Design of nonlinear component of block cipher over non-chain semi-local ring with its application to color image encryption
The innovative approach to encryption proposed in this manuscript is designed to increase
the security of data in various applications. This approach incorporates innovative concepts …
the security of data in various applications. This approach incorporates innovative concepts …
An efficient general data hiding scheme based on image interpolation
Abstract Information exchange through public networks has the risk of information
disclosure, making data hiding an important technique to protect privacy. Image interpolation …
disclosure, making data hiding an important technique to protect privacy. Image interpolation …
The Path to Defence: A Roadmap to Characterising Data Poisoning Attacks on Victim Models
Data Poisoning Attacks (DPA) represent a sophisticated technique aimed at distorting the
training data of machine learning models, thereby manipulating their behavior. This process …
training data of machine learning models, thereby manipulating their behavior. This process …
Data hiding during image processing using capsule networks
In daily life, some conventional image processing operations, eg, histogram equalization,
and filtering, are widely used to improve the visual quality of digital images. This paper …
and filtering, are widely used to improve the visual quality of digital images. This paper …
Robust data hiding scheme for highly compressed image exploiting btc with hamming code
Compression techniques can be used on digital content to minimize duplication and
maintain internet traffic, while ensuring the quality of the decoded object. Two functionalities …
maintain internet traffic, while ensuring the quality of the decoded object. Two functionalities …
Adaptive reversible data hiding algorithm for interpolated images using sorting and coding
X **ong, Y Chen, M Fan, S Zhong - Journal of Information Security and …, 2022 - Elsevier
Existing reversible data hiding (RDH) algorithms based on the interpolation technology (IT)
have high embedding capacities and visual qualities. However, they usually embed secret …
have high embedding capacities and visual qualities. However, they usually embed secret …
Pencil shell matrix based image steganography with elevated embedding capacity
Image steganography is a mechanism that imperceptibly conceals information in a cover
image while also enabling the concealed details to be reliably retrieved from that image. The …
image while also enabling the concealed details to be reliably retrieved from that image. The …
Reversible hiding method for interpolation images featuring a multilayer center folding strategy
TC Lu, SR Huang, SW Huang - Soft Computing, 2021 - Springer
In 2015, Lu proposed the (k, F 1) interpolation-based reversible hiding scheme by using the
center folding strategy (CFS) to improve the image quality of the interpolation neighboring …
center folding strategy (CFS) to improve the image quality of the interpolation neighboring …
A cross-embedding based medical image tamper detection and self-recovery watermarking scheme
H Shi, K Yan, J Geng, Y Ren - Multimedia Tools and Applications, 2024 - Springer
With the rapid growth in communication and computing technologies, the transmission of
medical images over the Internet is on the rise. In such a scenario, there is a special need to …
medical images over the Internet is on the rise. In such a scenario, there is a special need to …
A novel pixel value ordering reversible data hiding based on dual-image
Y Niu, S Shen - Multimedia Tools and Applications, 2022 - Springer
Recently, reversible data hiding (RDH) based on pixel value order (PVO) has been an
important research direction in the field of information security due to its high-fidelity …
important research direction in the field of information security due to its high-fidelity …