4D chaotic system-based secure data hiding method to improve robustness and embedding capacity of videos

S Kacar, MZ Konyar, Ü Çavuşoğlu - Journal of Information Security and …, 2022 - Elsevier
Chaotic systems are used in various applications due to their high security and complexity.
Because minor changes in parameters have a significant effect on the output values and the …

A chaotic video steganography technique for carrying different types of secret messages

MY Valandar, P Ayubi, MJ Barani, BY Irani - Journal of information security …, 2022 - Elsevier
Increasing the security of data in insecure communication networks is the motivation of
researchers to propose different types of methods. Steganography is one of the security …

Efficient and secure data hiding in video sequence with three layer security: an approach using chaos

R Ranjithkumar, D Ganeshkumar… - Multimedia Tools …, 2021 - search.proquest.com
The fast development of communication and technology has created new challenges to
transfer data securely. The techniques widely used to secure the data are cryptography and …

Chaotic system-based secure data hiding scheme with high embedding capacity

GS Yadav, A Ojha - Computers & Electrical Engineering, 2018 - Elsevier
In recent years, data hiding has emerged as one of the main research areas in digital
security. There are plenty of schemes to hide the secret data into the least significant bit …

A new two-level data hiding algorithm for high security based on a nonlinear system

A Akgul, S Kacar, B Aricioglu - Nonlinear Dynamics, 2017 - Springer
In the recent years, interdisciplinary studies on and applications of nonlinear systems have
been increased significantly. Some of these studies are chaos-based applications. Chaos …

[PDF][PDF] An efficient steganography technique for images using chaotic bitstream

H Ogras - International Journal of Computer Network and …, 2019 - mecs-press.org
Steganography is a science of security technique through invisible communication; hiding
secret message into cover objects without any suspicion. Protection of the hidden …

A novel approach for data hiding based on combined application of discrete cosine transform and coupled chaotic map

R Kaur, B Singh - Multimedia Tools and Applications, 2021 - Springer
In the recent years chaotic map and Discrete Cosine transform (DCT) have surfaced to
become an important field in data hiding methods. In this proposed work, a randomly high …

A novel edge based chaotic steganography method using neural network

S Alam, T Ahmad, MN Doja - … of the 5th International Conference on …, 2017 - Springer
This paper provides a method of hiding sensitive information in digital image. In this paper,
we introduce a chaotic edge based steganography techniques based on artificial neural …

A novel method for digital image steganography based on a new three-dimensional chaotic map

A Sharif, M Mollaeefar, M Nazari - Multimedia Tools and Applications, 2017 - Springer
This paper, presents a novel chaos-based image steganography algorithm. Because of
efficient property of chaos based security systems besides steganography applicability in …

A cycling chaos-based cryptic-free algorithm for image steganography

M Aziz, MH Tayarani-N, M Afsar - Nonlinear Dynamics, 2015 - Springer
In recent years, chaotic systems have surfaced to become an important field in
steganographic matters. In this paper, we present a simple cryptic-free least significant bits …