[Retracted] The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR)
J Hassan, D Shehzad, U Habib… - Computational …, 2022 - Wiley Online Library
Cloud computing is a long‐standing dream of computing as a utility, where users can store
their data remotely in the cloud to enjoy on‐demand services and high‐quality applications …
their data remotely in the cloud to enjoy on‐demand services and high‐quality applications …
Digital image steganography and steganalysis: A journey of the past three decades
Steganography is the science and art of covert communication. Conversely, steganalysis is
the study of uncovering the steganographic process. The evolution of steganography has …
the study of uncovering the steganographic process. The evolution of steganography has …
Dual-domain image encryption in unsecure medium—a secure communication perspective
H Mahalingam, T Veeramalai, AR Menon… - Mathematics, 2023 - mdpi.com
With the growing demand for digitalization, multimedia data transmission through wireless
networks has become more prominent. These multimedia data include text, images, audio …
networks has become more prominent. These multimedia data include text, images, audio …
Local binary pattern‐based reversible data hiding
A novel local binary pattern‐based reversible data hiding (LBP‐RDH) technique has been
suggested to maintain a fair symmetry between the perceptual transparency and hiding …
suggested to maintain a fair symmetry between the perceptual transparency and hiding …
An optimal information hiding approach based on pixel value differencing and modulus function
This paper proposes an image steganography approach based on pixel value differencing
and modulus function (PVDMF) to improve the peak signal-to-noise ratio (PSNR) and hiding …
and modulus function (PVDMF) to improve the peak signal-to-noise ratio (PSNR) and hiding …
Very high capacity image steganography technique using quotient value differencing and LSB substitution
G Swain - Arabian Journal for Science and Engineering, 2019 - Springer
This article proposes a very high capacity steganography technique using differencing and
substitution mechanisms. It divides the image into non-overlapped 3 * 3 3× 3 pixel blocks …
substitution mechanisms. It divides the image into non-overlapped 3 * 3 3× 3 pixel blocks …
Multi-directional block based PVD and modulus function image steganography to avoid FOBP and IEP
Since the inception of pixel value differencing (PVD) image steganography, it has drawn
considerable interest among the researchers of this field. However, most of the PVD based …
considerable interest among the researchers of this field. However, most of the PVD based …
FPGA image encryption-steganography using a novel chaotic system with line equilibria
S **g-yu, C Hong, W Gang, G Zi-bo, H Zhang - Digital Signal Processing, 2023 - Elsevier
The wide dissemination of images makes its protection problems urgent. Chaos theory is
widely applied since it provides better solutions to image protection. This paper introduces a …
widely applied since it provides better solutions to image protection. This paper introduces a …
A novel n-rightmost bit replacement image steganography technique
Image steganography is a technique for hiding the secret data in a carrier image. This paper
proposes a novel n-right most bit replacement image steganography technique to hide the …
proposes a novel n-right most bit replacement image steganography technique to hide the …
Enhanced adaptive data hiding method using LSB and pixel value differencing
High embedding capacity is considered as one of the significant challenges in information
hiding. In the spatial domain, most of the high capacity based strategies employed the least …
hiding. In the spatial domain, most of the high capacity based strategies employed the least …