-
201
A high performance approach to ensure image security during transmission
Published 2025-09-01“…The approach uses RGB plane bit values with a matrix-based encryption scheme, implemented as a symmetric key algorithm. …”
Get full text
Article -
202
A novel and efficient digital image steganography technique using least significant bit substitution
Published 2025-01-01“…The LSB substitution method minimizes the error rate in the embedding process and is used to achieve greater reliability. Our proposed image-based steganography algorithm incorporates LSB substitution with Magic Matrix, Multi-Level Encryption Algorithm (MLEA), Secret Key (SK), and transposition, flipping. …”
Get full text
Article -
203
Optimized Video Watermarking With Entropy-Aware Block Selection and Modified Hénon-Map Encryption
Published 2024-01-01Get full text
Article -
204
Digital Image Copyright Protection and Management Approach—Based on Artificial Intelligence and Blockchain Technology
Published 2025-04-01“…This study proposes an image copyright registration, protection, and management method based on artificial intelligence and blockchain technology, aiming to address the current challenges of low accuracy in digital copyright infringement judgment, the vulnerability of image fingerprints stored on the chain to tampering, the complexity of encryption algorithms and key acquisition methods through contract calls, and the secure storage of image information during data circulation. …”
Get full text
Article -
205
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
Published 2021-06-01“…The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the transmitted image through IoT. …”
Get full text
Article -
206
Digital image representation by atomic functions: features for computer vision and machine learning
Published 2025-05-01“…The focus of this work is to assess whether DAT is suitable for ML and CV applications, particularly in the context of image clustering. We evaluated the performance of the well-known k-means clustering algorithm when applied to DAT images. …”
Get full text
Article -
207
Huffman coding-based data reduction and quadristego logic for secure image steganography
Published 2025-05-01“…However, existing steganographic algorithms often face a significant trade-off between payload capacity, image quality, and security. …”
Get full text
Article -
208
Chaotic Hénon–Logistic Map Integration: A Powerful Approach for Safeguarding Digital Images
Published 2025-02-01“…This paper presents an integrated chaos-based algorithm for image encryption that combines the chaotic Hénon map and chaotic logistic map (CLM) to enhance the security of digital image communication. …”
Get full text
Article -
209
Image Robust Watermarking Method Based on DWT-SVD Transform and Chaotic Map
Published 2024-01-01“…SVD is then applied to both the high-frequency subband of the carrier image after DWT and the encrypted watermark image. …”
Get full text
Article -
210
A novel meaningful secret image sharing method based on Arabic letters
Published 2016-11-01“…Secret sharing and visual cryptography methods commonly generate noise-like images. The noise-like images have attracted the attention of the attackers and several attacks have been developed to break these encrypted images. …”
Get full text
Article -
211
Blockchain Enabled Secure Medical Data Transmission and Diagnosis Using Golden Jackal Optimization Algorithm with Deep Learning
Published 2024-10-01“…The BGJOA-DLSMTD algorithm integrates various levels of operations namely encryption, image acquisition, BC, and diagnostic process. …”
Get full text
Article -
212
The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key
Published 2024-03-01“…This study proposes the utilization of LSB (Least Significant Bit) steganography on image files employing the 3DES (Triple Data Encryption Standard) algorithm. …”
Get full text
Article -
213
Encryption & Hiding Information in Internet Files HTML & XML
Published 2010-06-01“…Then, the encrypted secret message was embedded into an image in the HTML page. …”
Get full text
Article -
214
-
215
Joint Data Hiding and Partial Encryption of Compressive Sensed Streams
Published 2025-06-01“…On-the-fly insertion avoids the buffering of CS measurements for the subsequent standard encryption and generation of a thumbnail image.…”
Get full text
Article -
216
A Unified Approach to Image Recognition and Cryptography via Flexible Weak Inverse Property Quasigroups
Published 2025-01-01“…Algebra without associativity can be employed to strengthen the security guaranteed by specific cryptographic algorithms and protocols, as well as to establish new chances for accomplishing cryptographic targets such as encryption, hashing, and digital signatures. …”
Get full text
Article -
217
Metasurface-enabled optical encryption and steganography with enhanced information security
Published 2025-03-01“…By adjusting various combinations of optical keys, three encrypted carrier images are retrieved with high fidelity and negligible crosstalk, and the concealed secret information is successfully extracted through a corresponding decryption algorithm. …”
Get full text
Article -
218
Stochastic Photoresponse‐Driven Perovskite TRNGs for Secure Encryption Systems
Published 2025-04-01“…Using a 480 000‐bit random sequence, perfect image encryption, ensuring protection against hacking are demonstrated. …”
Get full text
Article -
219
LightLSB: a lightweight secure transmission mechanism for large-scale biometric images in computing limited environment
Published 2025-04-01“…To address these problems, a lightweight secure transmission mechanism for large-scale biometric images (LightLSB) was proposed. The existing visual cryptography algorithm was reused, and the quality of decrypted images was gradually improved during preprocessing and post-processing. …”
Get full text
Article -
220
Reversible data hiding in encrypted domain based on fine-grained access control
Published 2025-07-01“…To improve the embedding rate and security of reversible data hiding algorithms in encrypted images for cloud environments, ciphertext-policy attribute-based encryption and reversible data hiding in encrypted images were organically integrated, and a reversible data hiding algorithm in encrypted images based on fine-grained access control was proposed. …”
Get full text
Article