Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey

AE Omolara, M Alawida, OI Abiodun - Neural computing and applications, 2023 - Springer
This paper presented an exhaustive survey on the security and privacy issues of drones.
These security concerns were thoroughly dissected, particularly the aspect of cybersecurity …

Digital image watermarking using deep learning: A survey

KM Hosny, A Magdi, O ElKomy, HM Hamza - Computer Science Review, 2024 - Elsevier
Lately, a lot of attention has been paid to securing the ownership rights of digital images.
The expanding usage of the Internet causes several problems, including data piracy and …

A new image encryption algorithm based on DNA state machine for UAV data encryption

M Alawida, JS Teh, WH Alshoura - Drones, 2023 - mdpi.com
Drone-based surveillance has become widespread due to its flexibility and ability to access
hazardous areas, particularly in industrial complexes. As digital camera capabilities …

[HTML][HTML] An FPP-resistant SVD-based image watermarking scheme based on chaotic control

Z Zainol, JS Teh, M Alawida - Alexandria Engineering Journal, 2022 - Elsevier
Image watermarking commonly involves singular value decomposition (SVD) because of its
simplicity and minimal effect on image quality. However, SVD-based image watermarking …

Encrypting multiple images with an enhanced chaotic map

DS Laiphrakpam, R Thingbaijam, KM Singh… - Ieee …, 2022 - ieeexplore.ieee.org
A multiple-image encryption scheme based on an enhanced chaotic map is proposed. This
scheme combines multiple grayscale images into three planes. An amplified sine map is …

Increasing participants using counting-based secret sharing via involving matrices and practical steganography

F Al-Shaarani, A Gutub - Arabian Journal for Science and Engineering, 2022 - Springer
Secret sharing is an approach for accessing sensitive information by several authorized
participants. It shares the secret key in different forms among several authorized participants …

A secure gray-scale image watermarking technique in fractional DCT domain using zig-zag scrambling

V Sisaudia, VP Vishwakarma - Journal of Information Security and …, 2022 - Elsevier
Security of watermark is a huge concern when dealing with imperceptible watermarking for
copyright protection and owner identification. A novel watermarking technique that is …

MantaRayWmark: An image adaptive multiple embedding strength optimization based watermarking using Manta Ray Foraging and bi-directional ELM

NK Sharma, S Kumar, A Rajpal, N Kumar - Expert Systems with …, 2022 - Elsevier
Digital watermarking schemes based on a single value of embedding strength do not take
into account the local characteristics of the host signal for watermark embedding …

Enabling secure image transmission in unmanned aerial vehicle using digital image watermarking with H-Grey optimization

KJ Devi, P Singh, M Bilal, A Nayyar - Expert Systems with Applications, 2024 - Elsevier
Drone technology, also known as Unmanned Aerial Vehicles (UAVs), has advanced rapidly
in the last decade owing to the huge number of users. This approach has an immense …

Least Significant Bit Steganography for Text and Image hiding

S Sakshi, S Verma, P Chaturvedi… - 2022 3rd International …, 2022 - ieeexplore.ieee.org
Digital image attestation is powerful regard for the digital rebellion. To fulfill this need,
different watermarking methods have been established. Though, it is hard to accomplish a …