Image encryption algorithm with circle index table scrambling and partition diffusion
This paper introduces an image encryption algorithm shorted as CITSPD, manipulated by
circle index table scrambling and partition diffusion. Firstly, the circle index table is obtained …
circle index table scrambling and partition diffusion. Firstly, the circle index table is obtained …
Block5GIntell: Blockchain for AI-enabled 5G networks
Nowadays, 5G network is considered to be one of the main pillars of various industries,
including the Internet of Things (IoT), smart cities, virtual reality, and many more. Unlike …
including the Internet of Things (IoT), smart cities, virtual reality, and many more. Unlike …
[PDF][PDF] A covert communication method using special bitcoin addresses generated by vanitygen
L Zhang, Z Zhang, W Wang… - Computers …, 2020 - pdfs.semanticscholar.org
As an extension of the traditional encryption technology, information hiding has been
increasingly used in the fields of communication and network media, and the covert …
increasingly used in the fields of communication and network media, and the covert …
A visually meaningful image encryption scheme based on lossless compression spiht coding
Y Yang, M Cheng, Y Ding… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the popularity of social networks and the increase of cloud platform applications,
service computing has also developed. Therefore, the protection of information even privacy …
service computing has also developed. Therefore, the protection of information even privacy …
Reversible data hiding with brightness preserving contrast enhancement by two-dimensional histogram modification
Recently, contrast enhancement with reversible data hiding (CE-RDH) has been proposed
for digital images to hide useful data into contrast-enhanced images. In existing schemes …
for digital images to hide useful data into contrast-enhanced images. In existing schemes …
Matrix-based secret sharing for reversible data hiding in encrypted images
Traditional schemes for reversible data hiding in encrypted images (RDH-EI) focus on one
data hider and cannot resist the single point of failure. Besides, the image security is …
data hider and cannot resist the single point of failure. Besides, the image security is …
Separable robust reversible watermarking in encrypted 2D vector graphics
To accomplish robust watermark extraction in reversible watermarking both in plaintext
domain and encrypted domain, a separable robust reversible watermarking in encrypted 2D …
domain and encrypted domain, a separable robust reversible watermarking in encrypted 2D …
Lossless data hiding in encrypted images compatible with homomorphic processing
Reversible data hiding in ciphertext has potential applications for privacy protection and
transmitting extra data in a cloud environment. For instance, an original plain-text image can …
transmitting extra data in a cloud environment. For instance, an original plain-text image can …
A robust and lossless commutative encryption and watermarking algorithm for vector geographic data
S Guo, S Zhu, C Zhu, N Ren, W Tang, D Xu - Journal of Information Security …, 2023 - Elsevier
As an organic integration of encryption and watermarking technology, commutative
encryption and watermarking (CEW) overcomes the limitation that a single security …
encryption and watermarking (CEW) overcomes the limitation that a single security …
Reversible data hiding based on multiple adaptive two-dimensional prediction-error histograms modification
C Zhang, B Ou - IEEE Transactions on Circuits and Systems for …, 2021 - ieeexplore.ieee.org
Pairwise prediction-error expansion (pairwise PEE) is an efficient reversible data hiding
technique based on two-dimensional (2D) histogram modification. However, without …
technique based on two-dimensional (2D) histogram modification. However, without …