An exhaustive review of authentication, tamper detection with localization and recovery techniques for medical images
B Madhushree, HB Basanth Kumar… - Multimedia Tools and …, 2024 - Springer
In order to aim for diagnosis of disease and decision making, the medical imaging plays an
important role in health science. Clinical pictures are portrayals of profoundly vulnerable …
important role in health science. Clinical pictures are portrayals of profoundly vulnerable …
Chaotic Complex Hashing: A simple chaotic keyed hash function based on complex quadratic map
In the last two decades, the use of chaotic iterative maps in cryptographic systems,
especially chaotic hash functions, has been expanding. Sensitivity to small changes in initial …
especially chaotic hash functions, has been expanding. Sensitivity to small changes in initial …
Adaptive HEVC video steganography based on distortion compensation optimization
L Yang, D Xu, R Wang, S He - Journal of Information Security and …, 2023 - Elsevier
With the development of digital video communication, the steganography based on H.
265/HEVC has attracted more and more attention. Because of higher security and better …
265/HEVC has attracted more and more attention. Because of higher security and better …
Arabic text steganography based on deep learning methods
OFA Adeeb, SJ Kabudian - IEEE Access, 2022 - ieeexplore.ieee.org
Steganography is one of the oldest methods for securely sending and transferring secret
information between two people without raising suspicion. Recently, the use of Artificial …
information between two people without raising suspicion. Recently, the use of Artificial …
[HTML][HTML] Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption
In the digital era, information security becomes a challenging process that can be mitigated
by the utilization of cryptography and steganography techniques. Earlier studies on …
by the utilization of cryptography and steganography techniques. Earlier studies on …
RISE: Rubik's cube and image segmentation based secure medical images encryption
Despite the ease of digital image distribution, storage, and replication, averting identity theft,
privacy breaches, and ownership issues can be challenging. Medical image encryption …
privacy breaches, and ownership issues can be challenging. Medical image encryption …
Combined image encryption and steganography technique for enhanced security using multiple chaotic maps
H Aparna, J Madhumitha - Computers and Electrical Engineering, 2023 - Elsevier
This paper proposes a novel security algorithm which combines the concepts of
Cryptography and Steganography to provide enhanced security to digital images. The …
Cryptography and Steganography to provide enhanced security to digital images. The …
Autoregressive linguistic steganography based on BERT and consistency coding
X Zheng, H Wu - Security and Communication Networks, 2022 - Wiley Online Library
Linguistic steganography (LS) conceals the presence of communication by embedding
secret information into a text. How to generate a high‐quality text carrying secret information …
secret information into a text. How to generate a high‐quality text carrying secret information …
Secure and imperceptible frequency-based watermarking for medical images
Medical image security is a critical concern in the healthcare domain, and various
watermarking techniques have been explored to embed imperceptible and secure data …
watermarking techniques have been explored to embed imperceptible and secure data …
VHNet: A video hiding network with robustness to video coding
Data hiding is an essential practice for ensuring the security of confidential data and secret
communication and thus has been intensively studied. The development of deep learning …
communication and thus has been intensively studied. The development of deep learning …