Traditionally, tamper-proof steganography involves using efficient protocols to encrypt the stego cover image and/or hidden message prior to embedding it into the carrier object …
AA Abd El-Latif, B Abd-El-Atty, S Elseuofi… - Physica A: Statistical …, 2020 - Elsevier
The central role of the cloud data warehouse is to ensure the security of confidential data that can be achieved via techniques of steganography and cryptography. Amidst the growth …
SE Naffouti, A Kricha, A Sakly - The Visual Computer, 2023 - Springer
Digital watermarking has attracted increasing attentions as it has been the current solution to copyright protection and content authentication in today's digital transformation, which has …
Aerial photography involves capturing images from aircraft and other flying objects, including Unmanned Aerial Vehicles (UAV). Aerial images are used in many fields and can …
A Daoui, AA Abd El-Latif - Recent Advancements in Multimedia Data …, 2023 - igi-global.com
The use of 1D chaotic maps in multimedia security applications is becoming increasingly attractive due to their advantages, including the high sensitivity to both initial and control …
G Dhevanandhini, G Yamuna - Multimedia Systems, 2021 - Springer
Now, all satellite channels handle high-quality data, including HD video files (1 K, 2 K, and 4 K). High-quality compression software is required to archive and transmit these files …
In a world of seamless connections, where everyone is connected via smart devices (Internet of Things (IoT)). These smart devices constantly exchange personal multimedia …
Y Yu, L Li, Y Lu, X Yan - Security and Communication …, 2020 - Wiley Online Library
Shadow images generated from Shamir's polynomial‐based secret image sharing (SSIS) may leak the original secret image information, which causes a significant risk. The …
A Alanezi, B Abd-El-Atty, H Kolivand… - … and Data Analytics …, 2021 - ieeexplore.ieee.org
Data security and privacy act vital tasks in our daily lives. Traditional cryptosystems may be hacked amidst the growth of quantum resources. Consequently, we need new …