[HTML][HTML] Visually meaningful image encryption algorithm based on digital signature

X Huang, Y Dong, G Ye, WS Yap, BM Goi - Digital Communications and …, 2023 - Elsevier
Traditional image encryption algorithms transform a plain image into a noise-like image. To
lower the chances for the encrypted image being detected by the attacker during the image …

Dual color images watermarking scheme with geometric correction based on quaternion FrOOFMMs and LS-SVR

LH Gong, HX Luo - Optics & Laser Technology, 2023 - Elsevier
To better describe the features of a color image, the quaternion fractional-order orthogonal
Fourier-Mellin moments (QFrOOFMMs) are defined. By combining QFrOOFMMs with least …

A systematic literature review on chaotic maps-based image security techniques

D Singh, S Kaur, M Kaur, S Singh, M Kaur… - Computer Science …, 2024 - Elsevier
Images play a substantial role in various applications such as medical imaging, satellite
imaging, and military communications. These images often contain confidential and …

Hiding data using efficient combination of RSA cryptography, and compression steganography techniques

OFA Wahab, AAM Khalaf, AI Hussein… - IEEE access, 2021 - ieeexplore.ieee.org
Data compression is an important part of information security because compressed data is
more secure and easy to handle. Effective data compression technology creates efficient …

Boosting image watermarking authenticity spreading secrecy from counting‐based secret‐sharing

A Gutub - CAAI Transactions on Intelligence Technology, 2023 - Wiley Online Library
This study presents enhancing images authentication by securing watermarking hidden data
via shares generated from counting‐based secret sharing. The trustfulness of shares utilised …

A DWT-SVD based robust digital watermarking for medical image security

N Zermi, A Khaldi, R Kafi, F Kahlessenane… - Forensic science …, 2021 - Elsevier
In this work, we propose a blind watermarking approach for medical image protection. In this
approach, the watermark will be constituted of the Electronic Patient Record and the image …

Deterministic chaos game: a new fractal based pseudo-random number generator and its cryptographic application

P Ayubi, S Setayeshi, AM Rahmani - Journal of Information Security and …, 2020 - Elsevier
In this paper, a digital image encryption algorithm is proposed based on the generalized
model of the chaos game. The chaos game is a well-known fractal, which acts as a pseudo …

Coverless image steganography: a survey

J Qin, Y Luo, X **ang, Y Tan, H Huang - IEEE access, 2019 - ieeexplore.ieee.org
With the digitalization of information, a lot of multimedia data are under attack, information
security has become a key issue of public concern. Image steganography, aiming at using …

End-to-end image steganography using deep convolutional autoencoders

N Subramanian, I Cheheb, O Elharrouss… - IEEE …, 2021 - ieeexplore.ieee.org
Image steganography is used to hide a secret image inside a cover image in plain sight.
Traditionally, the secret data is converted into binary bits and the cover image is …

Digital image scrambling based on a new one-dimensional coupled Sine map

B Yosefnezhad Irani, P Ayubi, F Amani Jabalkandi… - Nonlinear …, 2019 - Springer
This paper proposes a new one-dimensional chaotic map, called chaotic coupled Sine map
(CCSM), for the scrambling and encryption processes. The purpose of the CCSM design is …