[HTML][HTML] Chaotic image encryption: state-of-the-art, ecosystem, and future roadmap

B Zolfaghari, T Koshiba - Applied System Innovation, 2022 - mdpi.com
Recently, many researchers have been interested in the application of chaos in
cryptography. Specifically, numerous research works have been focusing on chaotic image …

[HTML][HTML] Double layer security using crypto-stego techniques: a comprehensive review

A Jan, SA Parah, M Hussan, BA Malik - Health and Technology, 2022 - Springer
Recent advancement in the digital technology and internet has facilitated usage of
multimedia objects for data communication. However, interchanging information through the …

Steganography and Steganalysis (in digital forensics): a Cybersecurity guide

M Dalal, M Juneja - Multimedia Tools and Applications, 2021 - Springer
Steganography and steganalysis is a relatively new-fangled scientific discipline in security
systems and digital forensics, respectively, but one that has matured greatly over the past …

End-to-end image steganography using deep convolutional autoencoders

N Subramanian, I Cheheb, O Elharrouss… - IEEE …, 2021 - ieeexplore.ieee.org
Image steganography is used to hide a secret image inside a cover image in plain sight.
Traditionally, the secret data is converted into binary bits and the cover image is …

A new fuzzy-DNA image encryption and steganography technique

SE El-Khamy, NO Korany, AG Mohamed - IEEE Access, 2020 - ieeexplore.ieee.org
Image encryption and steganography techniques are receiving a lot of interest and
investigations due to their high importance in multimedia communication systems. A novel …

A fast and secure public-key image encryption scheme based on Mordell elliptic curves

NA Azam, I Ullah, U Hayat - Optics and Lasers in Engineering, 2021 - Elsevier
Encryption schemes based on elliptic curves (ECs) have shown high resistance against
modern cryptanalysis. However, these schemes involve heavy computation for the …

A novel approach using steganography and cryptography in business intelligence

S Pramanik, R Ghosh, MM Ghonge… - … for Analytics, Business …, 2021 - igi-global.com
In the information technology community, communication is a vital issue. And image transfer
creates a major role in the communication of data through various insecure channels …

[HTML][HTML] The dichotomy of neural networks and cryptography: war and peace

B Zolfaghari, T Koshiba - Applied System Innovation, 2022 - mdpi.com
In recent years, neural networks and cryptographic schemes have come together in war and
peace; a cross-impact that forms a dichotomy deserving a comprehensive review study …

Reversible data hiding with hierarchical block variable length coding for cloud security

S Xu, JH Horng, CC Chang… - IEEE transactions on …, 2022 - ieeexplore.ieee.org
Reversible data hiding in encrypted images (RDHEI) can serve as a technical solution to
secure data in applications that rely on cloud storage. The key features of an RDHEI scheme …

[HTML][HTML] Steganography and steganalysis in voice over IP: A review

Z Wu, J Guo, C Zhang, C Li - Sensors, 2021 - mdpi.com
The rapid advance and popularization of VoIP (Voice over IP) has also brought security
issues. VoIP-based secure voice communication has two sides: first, for legitimate users, the …