration Algorithm
The autodidactic iteration algorithm was designed in hopes of finding an approximate solution to combinatorial optimization puzzles such as the... -
Directly and instantly seeing through random diffusers by self-imaging in scattering speckles
Imaging through scattering medium is challenging but important for different applications. Most advances rely on computational image reconstruction...
-
Image encryption based on 2DNA encoding and chaotic 2D logistic map
DNA has recently been investigated as a possible medium concerning ultra-compact information storage and ultra-scale computation. The development of...
-
A Novel Multiblock Region-Based Arnold Transformation for Image Watermarking Combined with DWT-PSO Technique
To ensure safe transmission of data over the internet, digital watermarking is considered to be most promising technique without compromising any... -
An image encryption scheme based on block compressed sensing and Chen’s system
Image encryption is a common way of information protection. However, most of the existing image encryption schemes have a low transmission efficiency...
-
A color image encryption algorithm based on hyperchaotic map and Rubik’s Cube scrambling
At present, many encryption algorithms for color images either decompose color images into three gray images and encrypt them, respectively, or...
-
A Payload Scrambling Technique for Secure Image Steganography
Communication is the basic need of everyone. It may be in the form of text, image or video. No one wants to public his/ her message to everyone.... -
An Encryption Scheme Based on Grain Stream Cipher and Chaos for Privacy Protection of Image Data on IoT Network
IoT-enabled devices can collect information and act based on instructions over the Internet; they can sometimes communicate device to device. The IoT...
-
A blind audio watermarking based on singular value decomposition and quantization
In this work, we have proposed a robust audio watermarking technique in which a binary image is embedded into a host audio signal for copyright...