Asynchronous updating Boolean network encryption algorithm

S Gao, R Wu, X Wang, J Liu, Q Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
An asynchronous updating Boolean network is employed to simulate and analyze the gene
expression of a particular tissue or species, revealing the life activity process from a system …

A survey on reversible data hiding for uncompressed images

C Zhang, B Ou, F Peng, Y Zhao, K Li - ACM Computing Surveys, 2024 - dl.acm.org
Reversible data hiding (RDH) has developed various theories and algorithms since the
early 1990s. The existing works involve a large amount of specialized knowledge, making it …

Reversible data hiding over encrypted images via preprocessing-free matrix secret sharing

Z Hua, X Liu, Y Zheng, S Yi… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Cloud service is a natural choice to store and manage the exponentially produced images.
Data privacy is one of the most concerned points in cloud-based image services. Reversible …

Adaptive embedding combining LBE and IBBE for high-capacity reversible data hiding in encrypted images

Z Fu, X Chai, Z Tang, X He, Z Gan, G Cao - Signal Processing, 2024 - Elsevier
Reversible data hiding in encrypted image (RDHEI) has received wide attention as an
effective information protection technique, and most of the existing RDHEI schemes …

Noise-free thumbnail-preserving image encryption based on MSB prediction

Z Ye, R Zhao, Y Zhang, X Xiao, R Lan, Y Xiang - Information Sciences, 2022 - Elsevier
People are increasingly storing their images on the cloud as cloud storage grows in
popularity, delivering a variety of benefits. However, the associated privacy concern may …

Exploiting one-dimensional improved Chebyshev chaotic system and partitioned diffusion based on the divide-and-conquer principle for 3D medical model encryption

Y Lu, M Gong, Z Gan, X Chai, L Cao, B Wang - Chaos, Solitons & Fractals, 2023 - Elsevier
As the digital age progresses, 3D models have become increasingly popular in various
fields, such as medicine, engineering, and the metaverse. One of the main benefits of using …

Reversible data hiding in encrypted images with secret sharing and hybrid coding

C Yu, X Zhang, C Qin, Z Tang - IEEE Transactions on Circuits …, 2023 - ieeexplore.ieee.org
Reversible data hiding in encrypted images (RDHEI) is an essential data security technique.
Most RDHEI methods cannot perform well in embedding capacity and security. To address …

Reversible data hiding in encrypted images using global compression of zero-valued high bit-planes and block rearrangement

Y Yao, K Wang, Q Chang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Recently, reversible data hiding in encrypted images (RDHEI) has received widespread
attention from researchers. To embed high payload into encrypted images while maintaining …

Enabling large-capacity reversible data hiding over encrypted JPEG bitstreams

Z Hua, Z Wang, Y Zheng, Y Chen… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Cloud computing offers advantages in handling the exponential growth of images but also
entails privacy concerns on outsourced private images. Reversible data hiding (RDH) over …

Challenging channels: Encrypted covert channels within challenge-response authentication

T Schmidbauer, J Keller, S Wendzel - Proceedings of the 17th …, 2022 - dl.acm.org
Challenge-response authentication is an essential and omnipresent network service. Thus,
it is a lucrative target for attackers to transport covert information. We present two covert …