An exhaustive review of authentication, tamper detection with localization and recovery techniques for medical images

B Madhushree, HB Basanth Kumar… - Multimedia Tools and …, 2024 - Springer
In order to aim for diagnosis of disease and decision making, the medical imaging plays an
important role in health science. Clinical pictures are portrayals of profoundly vulnerable …

Chaotic Complex Hashing: A simple chaotic keyed hash function based on complex quadratic map

P Ayubi, S Setayeshi, AM Rahmani - Chaos, Solitons & Fractals, 2023 - Elsevier
In the last two decades, the use of chaotic iterative maps in cryptographic systems,
especially chaotic hash functions, has been expanding. Sensitivity to small changes in initial …

Arabic text steganography based on deep learning methods

OFA Adeeb, SJ Kabudian - IEEE Access, 2022 - ieeexplore.ieee.org
Steganography is one of the oldest methods for securely sending and transferring secret
information between two people without raising suspicion. Recently, the use of Artificial …

Adaptive HEVC video steganography based on distortion compensation optimization

L Yang, D Xu, R Wang, S He - Journal of Information Security and …, 2023 - Elsevier
With the development of digital video communication, the steganography based on H.
265/HEVC has attracted more and more attention. Because of higher security and better …

[HTML][HTML] Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption

AA Bahaddad, KA Almarhabi… - Alexandria Engineering …, 2023 - Elsevier
In the digital era, information security becomes a challenging process that can be mitigated
by the utilization of cryptography and steganography techniques. Earlier studies on …

RISE: Rubik's cube and image segmentation based secure medical images encryption

K Demla, A Anand - Multimedia Tools and Applications, 2024 - Springer
Despite the ease of digital image distribution, storage, and replication, averting identity theft,
privacy breaches, and ownership issues can be challenging. Medical image encryption …

Autoregressive linguistic steganography based on BERT and consistency coding

X Zheng, H Wu - Security and Communication Networks, 2022 - Wiley Online Library
Linguistic steganography (LS) conceals the presence of communication by embedding
secret information into a text. How to generate a high‐quality text carrying secret information …

Combined image encryption and steganography technique for enhanced security using multiple chaotic maps

H Aparna, J Madhumitha - Computers and Electrical Engineering, 2023 - Elsevier
This paper proposes a novel security algorithm which combines the concepts of
Cryptography and Steganography to provide enhanced security to digital images. The …

VHNet: A video hiding network with robustness to video coding

X Shen, H Yao, S Tan, C Qin - Journal of Information Security and …, 2023 - Elsevier
Data hiding is an essential practice for ensuring the security of confidential data and secret
communication and thus has been intensively studied. The development of deep learning …

Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform

GV Kiran, K Vidhya - Journal of Statistical Computation and …, 2023 - Taylor & Francis
The major goal of this proposal is to implement a new steganography model with multi-
media data. Initially, in video steganography and frames are extracted and then, the …