Deterministic chaos game: a new fractal based pseudo-random number generator and its cryptographic application
In this paper, a digital image encryption algorithm is proposed based on the generalized
model of the chaos game. The chaos game is a well-known fractal, which acts as a pseudo …
model of the chaos game. The chaos game is a well-known fractal, which acts as a pseudo …
A new chaotic complex map for robust video watermarking
In this paper, using a new two-dimensional complex map, a secure video watermarking
system is presented. Standard analyzes have been performed to analyze a dynamical …
system is presented. Standard analyzes have been performed to analyze a dynamical …
An overview of challenges in medical image processing
AOA Deheyab, MH Alwan, IA Rezzaqe… - Proceedings of the 6th …, 2022 - dl.acm.org
Computers and various imaging technologies effectively enhanced the diagnostic
procedures of medical imaging, where various medical images enhance the early diagnosis …
procedures of medical imaging, where various medical images enhance the early diagnosis …
A new Pseudo random number generator based on generalized Newton complex map with dynamic key
In recent years, the chaotic systems in engineering applications attracted many researchers.
One of the most important applications of chaos theory is the production of pseudo random …
One of the most important applications of chaos theory is the production of pseudo random …
A blind video watermarking algorithm robust to lossy video compression attacks based on generalized Newton complex map and contourlet transform
The rapid growth of fast communication networks for digital video transmission has created a
need to copyright protection for these media. Digital video can be manipulated easily by …
need to copyright protection for these media. Digital video can be manipulated easily by …
A new digital image tamper detection algorithm based on integer wavelet transform and secured by encrypted authentication sequence with 3D quantum map
In this paper, a new gray scale image authentication technique is proposed in the integer
wavelet transform (IWT) domain. Digital images as an extensive media today have a special …
wavelet transform (IWT) domain. Digital images as an extensive media today have a special …
Sine cosine bird swarm algorithm-based deep convolution neural network for reversible medical video watermarking
Recently, advancements in multimedia have made a huge impact on watermarking
technologies. The digital video watermarking is the process of embedding the data in the …
technologies. The digital video watermarking is the process of embedding the data in the …
An Overview of Information Hiding Techniques Challenges and Applications
AN Kareem, OA Deheyab, AZ Sameen… - Proceedings of the 7th …, 2023 - dl.acm.org
The internet became a common communication platform for many people. However,
information transmission is not secure, and there is a high probability of copying and altering …
information transmission is not secure, and there is a high probability of copying and altering …
Chaotic Watermarking for Tamper Detection: Enhancing Robustness and Security in Digital Multimedia
This chapter delves into the use of Chaotic Watermarking for Tamper Detection, an
approach that boosts content security by fusing digital watermarking and chaotic systems …
approach that boosts content security by fusing digital watermarking and chaotic systems …
Strengthening speech content authentication against tampering
It is vital to authenticate the content of speech signals to prevent the framing of innocent
individuals. Furthermore, lack of speech content authentication may lead to repudiation. The …
individuals. Furthermore, lack of speech content authentication may lead to repudiation. The …