Deep learning for steganalysis of diverse data types: A review of methods, taxonomy, challenges and future directions

H Kheddar, M Hemis, Y Himeur, D Megías, A Amira - Neurocomputing, 2024 - Elsevier
Steganography and steganalysis are two interrelated aspects of the field of information
security. Steganography seeks to conceal communications, whereas steganalysis aims to …

Fractal sorting matrix and its application on chaotic image encryption

Y Xian, X Wang - Information Sciences, 2021 - Elsevier
This article creatively proposes a class of sorting matrices with fractal characteristics, named
the fractal sorting matrix (FSM), and introduces its iterative calculation method. The FSM is …

Deep learning for diverse data types steganalysis: A review

H Kheddar, M Hemis, Y Himeur, D Megías… - arXiv preprint arXiv …, 2023 - arxiv.org
Steganography and steganalysis are two interrelated aspects of the field of information
security. Steganography seeks to conceal communications, whereas steganalysis is aimed …

Design and DSP implementation of a fractional-order detuned laser hyperchaotic circuit with applications in image encryption

X Li, J Mou, S Banerjee, Z Wang, Y Cao - Chaos, Solitons & Fractals, 2022 - Elsevier
In this paper, a fractional-order hyperchaotic detuned laser system (FHDLS) is proposed,
and a novel image cryptosystem with high-security performance is designed by combining …

Secure data encryption based on quantum walks for 5G Internet of Things scenario

AA Abd El-Latif, B Abd-El-Atty… - … on Network and …, 2020 - ieeexplore.ieee.org
Fifth generation (5G) networks are the base communication technology for connecting
objects in the Internet of Things (IoT) environment. 5G is being developed to provide …

Secure video communication using firefly optimization and visual cryptography

M Kumar, J Aggarwal, A Rani, T Stephan… - Artificial Intelligence …, 2022 - Springer
In recent years, we face an increasing interest in protecting multimedia data and copyrights
due to the high exchange of information. Attackers are trying to get confidential information …

A new chaotic complex map for robust video watermarking

P Ayubi, M Jafari Barani, M Yousefi Valandar… - Artificial Intelligence …, 2021 - Springer
In this paper, using a new two-dimensional complex map, a secure video watermarking
system is presented. Standard analyzes have been performed to analyze a dynamical …

Image encryption based on chaotic sub-block scrambling and chaotic digit selection diffusion

Y Xian, X Wang, X Yan, Q Li, X Wang - Optics and Lasers in Engineering, 2020 - Elsevier
A novel chaotic image encryption method combining chaotic sub-block scrambling (CSBS)
based on spiral transformation and chaotic digit selection diffusion (CDSD) is proposed in …

Cancellable face recognition based on fractional-order Lorenz chaotic system and Haar wavelet fusion

IS Badr, AG Radwan, ESM El-Rabaie, LA Said… - Digital Signal …, 2021 - Elsevier
Cancellable biometrics is the art of generating distorted or encrypted templates of original
biometric templates. The evolution of cancellable biometrics is attributed to the advanced …

Cryptographic system based on double parameters fractal sorting vector and new spatiotemporal chaotic system

Y Xian, X Wang, L Teng, X Yan, Q Li, X Wang - Information Sciences, 2022 - Elsevier
Abstract Information security and image encryption have rapidly developed in recent years.
This study presents an iterative method for vectors with fractal characteristics. Based on the …