Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)

S Rustad, PN Andono, GF Shidik - Signal Processing, 2023 - Elsevier
Digital steganography has a long history, starting to be developed in the 90s until now. The
main aspects of early steganography are security, imperceptibility, and payload. Security is …

Systematic survey on visually meaningful image encryption techniques

V Himthani, VS Dhaka, M Kaur, D Singh… - IEEE Access, 2022 - ieeexplore.ieee.org
Due to advancements in technology, digital images are widely used in various applications
like medical field, military communication, remote sensing, etc. These images may contain …

Asymmetric image encryption algorithm using a new chaotic map and an improved radial diffusion

S Liu, G Ye - Optik, 2023 - Elsevier
In order to address the security risks associated with the theft of private images over open
Internet of Things (IoT), this paper introduces a new Logistic-Sine-Coupling Map (LoSCM) in …

An overview of visually meaningful ciphertext image encryption

J Shiwei, L Jianjun - Multimedia Tools and Applications, 2024 - Springer
Image encryption algorithm has become one of the hotspots of cryptography research
because of its characteristics of large amount of information and strong visualization …

[HTML][HTML] A blind signature scheme for IoV based on 2D-SCML image encryption and lattice cipher

M Gao, J Li, X Di, X Li, M Zhang - Expert Systems with Applications, 2024 - Elsevier
Abstract Today's Internet of Vehicles (IoV) faces many security risks in the data transmission
process, and image data is more vulnerable to security threats in the transmission process …

MieWC: Medical image encryption using wavelet transform and multiple chaotic maps

K Demla, A Anand - Security and Privacy, 2024 - Wiley Online Library
Recently, digital images have been widely used in several applications through advanced
wearable devices and networks. Despite several benefits of digital images, such as easy …

Digital healthcare using blockchain

K Ramar, H Shanmugasundaram… - 2022 1st …, 2022 - ieeexplore.ieee.org
To protect personal patient information and comply with regulations, data security is a
necessary aspect of the healthcare business. Because patient data is written on paper and …

A novel adaptive image privacy protection method based on Latin square

Y Chen, H Huang, C Tang, W Wei - Nonlinear Dynamics, 2024 - Springer
Recently, there has been a rise in image encryption methods using Latin squares. However,
a significant portion of these methods relies on fixed key sequences, making them …

[HTML][HTML] A Region-Selective Anti-compression Image Encryption Algorithm Based on Deep Networks

Z Chen, Y Liu, G Ke, J Wang, W Zhao, S Lo - International Journal of …, 2024 - Springer
In recent years, related research has focused on how to safely transfer and protect the
privacy of images in social network services while providing easy access by authorized …

Color image encryption algorithm based on Mackey–Glass time-delay chaotic system and quantum random walk

D Mou, Y Dong - New Journal of Physics, 2024 - iopscience.iop.org
To ensure the confidentiality and integrity of image data and prevent unauthorized data
tampering and privacy leaks. This study proposes a new color image encryption scheme …