Chaos-based block permutation and dynamic sequence multiplexing for video encryption

H Wen, Y Lin, Z Xie, T Liu - Scientific Reports, 2023 - nature.com
This paper proposes a video security transmission enhancement algorithm based on block
permutation and dynamic multiplexing sequences encryption based on 4D autonomous …

Optimal semi-fragile watermarking based on maximum entropy random walk and swin transformer for tamper localization

P Aberna, L Agilandeeswari - IEEE Access, 2024 - ieeexplore.ieee.org
In the multimedia arena, image tampering is an uncontrollable process that necessitates
content authentication and tamper detection in a variety of applications. One method that is …

XtoE: A novel constructive and camouflaged adaptive data hiding and image encryption scheme for high dynamic range images

CF Lan, CM Wang, W Lin - Applied Sciences, 2022 - mdpi.com
High dynamic range (HDR) image data hiding and encryption has attracted much interest in
recent years due the benefits of providing high quality realistic images and versatile …

A Dynamic Multi-Layer Steganography Approach Based on Arabic Letters' Diacritics and Image Layers

SS Alqahtany, AB Alkhodre, A Al Abdulwahid… - Applied Sciences, 2023 - mdpi.com
Steganography is a widely used technique for concealing confidential data within images,
videos, and audio. However, using text for steganography has not been sufficiently explored …

A realizable chaotic system with interesting sets of equilibria, characteristics, and its underactuated predefined-time sliding mode control

A Tiwari, PP Singh, BK Roy - Chaos, Solitons & Fractals, 2024 - Elsevier
This paper presents a new 4D chaotic system having both single-scroll and double-scroll,
self-excited and hidden attractors with the variation of system parameters. The proposed …

A new method for constructing discrete hyperchaotic systems with a controllable range of Lyapunov exponents and its application in information security

J Zeng, Y Wang, X Li, Y Guang, C Wang… - Physica Scripta, 2023 - iopscience.iop.org
Since people use chaos extensively for a wide range of applications in data encryption and
secure communications, a new method for designing practical high-dimensional discrete …

Robust and Secure Medical Image Watermarking for Edge-Enabled e-Healthcare

P Singh, KJ Devi, HK Thakkar, M Bilal, A Nayyar… - IEEE …, 2023 - ieeexplore.ieee.org
Advancements in networking technologies have enabled doctors to remotely diagnose and
monitor patients using the Internet of Medical Things (IoMT), telemedicine, and edge …

An improved Dijkstra cross-plane image encryption algorithm based on a chaotic system

P Hou, Y Wang, Z Shi, P Zheng - Frontiers in Artificial Intelligence, 2024 - frontiersin.org
While encrypting information with color images, most encryption schemes treat color images
as three different grayscale planes and encrypt each plane individually. These algorithms …

Advancing Image Encryption with a Novel One-Dimensional Chaotic Map

Y Li - 2024 - researchsquare.com
The secure transmission of images is a critical aspect of information security, especially in
an era where digital communication is ubiquitous. Image encryption, leveraging the …

[PDF][PDF] Reversible Data Hiding Method Based on Double-Side Histogram Shifting of Image Sub-Blocks

MZ Konyar - 2022 9th International Marmara Sciences Congress …, 2022 - researchgate.net
Data hiding studies that using the images as carriers are still remain popular. One of the
important reasons for this case is that it is easier to manipulate images than other carriers. In …