Integer wavelet transform based high performance secure steganography scheme QVD-LSB

PC Mandal, I Mukherjee, BN Chatterji - Multimedia Tools and Applications, 2024 - Springer
An integer wavelet transform (IWT) based image steganography technique is proposed to
prevail the embedding capacity constraints in this domain. Quotient value differencing (QVD) …

Crypto-space image steganography based on blind flipping

JY Lin, CC Chang, JH Horng - Journal of Information Security and …, 2023 - Elsevier
Reversible data hiding (RDH) for digital images is a widely studied steganography that
ensures the carrier image can be restored without distortion. Due to the popularity of Internet …

A multi-layer mesh synchronized reversible data hiding algorithm on the 3D model

G Zhang, Z Sui, C Sun, Q Liu, X Cheng - Multimedia Systems, 2024 - Springer
Reversible data hiding (RDH) techniques can extract the complete secret information and
recover the original 3D models. However, modifying vertices in the spatial domain to embed …

Multimodal classifier for disaster response

S Alqaraleh, H Sirin - International Conference on Advanced Engineering …, 2023 - Springer
Data obtained from social media has a massive effect on making correct decisions in time-
critical situations and natural disasters. Social media content generally consists of …

[PDF][PDF] 利用可变预测的密文域可逆信息隐藏

陈佳妮, 徐达文 - 中国图象图形学报, 2024 - cjig.cn
目的随着云计算和云存储场景中用户隐私保护的需求日益增加, 密文域图像可逆信息隐藏(
reversible data hiding in encrytpted images, RDHEI) 受到了广泛关注. 然而大多数RDHEI …

Image Encryption Using Quadrant Level Permutation and Chaotic Double Diffusion

RV Ravi, SB Goyal, C Djeddi - International Conference on Advanced …, 2023 - Springer
Abstract Information security is becoming more and more important as information
technology advances. In the fields of telecommunication networks, diagnostic imaging, and …

Image Encryption Using Spined Bit Plane Diffusion and Chaotic Permutation for Color Image Security

RV Ravi, SB Goyal, C Djeddi - International Conference on Advanced …, 2023 - Springer
With the tremendous rise in multimedia output over the last ten years, image encryption has
grown in importance as a component of information security. It is challenging to secure …

Check for updates

MDLBS Level - Proceedings of the First International Conference …, 2023 - books.google.com
In the previous decade, biometrics referred to the automatic recognition of persons based on
their physiological or behavioural traits but unimodal biometrics have their limitations. Due to …

[PDF][PDF] High-Speed Pipelined FPGA Implementation of a Robust Steganographic Scheme for Secure Data Communication Systems

S Harb, MO Ahmad, MNS Swamy - scitepress.org
In this paper, we introduce a high-speed and area-efficient hardware design for a novel
modulus-based image steganographic scheme, specifically targeting constrained-area …

[PDF][PDF] Medical Image Security using POB based Artificial Intelligence Techniques for Reversible Data Hiding

JN Kalshetty, PK Pareek - afjbs.com
Thanks to its intuitive design, the picture hosting platform is quickly gaining users, although
some worry about their privacy. Unfortunately, visual privacy protection solutions are …