Optimal semi-fragile watermarking based on maximum entropy random walk and swin transformer for tamper localization

P Aberna, L Agilandeeswari - IEEE Access, 2024 - ieeexplore.ieee.org
In the multimedia arena, image tampering is an uncontrollable process that necessitates
content authentication and tamper detection in a variety of applications. One method that is …

[HTML][HTML] Robust data hiding method based on frequency coefficient variance in repetitive compression

S Solak, AM Abdirashid, A Adjevi, AK Sahu - Engineering Science and …, 2024 - Elsevier
Sharing accurate and lossless images with higher quality through digital mediums is
challenging, particularly, images shared on social media platforms can serve as good …

Robust coverless video steganography based on inter-frame keypoint matching

N Li, J Qin, X **ang, Y Tan - Journal of Information Security and …, 2023 - Elsevier
Existing coverless video steganography schemes primarily focus on single-frame features,
which manifest poor robustness. To enhance resistance against adversarial attacks, this …

Adaptive HEVC video steganography based on distortion compensation optimization

L Yang, D Xu, R Wang, S He - Journal of information security and …, 2023 - Elsevier
With the development of digital video communication, the steganography based on H.
265/HEVC has attracted more and more attention. Because of higher security and better …

4D chaotic system-based secure data hiding method to improve robustness and embedding capacity of videos

S Kacar, MZ Konyar, Ü Çavuşoğlu - Journal of Information Security and …, 2022 - Elsevier
Chaotic systems are used in various applications due to their high security and complexity.
Because minor changes in parameters have a significant effect on the output values and the …

A secure image steganography based on LSB technique and 2D chaotic maps

N Khalil, A Sarhan, MAM Alshewimy - Computers and Electrical …, 2024 - Elsevier
This paper introduces a pioneering, effective data-hiding algorithm using different sizes of
cover images and different types of secret data (image, txt, and audio). The proposed …

Robust coverless video steganography based on pose estimation and object tracking

N Li, J Qin, X **ang, Y Tan - Journal of Information Security and …, 2024 - Elsevier
Existing coverless video steganography methods have not adequately exploited the stable
features within and between video frames, and they have neglected the subtlety required for …

A fast piecewise image encryption scheme combining NC1DNSM and P-Box

C Zhang, B Du - Integration, 2023 - Elsevier
By adding control parameters to the one-dimensional compound nested sinusoidal map, it is
found that it has larger chaos region, better Lyapunov exponent and better chaos …

[HTML][HTML] A new dual image based reversible data hiding method using most significant bits and center shifting technique

S Solak, G Tezcan - Applied Sciences, 2022 - mdpi.com
In this article, a new reversible data hiding method using most significant bits and center
shifting technique in dual images is proposed. The proposed reversible data hiding method …

Parallel BFS through pennant data structure with reducer hyper‐object based data hiding for 3D mesh images

S Bandyopadhyay, S Mukherjee… - Security and …, 2024 - Wiley Online Library
Data hiding refers to the technique employed to conceal sensitive data within various forms
of multimedia, such as video, audio, text, 2D images, 3D images, and more, while also being …