Dual-domain image encryption in unsecure medium—a secure communication perspective

H Mahalingam, T Veeramalai, AR Menon… - Mathematics, 2023 - mdpi.com
With the growing demand for digitalization, multimedia data transmission through wireless
networks has become more prominent. These multimedia data include text, images, audio …

Reversible blind image hiding algorithm based on compressive sensing and fusion mechanism

H Wu, G Ye, WS Yap, BM Goi - Optics & Laser Technology, 2023 - Elsevier
Most current existing image hiding schemes are non-blind, that is, the receiver needs both
carrier image and its corresponding container image (ie, carrier image containing secrets) to …

Deep learning-based biometric image feature extraction for securing medical images through data hiding and joint encryption–compression

M Singh, N Baranwal, KN Singh, AK Singh… - Journal of Information …, 2023 - Elsevier
Images are promising information carriers when compared to other media documents in the
healthcare domain. However, digital data transmission over unprotected wired or wireless …

A Review of Genome to Chaos: Exploring DNA Dynamics in Security

S Aashiq Banu, LK Rao, PS Priya… - Multimedia Tools and …, 2024 - Springer
One of the largest and fastest-growing industries globally is e-healthcare. Digital medical
imaging constantly evolves, advancing from standard computed tomography to powerful …

Reversible data hiding in encrypted image based on key-controlled balanced Huffman coding

Y Yang, F Chen, HM Tai, H He, L Qu - Journal of Information Security and …, 2024 - Elsevier
To achieve privacy protection and effective management in cloud computing, and solve the
problem of existing reversible data hiding in encrypted image (RDH-EI) algorithms being …

Generative image steganography based on guidance feature distribution

Y Sun, J Liu, R Zhang - ACM Transactions on Multimedia Computing …, 2024 - dl.acm.org
Without modification, generative steganography is more secure than modification-based
steganography. However, existing generative steganography methods still have limitations …

PVO-based reversible data hiding using bit plane segmentation and pixel expansion

Z Zhang, W Wang, Z Zhao, E Wang - Journal of Information Security and …, 2023 - Elsevier
The existing pixel value ordering (PVO)-based reversible data hiding (RDH) approaches
have been investigated; however, the functions of these techniques are weak when …

High-capacity reversible data hiding in encrypted medical images using adaptive pixel-modulation and HBP-RMC

X Chai, G Cao, Z Fu, Z Gan, B Wang… - … Signal Processing and …, 2024 - Elsevier
With the rapid development of telemedicine technology, electronic medical records (EMR)
are facing security issues such as illegal access, leakage and malicious tampering during …

Reversible data hiding in encrypted images with multi-prediction and adaptive huffman encoding

H Ren, G Bai, T Chen, Z Yue, R Ren - Scientific Reports, 2023 - nature.com
With the rapid development of multimedia technology and the massive accumulation of user
data, a huge amount of data is rapidly generated and shared over the network, while the …

3D-motion phase modulation for protecting image information

Y Ji, X Wen, X Zhou, Y Li, Y Wang, L Fu, Z Liu… - Applied Physics …, 2023 - pubs.aip.org
For most optical encryption mechanisms, craft precision of phase modulation components is
finite, restricting information efficient sharing and compatibility with processing. We …