|
|
|
Jui-Chuan Liu, Heng-Xiao Chi, Ching-Chun Chang and Chin-Chen Chang
Information has been uploaded and downloaded through the Internet, day in and day out, ever since we immersed ourselves in the Internet. Data security has become an area demanding high attention, and one of the most efficient techniques for protecting da...
ver más
|
|
|
|
|
|
|
Arun Kumar Rai, Hari Om, Satish Chand and Chia-Chen Lin
In today?s digital age, ensuring the secure transmission of confidential data through various means of communication is crucial. Protecting the data from malicious attacks during transmission poses a significant challenge. To achieve this, reversible dat...
ver más
|
|
|
|
|
|
|
Ammar Odeh, Anas Abu Taleb, Tareq Alhajahjeh and Francisco Navarro
Securing medical imaging poses a significant challenge in preserving the confidentiality of healthcare data. Numerous research efforts have focused on fortifying these images, with encryption emerging as a primary solution for maintaining data integrity ...
ver más
|
|
|
|
|
|
|
Sandra L. Gomez-Coronel, Ernesto Moya-Albor, Jorge Brieva and Andrés Romero-Arellano
Currently, algorithms to embed watermarks into digital images are increasing exponentially, for example in image copyright protection. However, when a watermarking algorithm is applied, the preservation of the image?s quality is of utmost importance, for...
ver más
|
|
|
|
|
|
|
Yu Li, Liming Zhang, Xiaolong Wang, Xingang Zhang and Qihang Zhang
Commutative encryption and watermarking (CEW) is an emerging method that combines encryption technology with digital watermarking technology. It has the dual capability of secure transmission and copyright protection. However, the existing CEW methods fo...
ver más
|
|
|
|
|
|
|
Ibtisam A. Aljazaery,Haider Th. Salim Alrikabi,Mustafa Rabea Aziz
Pág. pp. 34 - 47
One of the techniques used in information security is the concealment technique, where the information to be hidden within another information medium to be saved in the process of messaging between two sides without detection. In this paper, an algorithm...
ver más
|
|
|
|
|
|
|
Neng Zhou, Minqing Zhang, Han Wang, Mengmeng Liu, Yan Ke and Xu An Wang
To combine homomorphic public key encryption with reversible data hiding, a reversible data hiding scheme in homomorphic encrypted image based on EC-EG is proposed. Firstly, the cover image is segmented. The square grid pixel group randomly selected by t...
ver más
|
|
|
|
|
|
|
Bhavna Gupta
Steganography is a branch of information hiding. Steganography is a process of embedding the secret information inside the host medium (text, audio, image and video). Video Steganography is the technique of hiding some secret message inside a Video. For ...
ver más
|
|
|
|
|
|
|
Sandeep Solanki,Lokesh Parashar
In this paper, the proposed hybrid algorithm is for reversible data hiding in encrypted images. By implementing the method of reserving space for advance data prior encryption, this technique accomplishes boosted performance than the existing method in t...
ver más
|
|
|
|
|
|
|
Pep Canyelles-Pericas, Paul Anthony Haigh, Zabih Ghassemlooy, Andrew Burton, Xuewu Dai, Tran The Son, Hoa Le-Minh, Richard Binns and Krishna Busawon
Visible Light Communication (VLC) uses light-emitting diodes to provide wireless connectivity in public environments. Transmission security in this emerging channel is not trivial. Chaotic modulation techniques can provide encryption directly in the phys...
ver más
|
|
|
|