An exhaustive review of authentication, tamper detection with localization and recovery techniques for medical images

B Madhushree, HB Basanth Kumar… - Multimedia Tools and …, 2024 - Springer
In order to aim for diagnosis of disease and decision making, the medical imaging plays an
important role in health science. Clinical pictures are portrayals of profoundly vulnerable …

Chaotic Complex Hashing: A simple chaotic keyed hash function based on complex quadratic map

P Ayubi, S Setayeshi, AM Rahmani - Chaos, Solitons & Fractals, 2023 - Elsevier
In the last two decades, the use of chaotic iterative maps in cryptographic systems,
especially chaotic hash functions, has been expanding. Sensitivity to small changes in initial …

Adaptive HEVC video steganography based on distortion compensation optimization

L Yang, D Xu, R Wang, S He - Journal of Information Security and …, 2023 - Elsevier
With the development of digital video communication, the steganography based on H.
265/HEVC has attracted more and more attention. Because of higher security and better …

Arabic text steganography based on deep learning methods

OFA Adeeb, SJ Kabudian - IEEE Access, 2022 - ieeexplore.ieee.org
Steganography is one of the oldest methods for securely sending and transferring secret
information between two people without raising suspicion. Recently, the use of Artificial …

[HTML][HTML] Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption

AA Bahaddad, KA Almarhabi… - Alexandria Engineering …, 2023 - Elsevier
In the digital era, information security becomes a challenging process that can be mitigated
by the utilization of cryptography and steganography techniques. Earlier studies on …

RISE: Rubik's cube and image segmentation based secure medical images encryption

K Demla, A Anand - Multimedia Tools and Applications, 2024 - Springer
Despite the ease of digital image distribution, storage, and replication, averting identity theft,
privacy breaches, and ownership issues can be challenging. Medical image encryption …

Combined image encryption and steganography technique for enhanced security using multiple chaotic maps

H Aparna, J Madhumitha - Computers and Electrical Engineering, 2023 - Elsevier
This paper proposes a novel security algorithm which combines the concepts of
Cryptography and Steganography to provide enhanced security to digital images. The …

Autoregressive linguistic steganography based on BERT and consistency coding

X Zheng, H Wu - Security and Communication Networks, 2022 - Wiley Online Library
Linguistic steganography (LS) conceals the presence of communication by embedding
secret information into a text. How to generate a high‐quality text carrying secret information …

Secure and imperceptible frequency-based watermarking for medical images

S Naima, AZE Boukhamla, Z Narima, K Amine… - Circuits, Systems, and …, 2024 - Springer
Medical image security is a critical concern in the healthcare domain, and various
watermarking techniques have been explored to embed imperceptible and secure data …

VHNet: A video hiding network with robustness to video coding

X Shen, H Yao, S Tan, C Qin - Journal of Information Security and …, 2023 - Elsevier
Data hiding is an essential practice for ensuring the security of confidential data and secret
communication and thus has been intensively studied. The development of deep learning …