A comprehensive survey of covert communication techniques, limitations and future challenges

I Makhdoom, M Abolhasan, J Lipman - Computers & Security, 2022 - Elsevier
Data encryption aims to protect the confidentiality of data at storage, during transmission, or
while in processing. However, it is not always the optimum choice as attackers know the …

Digital image steganography and steganalysis: A journey of the past three decades

AK Sahu, M Sahu - Open Computer Science, 2020 - degruyter.com
Steganography is the science and art of covert communication. Conversely, steganalysis is
the study of uncovering the steganographic process. The evolution of steganography has …

Image steganography in spatial domain: A survey

M Hussain, AWA Wahab, YIB Idris, ATS Ho… - Signal Processing: Image …, 2018 - Elsevier
This paper presents a literature review of image steganography techniques in the spatial
domain for last 5 years. The research community has already done lots of noteworthy …

Secure medical data transmission model for IoT-based healthcare systems

M Elhoseny, G Ramírez-González… - Ieee …, 2018 - ieeexplore.ieee.org
Due to the significant advancement of the Internet of Things (IoT) in the healthcare sector,
the security, and the integrity of the medical data became big challenges for healthcare …

Secure surveillance framework for IoT systems using probabilistic image encryption

K Muhammad, R Hamza, J Ahmad… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
This paper proposes a secure surveillance framework for Internet of things (IoT) systems by
intelligent integration of video summarization and image encryption. First, an efficient video …

Secure and robust digital image watermarking using coefficient differencing and chaotic encryption

NA Loan, NN Hurrah, SA Parah, JW Lee… - IEEE …, 2018 - ieeexplore.ieee.org
This paper presents a chaotic encryption-based blind digital image watermarking technique
applicable to both grayscale and color images. Discrete cosine transform (DCT) is used …

Dynamic improved pixel value ordering reversible data hiding

S Weng, YQ Shi, W Hong, Y Yao - Information Sciences, 2019 - Elsevier
The existing reversible data hiding (RDH) methods based on improved pixel value ordering
(IPVO) use only a small portion of the pixels (eg, at most six pixels) in a block for embedding …

Enhancing speed of SIMON: A light-weight-cryptographic algorithm for IoT applications

N Alassaf, A Gutub, SA Parah, M Al Ghamdi - Multimedia Tools and …, 2019 - Springer
Multimedia communication is revolutionizing all major spheres of human life. The advent of
IoT and its applications in many fields like sensing, healthcare and industry, result …

A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC

RJ Mstafa, KM Elleithy, E Abdelfattah - IEEE access, 2017 - ieeexplore.ieee.org
Over the past few decades, the art of secretly embedding and communicating digital data
has gained enormous attention because of the technological development in both digital …

CNN-based anti-spoofing two-tier multi-factor authentication system

M Sajjad, S Khan, T Hussain, K Muhammad… - Pattern Recognition …, 2019 - Elsevier
Many hybrid and multimodal biometric recognition techniques have been presented to
provide secure and authentic systems, incorporating both soft and hard biometric schemes …