MS Taha, MSM Rahem, MM Hashim… - Multimedia Tools and …, 2022 - Springer
Presently, the design and development of an effective image steganography system are facing several challenges including the low capacity, poor robustness and imperceptibility …
In this modern era, a large amount of multimedia content plays an important role in various fields. For multimedia content, storage space and processing speed are more crucial. As a …
JH Horng, CC Chang, GL Li, WK Lee… - Journal of Healthcare …, 2021 - Wiley Online Library
Medical images carry a lot of important information for making a medical diagnosis. Since the medical images need to be communicated frequently to allow timely and accurate …
S Basu, A Debnath, A Basu, TS Das - Multimedia Tools and Applications, 2022 - Springer
The techniques of data hiding have turned out to be one of the prominent factors to ensure security and confidentiality of the communication network adopting untrustworthy and …
Y Sheng, J Li, X Di, X Li, R Xu - Entropy, 2022 - mdpi.com
Various security threats are encountered when keys are transmitted in public channels. In this paper, we propose an image encryption algorithm based on complex network …
B Ni, W Bi - Multimedia Tools and Applications, 2023 - Springer
Abstract As techniques of Reversible Data Hiding based on Prediction-Error Expansion (PEE) have performed excellent, more attentions have been paid to the studies. Many PEE …
C Zhao, R Ma, Y Xian - International Workshop on Digital Watermarking, 2023 - Springer
With the rapid advancement of cloud computing, great security concern regarding data storage has been brougth forth. This paper proposes a reversible data hiding algorithm for …
With increasing copyright violation cases, watermarking of digital images is a very popular solution for securing online media content. Since some sensitive applications require image …
ACH Chen - Applied Research, 2023 - Wiley Online Library
In recent years, some homomorphic encryption algorithms have been proposed to provide additive homomorphic encryption and multiplicative homomorphic encryption. However …