Chaotic Image Encryption: State-of-the-Art, Ecosystem, and the Promise of Quantum-Inspired AI

B Zolfaghari, H Nemati, N Yanai, K Bibak - Crypto and AI: From …, 2023 - Springer
Recently, many researchers have been interested in the application of chaos in
cryptography. Specifically, numerous research works have been focusing on chaotic image …

[图书][B] Crypto and AI: From Coevolution to Quantum Revolution

B Zolfaghari, HR Nemati, N Yanai, K Bibak - 2023 - Springer
This book studies the intersection between cryptography and AI, highlighting the significant
cross-impact and potential between the two technologies. The authors first study the …

Cartesian coordinated adaptive hiding for payload peaking

V Manikandan, R Amirtharajan - Multimedia Tools and Applications, 2024 - Springer
Transferring multimedia content without detection has gained traction over time. Employing
steganography for hiding secret data, viz. passwords, medical information, and private …

[PDF][PDF] GAN-Based Encoding Model for Reversible Image Steganography.

A Kuyoro, UJ Nzenwata, O Awodele… - Revue d'Intelligence …, 2022 - researchgate.net
Accepted: 6 July 2022 In carrying out reversible image steganography, the Generative
Adversarial Networks (GANs-based) models have proven to be the most suitable deep …

[PDF][PDF] Image Steganography Using Deep Neural Networks.

K Chinniyan, TV Samiyappan, A Gopu… - … Automation & Soft …, 2022 - cdn.techscience.cn
Steganography is the technique of hiding secret data within ordinary data by modifying pixel
values which appear normal to a casual observer. Steganography which is similar to …

A Comparative Analysis of Various Loss Functions for Image Data Hiding Using Deep Neural Network

M Chanchal, P Malathi - Inventive Communication and Computational …, 2022 - Springer
In today's highly emerging and dynamic world, data and information plays a major part in
computer communication and the global economy. The improvement in the computing and …

Research on double encryption of ghost imaging by SegNet deep neural network

Y Hualong, G Daidou - IEEE Photonics Technology Letters, 2024 - ieeexplore.ieee.org
Based on the development of ghost imaging and deep learning, this letter proposes a
double encryption method of ghost imaging by SegNet deep neural network by fully …

StegEdge: Privacy protection of unknown sensitive attributes in edge intelligence via deception

J Zhang, W Zhang, J Xu - Journal of Computer Security, 2023 - content.iospress.com
Due to the limited capabilities of user devices, such as smart phones, and the Internet of
Things (IoT), edge intelligence is being recognized as a promising paradigm to enable …

A Privacy-Preserving Method Based on Artificial Immune Computing in MCS

H Long, J Hao, S Zhang, Y Zhang, L Zhang - IEEE Access, 2023 - ieeexplore.ieee.org
Due to the widespread use of mobile intelligent terminal devices, Mobile Crowd Sensing
(MCS) applications have gained significant research attention. However, ensuring users …

A New Approach of Steganography on Image Metadata

Y Fernando, D Darwis, AR Mehta, W Wamiliana… - … : International Journal on …, 2024 - joiv.org
In this paper, we introduce a novel method, Steganography on Image Metadata (SIM), to
tackle the problem of robustness modification in steganography. The SIM method works by …