A systematic review of computational image steganography approaches

S Kaur, S Singh, M Kaur, HN Lee - Archives of Computational Methods in …, 2022 - Springer
With the rapid growth of multimedia technologies, many images are communicated over
public channels. Therefore, significant interest has been given to providing secure …

Color image encryption and authentication using dynamic DNA encoding and hyper chaotic system

B Jasra, AH Moon - Expert Systems with Applications, 2022 - Elsevier
This paper takes a holistic approach to propose a comprehensive framework for color image
encryption with some novel features. The framework is designed around a secure encryption …

An efficient image encryption technique based on two-level security for internet of things

M Gupta, VP Singh, KK Gupta, PK Shukla - Multimedia Tools and …, 2023 - Springer
This paper proposes an efficient image encryption method based on a hybrid of
watermarking and cryptographic techniques. It is based on two-level security for the secure …

[Retracted] An Improved Secure Key Generation Using Enhanced Identity‐Based Encryption for Cloud Computing in Large‐Scale 5G

RK Gupta, KK Almuzaini, RK Pateriya… - Wireless …, 2022 - Wiley Online Library
The demand of cloud computing and 5G networks has increased in the current scenario due
to their attractive features and also the security related to the data over the cloud. In the …

CBO‐IE: A Data Mining Approach for Healthcare IoT Dataset Using Chaotic Biogeography‐Based Optimization and Information Entropy

MK Ahirwar, PK Shukla, R Singhai - Scientific Programming, 2021 - Wiley Online Library
Data mining is mostly utilized for a huge variety of applications in several fields like
education, medical, surveillance, and industries. The clustering is an important method of …

Chaotic lightweight cryptosystem for image encryption

J Ferdush, M Begum, MS Uddin - Advances in Multimedia, 2021 - Wiley Online Library
Data transmission over the Internet and the personal network has been risen day by day due
to the advancement of multimedia technology. Hence, it is today's prime concern to protect …

Feature entropy estimation (FEE) for malicious IoT traffic and detection using machine learning

TD Diwan, S Choubey, HS Hota… - Mobile Information …, 2021 - Wiley Online Library
Identification of anomaly and malicious traffic in the Internet of things (IoT) network is
essential for IoT security. Tracking and blocking unwanted traffic flows in the IoT network is …

A fractional-order memristive two-neuron-based hopfield neuron network: Dynamical analysis and application for image encryption

J Venkatesh, AN Pchelintsev, A Karthikeyan… - Mathematics, 2023 - mdpi.com
This paper presents a study on a memristive two-neuron-based Hopfield neural network with
fractional-order derivatives. The equilibrium points of the system are identified, and their …

A chaotic color image encryption scheme based on improved Arnold scrambling and dynamic DNA encoding

X Chen, J Mou, Y Cao, H Yan, H Jahanshahi - Multimedia Tools and …, 2023 - Springer
In recent years, chaotic image encryption based on color images has been widely studied.
However, in most articles, chaotic sequences generated by one chaotic system is used, and …

Image encryption using combination of 4D discrete hyperchaotic map and DNA encoding

UK Gera, S Agrawal - Multimedia Tools and Applications, 2024 - Springer
A novel image encryption algorithm using a combination of 4D discrete hyperchaotic map
and DNA encoding is proposed in this work. The used 4D discrete hyperchaotic map has a …