-
241
Algoritma Enkripsi Dan Embedding Citra Digital Menggunakan Logistic Map-3 Dan Least Siginificant BIT
Published 2025-06-01“…Digital images that have been encrypted (coded) so that they produce invisible images (blurry or messy images). …”
Get full text
Article -
242
Adaptive Steganography Using Improve Bit-plane Complexity Segmentation
Published 2024-06-01“…The goal of content-adaptive steganography is to conceal data inside the image's intricate texture. This research introduces an improved algorithm for concealing messages within color images. …”
Get full text
Article -
243
Acousto-optic cryptosystem based on dynamic DNA encoding and hyperchaotic system in gyrator domains
Published 2025-05-01“…Subsequently, employing an Acousto-optic modulation algorithm, audio information is fitted into image information and serves as part of the encryption system key, significantly enhancing the correlation between the key and the user. …”
Get full text
Article -
244
Generalized Fractional Order Complex Lorenz System-Based Dual Layer Security Enhancement Approach
Published 2025-01-01“…A two layer enhanced security approach that combines cryptography and steganography is introduced, which includes 1) encryption of satellite image using advanced encryption standard algorithm with hashed key and 2) embedding the encrypted image using the least significant bit, discrete wavelet transform and spread spectrum based steganography to strengthen the security. …”
Get full text
Article -
245
Privacy-preserved data hiding using compressive sensing and fuzzy C-means clustering
Published 2020-02-01“…The original image is preprocessed first to generate multiple highly correlated classes with fuzzy C-means clustering algorithm. …”
Get full text
Article -
246
A Framework of Secured Embedding Scheme Using Vector Discrete Wavelet Transformation and Lagrange Interpolation
Published 2018-01-01“…The proposed work uses a steganographic scheme for useful information with the help of human skin tone regions as cover image. The proposed algorithm has undergone Lagrange interpolation encryption for enhancement of the security of the hidden information. …”
Get full text
Article -
247
An Exponentially Delayed Feedback Chaotic Model Resistant to Dynamic Degradation and Its Application
Published 2025-07-01“…At the same time, in order to verify the practicality of the method, an image encryption algorithm is designed, and its security analysis results show that the algorithm has a high level of security and can compete with other encryption schemes. …”
Get full text
Article -
248
A Combination of SHA-256 and DES for Visual Data Protection
Published 2025-05-01“…This study employs SHA-256 and DES algorithms to safeguard visual data through encryption and decryption processes. …”
Get full text
Article -
249
Adaptive Multi-Switching Synchronization of High-Order Memristor-Based Hyperchaotic System with Unknown Parameters and Its Application in Secure Communication
Published 2019-01-01“…Finally, the proposed algorithm applied in secure communication of masking encryption and image encryption is validated by statistical analysis.…”
Get full text
Article -
250
Hide Compressed Texts in an Audio File
Published 2013-03-01“…Steganography art is a technique of hiding data within data, as hiding text message within an image or an audio file or a video file, it is a new method used as a substitute for the known encryption technology. …”
Get full text
Article -
251
Analisis Pengaruh Citra Terhadap Kombinasi Kriptografi RSA dan STEGANOGRAFi LSB
Published 2022-02-01“…The analysis of an algorithmic combination in this research includes analysis of variable influence image of the encryption and decryption process. …”
Get full text
Article -
252
Securing Communication Channels: An Advanced Steganography Approach With Orthogonal Frequency Division Multiplexing (OFDM)
Published 2025-01-01“…The proposed system uses advanced algorithms to modify the size and phase of the OFDM subcarriers and hide secret information within the transmitted signal by segmenting the image hierarchically into small segments, arranging them randomly, and embedding secret message in a random order to the image pixels to increase data security. …”
Get full text
Article -
253
A fast secure and more reliable underwater communication system based on light fidelity technology
Published 2025-04-01“…Security is reinforced using the Advanced Encryption Standard and reliability is ensured through the Cyclic Redundancy Check algorithm. …”
Get full text
Article -
254
An Efficient Cryptosystem for Video Surveillance in the Internet of Things Environment
Published 2019-01-01“…Finally, the proposed framework performs an efficient image encryption algorithm by employing a discrete fractional random transform (DFRT). …”
Get full text
Article -
255
Modified SPECK (M-SPECK) Lightweight Cipher Architecture for Resource-Constrained Applications
Published 2025-01-01“…The major challenge of IoT is providing data security with a low-complexity cryptography algorithm. However, traditional encryption algorithms are unsuitable for IoT applications due to their high complexity, whereas lightweight block ciphers have become promising solutions for resource-constrained applications. …”
Get full text
Article -
256
Computationally secure steganography based on speech synthesis
Published 2022-06-01“…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
Get full text
Article -
257
Multimedia Security Application of a Ten-Term Chaotic System without Equilibrium
Published 2017-01-01Get full text
Article -
258
Development of biometric systems for passenger identification based on noise-resistant coding means
Published 2021-04-01“…The problems are characterized by the possibility of biometric images compromise, which can potentially lead to the loss of their confidentiality and the impossibility of their further usage for personal identification. …”
Get full text
Article -
259
Blockchain and Bigdata to Secure Data Using Hash and Salt Techniques
Published 2022-04-01“…Let’s try to secure the data even more using encryption algorithms to make sure that proper data is used for analysis etc.…”
Get full text
Article -
260
On the implementation of a secured watermarking mechanism based on cryptography and bit pairs matching
Published 2021-06-01“…The pixel bits are represented in pairs following the proposed algorithm, then the encrypted watermark pixel bit pairs are compared with all bit pairs of original image and accordingly the replacement of bit pairs takes place with the respective matched pair assigned number binary equivalent. …”
Get full text
Article