[图书][B] Secure image transmission in wireless sensor network (WSN) applications

K Shankar, M Elhoseny - 2019 - Springer
Wireless sensor networks (WSN) is a hot research topic since it is being applied in diverse
fields. The recent interesting applications of WSN include target tracking, source localization …

Enhanced security of symmetric encryption using combination of steganography with visual cryptography

SH Murad, AM Gody, TM Barakat - arXiv preprint arXiv:1902.11167, 2019 - arxiv.org
Data security is required when communications over untrusted networks takes place.
Security tools such as cryptography and steganography are applied to achieve such …

A New Scheme for Lossless Meaningful Visual Secret Sharing by using XOR Properties

Z Mehrnahad, AM Latif… - Journal of AI and Data …, 2023 - jad.shahroodut.ac.ir
In this paper, a novel scheme for lossless meaningful visual secret sharing using XOR
properties is presented. In the first step, genetic algorithm with an appropriate proposed …

A new scheme for lossless meaningful visual secret sharing by using XOR properties

A Latif, Z Mehrnahad, JZ Ahmadabadi - 2022 - europepmc.org
In this paper, a new scheme for lossless meaningful visual secret sharing by using XOR
properties is presented. In this method, the input secret image is converted into several …

[PDF][PDF] Visual Cryptography based on dual image watermarking for copyright protection and security using various transforms

B Jagadeesh, K Reddy - International Journal of Engineering and …, 2019 - academia.edu
In this paper, a novel dual image watermarking method is proposed to provide the copyright
protection to digital images. In this proposed method, the lower and higher frequency …

Optimal Stream Encryption for Multiple Shares of Images by Improved Cuckoo Search Model

K Shankar, M Elhoseny, K Shankar… - … Image Transmission in …, 2019 - Springer
Security of the media information such as image and video is one of the fundamental
prerequisites for broadcasting communications and computer systems. Most of image …

A novel secret key exchange mechanism for secure communication and data transfer in symmetric cryptosystems

K Prakasha, R Kalkur, V Acharya, B Muniyal… - Security in Computing …, 2019 - Springer
Secure communication and Secure data transfer are one of the significant challenges in the
era of Internet. With the development in information technology, there arose a need for …