As a pivotal advance in the field of information security, steganography holds a crucial place in concealing sensitive information. It is the technique of hiding secret data within a digital …
This paper analyses and rectifies the shortcomings of reversible contrast mapping (RCM) algorithm for invisible watermarking. The proposed corrected RCM algorithm is tested by …
S Das, AK Sunaniya - Microprocessors and Microsystems, 2022 - Elsevier
In the digitally dominated world, to enhance the data security of digital images, this paper proposes a hybrid algorithm. The algorithm enhances quality metrics and simultaneously …
This paper presents an improved reversible contrast mapping (RCM) algorithm for reversible invisible watermarking (RIW) in both software and hardware platforms. Based on well-known …
This paper deals with the design of a new four-dimensional two-scroll hyperchaos dynamical system with three quadratic non-linear terms. The new two-scroll dynamical …
R Kaibou, MS Azzaz - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
In this article, a hardware implementation of an invisible watermarking system has been proposed using Cyclone IV-E'EP4CE115F29C7'FPGA board of ALTERA company …
A Phadikar, H Mandal, TL Chiu - Multimedia Tools and Applications, 2020 - Springer
This paper proposes a data-hiding scheme for quality access control of digital images using quantization index modulation (QIM) and its hardware implementation. To achieve the goal …
L Wang, H Zhang, X Hua… - 2021 IEEE 15th …, 2021 - ieeexplore.ieee.org
With the continuous development of noise reduction technology for ships, submarines, and other equipment, the acoustic and magnetic noise signals radiated by underwater targets …
GK Maity, P Jana, H Mandal, TL Chiu - Microsystem Technologies, 2019 - Springer
A lifting based reversible data hiding is introduced here. The low–high subband is subdivided into little blocks of size (4× 4), to generate a content dependent watermark. Then …