Double layer security using crypto-stego techniques: a comprehensive review

A Jan, SA Parah, M Hussan, BA Malik - Health and Technology, 2022 - Springer
Recent advancement in the digital technology and internet has facilitated usage of
multimedia objects for data communication. However, interchanging information through the …

[Retracted] Enhanced Lorenz‐Chaotic Encryption Method for Partial Medical Image Encryption and Data Hiding in Big Data Healthcare

P Rashmi, MC Supriya, Q Hua - Security and Communication …, 2022 - Wiley Online Library
Image encryption is highly required in the big data healthcare cloud to improve the security
of the medical image for remote access. Data hiding method is the process of storing the …

Real-time medical image encryption for H-IoT applications using improved sequences from chaotic maps

DA Trujillo-Toledo, OR López-Bonilla… - Integration, 2023 - Elsevier
A new medical cryptosystem based on four chaotic maps is presented as a case study. The
message queuing telemetry transport (MQTT) protocol is used in this research to propose an …

A partial encryption algorithm for medical images based on quick response code and reversible data hiding technology

J Li, Z Zhang, S Li, R Benton, Y Huang… - BMC Medical Informatics …, 2020 - Springer
Background Medical image data, like most patient information, have a strong requirement for
privacy and confidentiality. This makes transmitting medical image data, within an open …

Reversible data hiding with enhancing contrast and preserving brightness in medical image

M Shi, Y Yang, J Meng, W Zhang - Journal of Information Security and …, 2022 - Elsevier
With the development of telemedicine and medical sharing, private information which stored
in the cloud may be disclosed. In order to protect the private information of patients and …

A reversible data hiding algorithm for audio files based on code division multiplexing

B Ma, JC Hou, CP Wang, XM Wu, YQ Shi - Multimedia Tools and …, 2021 - Springer
In this paper, a reversible data hiding algorithm for audio files based on code division
multiplexing (CDM) is proposed. In the scheme, the orthogonal spreading sequences are …

Medical image encryption scheme based on self‐verification matrix

Z Man, J Li, X Di - IET Image Processing, 2021 - Wiley Online Library
To mitigate the shortcomings of existing medical image encryption algorithms, including a
lack of anti‐tampering methods and security, this report presents an anti‐tampering …

Reversible data hiding algorithm based on adaptive prediction and code division multiplexing

X Wang, X Wang, B Ma, Q Li, C Wang, Y Xian… - Multimedia Tools and …, 2024 - Springer
A good predictor is crucial for reversible data hiding (RDH). At the same time, the RDH
based on code division multiplexing (CDM) has been extensively researched and …

Performance comparison of spatial domain-based watermarking techniques

J Ooi, HL Khor, SC Liew… - … Conference on Software …, 2021 - ieeexplore.ieee.org
Reversible watermarking is one of the main methods to authenticate and secure digital
media security and revert to its original state without any losses. There are multiple …

A secure biometric authentication system for smart environment using reversible data hiding through encryption scheme

VM Manikandan - Machine Learning for Biometrics, 2022 - Elsevier
Biometric authentication is used in its fullest potential in all smart environments. Face
recognition and fingerprint recognition are the two most popular approaches for biometric …