A comprehensive survey of covert communication techniques, limitations and future challenges

I Makhdoom, M Abolhasan, J Lipman - Computers & Security, 2022 - Elsevier
Data encryption aims to protect the confidentiality of data at storage, during transmission, or
while in processing. However, it is not always the optimum choice as attackers know the …

[HTML][HTML] Security of medical images for telemedicine: a systematic review

M Magdy, KM Hosny, NI Ghali, S Ghoniemy - Multimedia Tools and …, 2022 - Springer
Recently, there has been a rapid growth in the utilization of medical images in telemedicine
applications. The authors in this paper presented a detailed discussion of different types of …

Image steganography in spatial domain: A survey

M Hussain, AWA Wahab, YIB Idris, ATS Ho… - Signal Processing: Image …, 2018 - Elsevier
This paper presents a literature review of image steganography techniques in the spatial
domain for last 5 years. The research community has already done lots of noteworthy …

[HTML][HTML] High-quality color image compression-encryption using chaos and block permutation

H Wen, Y Huang, Y Lin - Journal of King Saud University-Computer and …, 2023 - Elsevier
This paper proposes a high-quality color image compression-encryption scheme based on
chaos and block permutation. In this scheme, the color digital image is first converted and …

[HTML][HTML] Chaotic color multi-image compression-encryption/LSB data type steganography scheme for NFT transaction security

Z Zhang, Y Cao, H Jahanshahi, J Mou - Journal of King Saud University …, 2023 - Elsevier
With the rapid development of blockchain technology, the security of non-fungible tokens
(NFT) in the transaction process has attracted much attention. In the transaction process, the …

A new efficient medical image cipher based on hybrid chaotic map and DNA code

R Guesmi, MAB Farah - Multimedia tools and applications, 2021 - Springer
In this paper, we propose a novel medical image encryption algorithm based on a hybrid
model of deoxyribonucleic acid (DNA) masking, a Secure Hash Algorithm SHA-2 and a new …

A systematic review of computational image steganography approaches

S Kaur, S Singh, M Kaur, HN Lee - Archives of Computational Methods in …, 2022 - Springer
With the rapid growth of multimedia technologies, many images are communicated over
public channels. Therefore, significant interest has been given to providing secure …

4D Hyperchaotic map and DNA encoding combined image encryption for secure communication

G Arthi, V Thanikaiselvan, R Amirtharajan - Multimedia Tools and …, 2022 - Springer
The usage of digital health data such as documents, images and videos has increased
drastically in recent years, making them more prone to sophisticated cyber threats. Here …

Image encryption using DNA coding and three-dimensional chaotic systems

PN Lone, D Singh, UH Mir - Multimedia tools and Applications, 2022 - Springer
In this article, we present a novel algorithm for image encryption by invoking the well-known
Deoxyribonucleic Acid (DNA) method and the three-dimensional chaos maps. The 3D …

Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images

AA Abdulla, H Sellahewa, SA Jassim - Multimedia Tools and Applications, 2019 - Springer
Digital steganography is becoming a common tool for protecting sensitive communications
in various applications such as crime/terrorism prevention whereby law enforcing personals …