Image encryption and hiding algorithm based on compressive sensing and random numbers insertion

G Ye, C Pan, Y Dong, Y Shi, X Huang - Signal processing, 2020 - Elsevier
Most current image encryption algorithms encrypt plain images directly into meaningless
cipher images. Visually, a few of them are vulnerable to illegal attacks on a few sharing …

A new image encryption based on bit replacing, chaos and DNA coding techniques

SF Yousif, AJ Abboud, RS Alhumaima - Multimedia Tools and Applications, 2022 - Springer
Millions of confidential images are transmitted every day by people through the multimedia
systems of the internet. Such confidential information in the images may be belong to the …

W-VDSR: Wavelet-based secure image transmission using machine learning VDSR neural network

J Khandelwal, VK Sharma - Multimedia Tools and Applications, 2023 - Springer
Digital communication often uses non-verbal ways to transmit important information. Such
as; images, symbols, and different textures. At the time of the wavelet transform, a specific …

Identify the Presence of Hidden Information Based on Lower Coefficients Value of 2DHWT Sub-bands

SM Hashim, DA Alzubaydi - 2021 7th International Engineering …, 2021 - ieeexplore.ieee.org
This paper introduces an approach which can be discriminated between normal images and
images containing hidden information. After applying one scale 2D Haar Wavelet Transform …

[PDF][PDF] Efficient steganography scheme for color images based on wavelets and chaotic maps

HN Abdullah, SF Yousif, AA Valenzuela - Iraqi Journal of Information and …, 2019 - iasj.net
In this paper, a combination of spatial domain as well as transformation domain with the aid
of chaotic sequences is used to propose an efficient steganography scheme for color …

Hybrid Cryptography and Steganography with Rivest Shamir Adleman and End of File Algorithm

RK Hapsari, W Widodo, BD Meilani… - 2023 Sixth …, 2023 - ieeexplore.ieee.org
Information security is very important, especially in technology and information exchange.
This information will likely be spread to irresponsible parties in the file transfer process using …

Parallel steganography framework for hiding a color image inside stereo images

DO Munoz-Ramirez, VI Ponomaryov… - Real-Time Image …, 2017 - spiedigitallibrary.org
In this work, a robust steganography framework to hide a color image into a stereo images is
proposed. The embedding algorithm is performed via Discrete Cosine Transform (DCT) and …

Study on Image Encryption Algorithm Based on Logistic Chaotic System

W Dong - Proceedings of the 4th International Conference on …, 2019 - dl.acm.org
With the rapid development of computer and network technology, a lot of information is
transmitted through the computer and network, but there are lots of online digital image …