Study and investigation of video steganography over uncompressed and compressed domain: a comprehensive review

R Patel, K Lad, M Patel - Multimedia Systems, 2021 - Springer
In the technological era, the primary source of information is in the form of digital data, which
has to be secured while storing or transmitting during communication over an unsecured …

A robust quasi-quantum walks-based steganography protocol for secure transmission of images on cloud-based E-healthcare platforms

B Abd-El-Atty, AM Iliyasu, H Alaskar, AA Abd El-Latif - Sensors, 2020 - mdpi.com
Traditionally, tamper-proof steganography involves using efficient protocols to encrypt the
stego cover image and/or hidden message prior to embedding it into the carrier object …

Secret images transfer in cloud system based on investigating quantum walks in steganography approaches

AA Abd El-Latif, B Abd-El-Atty, S Elseuofi… - Physica A: Statistical …, 2020 - Elsevier
The central role of the cloud data warehouse is to ensure the security of confidential data
that can be achieved via techniques of steganography and cryptography. Amidst the growth …

A sophisticated and provably grayscale image watermarking system using DWT-SVD domain

SE Naffouti, A Kricha, A Sakly - The Visual Computer, 2023 - Springer
Digital watermarking has attracted increasing attentions as it has been the current solution to
copyright protection and content authentication in today's digital transformation, which has …

A novel privacy approach of digital aerial images based on mersenne twister method with DNA genetic encoding and chaos

F Masood, W Boulila, J Ahmad, Arshad, S Sankar… - Remote Sensing, 2020 - mdpi.com
Aerial photography involves capturing images from aircraft and other flying objects,
including Unmanned Aerial Vehicles (UAV). Aerial images are used in many fields and can …

Multimedia Security Through 1D Chaotic Systems: Review and Analysis

A Daoui, AA Abd El-Latif - Recent Advancements in Multimedia Data …, 2023 - igi-global.com
The use of 1D chaotic maps in multimedia security applications is becoming increasingly
attractive due to their advantages, including the high sensitivity to both initial and control …

An effective and secure video watermarking using hybrid technique

G Dhevanandhini, G Yamuna - Multimedia Systems, 2021 - Springer
Now, all satellite channels handle high-quality data, including HD video files (1 K, 2 K, and 4
K). High-quality compression software is required to archive and transmit these files …

Möbius transformation and Permutation based S-Box to Enhance IoT Multimedia Security

I Aribilola, B Lee, MN Asghar - IEEE Access, 2024 - ieeexplore.ieee.org
In a world of seamless connections, where everyone is connected via smart devices
(Internet of Things (IoT)). These smart devices constantly exchange personal multimedia …

On the value of order number and power in secret image sharing

Y Yu, L Li, Y Lu, X Yan - Security and Communication …, 2020 - Wiley Online Library
Shadow images generated from Shamir's polynomial‐based secret image sharing (SSIS)
may leak the original secret image information, which causes a significant risk. The …

Quantum based encryption approach for secure images

A Alanezi, B Abd-El-Atty, H Kolivand… - … and Data Analytics …, 2021 - ieeexplore.ieee.org
Data security and privacy act vital tasks in our daily lives. Traditional cryptosystems may be
hacked amidst the growth of quantum resources. Consequently, we need new …