Digital to quantum watermarking: A journey from past to present and into the future

S Dhar, AK Sahu - Computer Science Review, 2024 - Elsevier
With the amplification of digitization, the surge in multimedia content, such as text, video,
audio, and images, is incredible. Concomitantly, the incidence of multimedia tampering is …

Privacy‐preserving remote sensing images recognition based on limited visual cryptography

D Zhang, M Shafiq, L Wang… - CAAI Transactions on …, 2023 - Wiley Online Library
With the arrival of new data acquisition platforms derived from the Internet of Things (IoT),
this paper goes beyond the understanding of traditional remote sensing technologies. Deep …

A chaos-based novel approach to video encryption using dynamic S-box

D Dhingra, M Dua - Multimedia Tools and Applications, 2024 - Springer
Video Encryption is the process of converting the video into an unrecognizable form to
protect it from unauthorized access. This paper proposes a novel video encryption method …

A comprehensive review of visual cryptography for enhancing high-security applications

PM Bachiphale, NS Zulpe - Multimedia Tools and Applications, 2024 - Springer
In today's digital era, safeguarding sensitive information is critical. Visual cryptography offers
a promising solution for enhancing security in online banking, web account management …

A new encryption algorithm for image data based on two-way chaotic maps and iterative cellular automata

MA Alkhonaini, E Gemeay, FM Zeki Mahmood… - Scientific Reports, 2024 - nature.com
Due to their simplicity of implementation and compliance with the encryption issue, chaotic
models are often utilized in picture encryption applications. Despite having many benefits …

Integration of image preprocessing and recognition functions in an optoelectronic coupling organic ferroelectric retinomorphic neuristor

Q Dai, M Pei, J Guo, Q Wang, Z Hao, H Wang, Y Li… - Materials …, 2023 - pubs.rsc.org
The human visual system (HVS) has the advantages of a low power consumption and high
efficiency because of the synchronous perception and early preprocessing of external image …

A novel color visual cryptography approach based on Harris Hawks Optimization Algorithm

D Ibrahim, R Sihwail, KAZ Arrifin, A Abuthawabeh… - Symmetry, 2023 - mdpi.com
Hundreds of millions of people worldwide use computing devices and services, including
smartphones, laptops, and messaging apps. Visual cryptography (VC) is one of the most …

A lightweight privacy-preserving system for the security of remote sensing images on iot

D Zhang, L Ren, M Shafiq, Z Gu - Remote Sensing, 2022 - mdpi.com
The acquisition of massive remote sensing data makes it possible to deeply fuse remote
sensing and artificial intelligence (AI). The mobility and cost advantages of new sensing …

[HTML][HTML] A reversible and lossless secret image sharing scheme with authentication for color images

W Li, C Peng, W Tan, Y Xu, K Niu - … of King Saud University-Computer and …, 2023 - Elsevier
With the increasing concern for public privacy protection, Secret Image Sharing (SIS) has
garnered significant attention among researchers. The goal of SIS is to split a secret image …

Stbciot: Securing the transmission of biometric images in customer iot

D Zhang, M Shafiq, G Srivastava… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
The recent advancement of the Internet of Things (IoT) and information technology has led to
the rapid expansion of interconnectivity among a billion devices across various applications …