Design of nonlinear component of block cipher over non-chain semi-local ring with its application to color image encryption

MU Safdar, T Shah, A Ali - Arabian Journal for Science and Engineering, 2025 - Springer
The innovative approach to encryption proposed in this manuscript is designed to increase
the security of data in various applications. This approach incorporates innovative concepts …

An efficient general data hiding scheme based on image interpolation

Y Chen, W Sun, L Li, CC Chang, X Wang - Journal of Information Security …, 2020 - Elsevier
Abstract Information exchange through public networks has the risk of information
disclosure, making data hiding an important technique to protect privacy. Image interpolation …

The Path to Defence: A Roadmap to Characterising Data Poisoning Attacks on Victim Models

T Chaalan, S Pang, J Kamruzzaman, I Gondal… - ACM Computing …, 2024 - dl.acm.org
Data Poisoning Attacks (DPA) represent a sophisticated technique aimed at distorting the
training data of machine learning models, thereby manipulating their behavior. This process …

Data hiding during image processing using capsule networks

Z Wang, G Feng, H Wu, X Zhang - Neurocomputing, 2023 - Elsevier
In daily life, some conventional image processing operations, eg, histogram equalization,
and filtering, are widely used to improve the visual quality of digital images. This paper …

Robust data hiding scheme for highly compressed image exploiting btc with hamming code

K Datta, B Jana, PK Singh, MD Chakraborty - Multimedia Tools and …, 2024 - Springer
Compression techniques can be used on digital content to minimize duplication and
maintain internet traffic, while ensuring the quality of the decoded object. Two functionalities …

Adaptive reversible data hiding algorithm for interpolated images using sorting and coding

X **ong, Y Chen, M Fan, S Zhong - Journal of Information Security and …, 2022 - Elsevier
Existing reversible data hiding (RDH) algorithms based on the interpolation technology (IT)
have high embedding capacities and visual qualities. However, they usually embed secret …

Pencil shell matrix based image steganography with elevated embedding capacity

S Mukherjee, S Sarkar, S Mukhopadhyay - Journal of Information Security …, 2021 - Elsevier
Image steganography is a mechanism that imperceptibly conceals information in a cover
image while also enabling the concealed details to be reliably retrieved from that image. The …

Reversible hiding method for interpolation images featuring a multilayer center folding strategy

TC Lu, SR Huang, SW Huang - Soft Computing, 2021 - Springer
In 2015, Lu proposed the (k, F 1) interpolation-based reversible hiding scheme by using the
center folding strategy (CFS) to improve the image quality of the interpolation neighboring …

A cross-embedding based medical image tamper detection and self-recovery watermarking scheme

H Shi, K Yan, J Geng, Y Ren - Multimedia Tools and Applications, 2024 - Springer
With the rapid growth in communication and computing technologies, the transmission of
medical images over the Internet is on the rise. In such a scenario, there is a special need to …

A novel pixel value ordering reversible data hiding based on dual-image

Y Niu, S Shen - Multimedia Tools and Applications, 2022 - Springer
Recently, reversible data hiding (RDH) based on pixel value order (PVO) has been an
important research direction in the field of information security due to its high-fidelity …