[PDF][PDF] A novel secure image steganography method based on chaos theory in spatial domain

D Bandyopadhyay, K Dasgupta, JK Mandal… - International Journal of …, 2014 - academia.edu
This paper presents a novel approach of building a secure data hiding technique in digital
images. The image steganography technique takes the advantage of limited power of …

A novel LSB based image steganography with multi-level encryption

GS Charan, NK SSV, B Karthikeyan… - … on innovations in …, 2015 - ieeexplore.ieee.org
Steganography is an art of hiding the existence of secret information by embedding it in a
cover and hence preventing the unauthorized access of confidential information. This paper …

Secure speech coding using chaotic shift keying for encryption combined with error recovery

M Boumaraf, F Merazka - Multimedia Tools and Applications, 2024 - Springer
This paper presents a speech encryption algorithm utilizing chaotic shift keying alongside
error recovery techniques for the G. 722.2 codec. The algorithm employs chaotic data …

A new permutation-substitution scheme based on Henon chaotic map for image encryption

KA Hussein, SA Mahmood… - 2019 2nd Scientific …, 2019 - ieeexplore.ieee.org
In this paper, a new permutation-substitution scheme based on Henon chaotic map is
introduced to generate a set of secret keys equivalent to query image size (mxn). The …

Parallel implementation of RSA 2D-DCT steganography and chaotic 2D-DCT steganography

G Savithri, Vinupriya, S Mane, J Saira Banu - Proceedings of International …, 2017 - Springer
Abstract Information security has been one of the major concerns in the field of
communication today. Steganography is one of the ways used for secure communication …

[PDF][PDF] Color image encryption and decryption using pixel shuffling with henon chaotic system

AMN Alzubaidi - International Journal of Engineering Research, 2014 - academia.edu
Nowadays, with the incredible development of internet technologies and wireless
communication networks such as computer and mobile networks, all kinds of multimedia …

[PDF][PDF] A novel steganography method based on 4 dominations standard chaotic map in spatial domain

SA MEHDI - J. Theor. Appl. Inform. Technol, 2018 - academia.edu
The goal of steganography is to embed secret information in a data is considered as a cover
in a way that unparticipating users can not able to discover the content of this information by …

Text Steganography using LSB insertion method along with Chaos Theory

S Bhavana, KL Sudha - International Journal of Computer …, 2012 - search.proquest.com
The art of information hiding has been around nearly as long as the need for covert
communication. Steganography, the concealing of information, arose early on as an …

A hybrid approach for data hiding through chaos theory and reversible integer map**

SSV Nithin Kumar, GS Charan, B Karthikeyan… - … , Cyber Security and …, 2016 - Springer
Steganography is the science which deals with hiding the message so that the intruder
cannot even detect its existence. This paper proposes an efficient approach which embeds …

[PDF][PDF] Selective image encryption with 3D chaotic map

AMN Alzubaidi - European Academic Research, 2014 - academia.edu
Nowadays, with the incredible development of internet technologies and wireless
communication networks. All kinds of multimedia data such as digital image, Audio, text and …