18   Artículos

 
en línea
Jui-Chuan Liu, Heng-Xiao Chi, Ching-Chun Chang and Chin-Chen Chang    
Information has been uploaded and downloaded through the Internet, day in and day out, ever since we immersed ourselves in the Internet. Data security has become an area demanding high attention, and one of the most efficient techniques for protecting da... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Arun Kumar Rai, Hari Om, Satish Chand and Chia-Chen Lin    
In today?s digital age, ensuring the secure transmission of confidential data through various means of communication is crucial. Protecting the data from malicious attacks during transmission poses a significant challenge. To achieve this, reversible dat... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Ammar Odeh, Anas Abu Taleb, Tareq Alhajahjeh and Francisco Navarro    
Securing medical imaging poses a significant challenge in preserving the confidentiality of healthcare data. Numerous research efforts have focused on fortifying these images, with encryption emerging as a primary solution for maintaining data integrity ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Sandra L. Gomez-Coronel, Ernesto Moya-Albor, Jorge Brieva and Andrés Romero-Arellano    
Currently, algorithms to embed watermarks into digital images are increasing exponentially, for example in image copyright protection. However, when a watermarking algorithm is applied, the preservation of the image?s quality is of utmost importance, for... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yu Li, Liming Zhang, Xiaolong Wang, Xingang Zhang and Qihang Zhang    
Commutative encryption and watermarking (CEW) is an emerging method that combines encryption technology with digital watermarking technology. It has the dual capability of secure transmission and copyright protection. However, the existing CEW methods fo... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Ibtisam A. Aljazaery,Haider Th. Salim Alrikabi,Mustafa Rabea Aziz     Pág. pp. 34 - 47
One of the techniques used in information security is the concealment technique, where the information to be hidden within another information medium to be saved in the process of messaging between two sides without detection. In this paper, an algorithm... ver más

 
en línea
Neng Zhou, Minqing Zhang, Han Wang, Mengmeng Liu, Yan Ke and Xu An Wang    
To combine homomorphic public key encryption with reversible data hiding, a reversible data hiding scheme in homomorphic encrypted image based on EC-EG is proposed. Firstly, the cover image is segmented. The square grid pixel group randomly selected by t... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Bhavna Gupta    
Steganography is a branch of information hiding. Steganography is a process of embedding the secret information inside the host medium (text, audio, image and video). Video Steganography is the technique of hiding some secret message inside a Video. For ... ver más

 
en línea
Sandeep Solanki,Lokesh Parashar    
In this paper, the proposed hybrid algorithm is for reversible data hiding in encrypted images. By implementing the method of reserving space for advance data prior encryption, this technique accomplishes boosted performance than the existing method in t... ver más

 
en línea
Pep Canyelles-Pericas, Paul Anthony Haigh, Zabih Ghassemlooy, Andrew Burton, Xuewu Dai, Tran The Son, Hoa Le-Minh, Richard Binns and Krishna Busawon    
Visible Light Communication (VLC) uses light-emitting diodes to provide wireless connectivity in public environments. Transmission security in this emerging channel is not trivial. Chaotic modulation techniques can provide encryption directly in the phys... ver más
Revista: Applied System Innovation    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »