Image encryption algorithm with circle index table scrambling and partition diffusion

Y Zhou, C Li, W Li, H Li, W Feng, K Qian - Nonlinear dynamics, 2021 - Springer
This paper introduces an image encryption algorithm shorted as CITSPD, manipulated by
circle index table scrambling and partition diffusion. Firstly, the circle index table is obtained …

Block5GIntell: Blockchain for AI-enabled 5G networks

A El Azzaoui, SK Singh, Y Pan, JH Park - IEEE Access, 2020 - ieeexplore.ieee.org
Nowadays, 5G network is considered to be one of the main pillars of various industries,
including the Internet of Things (IoT), smart cities, virtual reality, and many more. Unlike …

[PDF][PDF] A covert communication method using special bitcoin addresses generated by vanitygen

L Zhang, Z Zhang, W Wang… - Computers …, 2020 - pdfs.semanticscholar.org
As an extension of the traditional encryption technology, information hiding has been
increasingly used in the fields of communication and network media, and the covert …

A visually meaningful image encryption scheme based on lossless compression spiht coding

Y Yang, M Cheng, Y Ding… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the popularity of social networks and the increase of cloud platform applications,
service computing has also developed. Therefore, the protection of information even privacy …

Reversible data hiding with brightness preserving contrast enhancement by two-dimensional histogram modification

HT Wu, X Cao, R Jia, YM Cheung - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Recently, contrast enhancement with reversible data hiding (CE-RDH) has been proposed
for digital images to hide useful data into contrast-enhanced images. In existing schemes …

Matrix-based secret sharing for reversible data hiding in encrypted images

Z Hua, Y Wang, S Yi, Y Zheng, X Liu… - … on Dependable and …, 2022 - ieeexplore.ieee.org
Traditional schemes for reversible data hiding in encrypted images (RDH-EI) focus on one
data hider and cannot resist the single point of failure. Besides, the image security is …

Separable robust reversible watermarking in encrypted 2D vector graphics

F Peng, WY Jiang, Y Qi, ZX Lin… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
To accomplish robust watermark extraction in reversible watermarking both in plaintext
domain and encrypted domain, a separable robust reversible watermarking in encrypted 2D …

Lossless data hiding in encrypted images compatible with homomorphic processing

HT Wu, YM Cheung, Z Zhuang, L Xu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Reversible data hiding in ciphertext has potential applications for privacy protection and
transmitting extra data in a cloud environment. For instance, an original plain-text image can …

A robust and lossless commutative encryption and watermarking algorithm for vector geographic data

S Guo, S Zhu, C Zhu, N Ren, W Tang, D Xu - Journal of Information Security …, 2023 - Elsevier
As an organic integration of encryption and watermarking technology, commutative
encryption and watermarking (CEW) overcomes the limitation that a single security …

Reversible data hiding based on multiple adaptive two-dimensional prediction-error histograms modification

C Zhang, B Ou - IEEE Transactions on Circuits and Systems for …, 2021 - ieeexplore.ieee.org
Pairwise prediction-error expansion (pairwise PEE) is an efficient reversible data hiding
technique based on two-dimensional (2D) histogram modification. However, without …