RETRACTED ARTICLE: Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique

K Shankar, M Elhoseny, RS Kumar… - Journal of Ambient …, 2020 - Springer
Abstract Secret Image Sharing (SIS) scheme is to encrypt a secret image into 'n'specious
shadows. It is unable to reveal any data on the secret image if at least one of the shadows is …

Data hiding: current trends, innovation and potential challenges

AK Singh - ACM Transactions on Multimedia Computing …, 2020 - dl.acm.org
With the widespread growth of digital information and improved internet technologies, the
demand for improved information security techniques has significantly increased due to …

Application of discrete transforms with selective coefficients for blind image watermarking

EL Lydia, JS Raj, R Pandi Selvam… - Transactions on …, 2021 - Wiley Online Library
Watermarking scheme is not helpful in conveying the original image continually so as
identifying the owner's mark from the watermarked image. In the current situation, our …

Robust color image watermarking using invariant quaternion Legendre-Fourier moments

KM Hosny, MM Darwish - Multimedia Tools and Applications, 2018 - Springer
In this paper, a geometrically invariant color image watermarking method using Quaternion
Legendre-Fourier moments (QLFMs) is presented. A highly accurate, fast and numerically …

Joint encryption and compression-based watermarking technique for security of digital documents

AK Singh, S Thakur, A Jolfaei, G Srivastava… - ACM Transactions on …, 2021 - dl.acm.org
Recently, due to the increase in popularity of the Internet, the problem of digital data security
over the Internet is increasing at a phenomenal rate. Watermarking is used for various …

An improved capacity data hiding technique based on image interpolation

AA Mohammad, A Al-Haj, M Farfoura - Multimedia Tools and Applications, 2019 - Springer
Data hiding in multimedia objects such as text, images, audio and video clips is a technique
that has been widely used to achieve security for applications requiring copyright protection …

Medical image region based watermarking for secured telemedicine

K Swaraja - Multimedia Tools and Applications, 2018 - Springer
Exchange of Medical images over public networks entail a methodology to offer secrecy for
the image along with confirmation for image integrity. In this paper, a region-based Firefly …

Recent advances in transform and hybrid domain digital watermarking techniques—a survey

M Sajeer, A Mishra, PS Sathidevi - Soft Computing for Security …, 2022 - Springer
In the older days, watermarking has been extensively used in different forms in diverse
fields, mainly to recognize an entity's ownership. At the early stages, its analog rendition has …

An analysis of the operations and confrontations of using green IT in sustainable farming

S Pramanik, S Joardar, OP Jena… - AIP Conference …, 2023 - pubs.aip.org
Green IT seeks to utilise computing facilities in an energy-capability, expenditure-
minimization, along with ecologically amiable way by greening the employ, dumping, layout …

A secure and high-capacity data-hiding method using compression, encryption and optimized pixel value differencing

AK Shukla, A Singh, B Singh, A Kumar - IEEE Access, 2018 - ieeexplore.ieee.org
A high capacity data hiding method using lossless compression, advanced encryption
standard (AES), modified pixel value differencing (MPVD), and least significant bit (LSB) …