Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (40)
  • Open Access

    ARTICLE

    A Steganography Based on Optimal Multi-Threshold Block Labeling

    Shuying Xu1, Chin-Chen Chang1, Ji-Hwei Horng2,*

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 721-739, 2023, DOI:10.32604/csse.2023.026046

    Abstract Hiding secret data in digital images is one of the major research fields in information security. Recently, reversible data hiding in encrypted images has attracted extensive attention due to the emergence of cloud services. This paper proposes a novel reversible data hiding method in encrypted images based on an optimal multi-threshold block labeling technique (OMTBL-RDHEI). In our scheme, the content owner encrypts the cover image with block permutation, pixel permutation, and stream cipher, which preserve the in-block correlation of pixel values. After uploading to the cloud service, the data hider applies the prediction error rearrangement (PER), the optimal threshold selection… More >

  • Open Access

    ARTICLE

    Adaptive Particle Swarm Optimization Data Hiding for High Security Secret Image Sharing

    S. Lakshmi Narayanan*

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 931-946, 2022, DOI:10.32604/csse.2022.022459

    Abstract The main aim of this work is to improve the security of data hiding for secret image sharing. The privacy and security of digital information have become a primary concern nowadays due to the enormous usage of digital technology. The security and the privacy of users’ images are ensured through reversible data hiding techniques. The efficiency of the existing data hiding techniques did not provide optimum performance with multiple end nodes. These issues are solved by using Separable Data Hiding and Adaptive Particle Swarm Optimization (SDHAPSO) algorithm to attain optimal performance. Image encryption, data embedding, data extraction/image recovery are the… More >

  • Open Access

    ARTICLE

    Secured Medical Data Transfer Using Reverse Data Hiding System Through Steganography

    S. Aiswarya*, R. Gomathi

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 969-982, 2022, DOI:10.32604/iasc.2022.025475

    Abstract Reversible Data Hiding (RDH) is the process of transferring secret data hidden inside cover media to the recipient so the recipient can securely retrieve both the secret data and cover media. The RDH approach is applied in this study in the field of telemedicine, and medical-secret data is conveyed privately via medical cover video. Morse code-based data encryption technique tends to encrypt the medical-secret data by compression using the Arithmetic coding technique. Discrete Shearlet transform (DST) compresses the selected frame from the medical cover video and the compressed secret data is embedded into the compressed frame using logical operations. On… More >

  • Open Access

    ARTICLE

    Reversible Data Hiding in Encrypted Images Based on Adaptive Prediction-error Label Map

    Yu Ren1, Jiaohua Qin1,*, Yun Tan1, Neal N. Xiong2

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1439-1453, 2022, DOI:10.32604/iasc.2022.025485

    Abstract In the field of reversible data hiding in encrypted images (RDH-EI), predict an image effectively and embed a message into the image with lower distortion are two crucial aspects. However, due to the linear regression prediction being sensitive to outliers, it is a challenge to improve the accuracy of predictions. To address this problem, this paper proposes an RDH-EI scheme based on adaptive prediction-error label map. In the prediction stage, an adaptive threshold estimation algorithm based on local complexity is proposed. Then, the pixels selection method based on gradient of image is designed to train the parameters of the prediction… More >

  • Open Access

    ARTICLE

    Encryption with Image Steganography Based Data Hiding Technique in IIoT Environment

    Mahmoud Ragab1,2,3,*, Samah Alshehri4, Hani A. Alhadrami5,6,7, Faris Kateb1, Ehab Bahaudien Ashary8, S. Abdel-khalek9,10

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1323-1338, 2022, DOI:10.32604/cmc.2022.024775

    Abstract Rapid advancements of the Industrial Internet of Things (IIoT) and artificial intelligence (AI) pose serious security issues by revealing secret data. Therefore, security data becomes a crucial issue in IIoT communication where secrecy needs to be guaranteed in real time. Practically, AI techniques can be utilized to design image steganographic techniques in IIoT. In addition, encryption techniques act as an important role to save the actual information generated from the IIoT devices to avoid unauthorized access. In order to accomplish secure data transmission in IIoT environment, this study presents novel encryption with image steganography based data hiding technique (EIS-DHT) for… More >

  • Open Access

    ARTICLE

    Data Hiding in AMBTC Images Using Selective XOR Hiding Scheme

    Yung-Yao Chen1,*, Yu-Chen Hu2, Ting-Kai Yang3, You-An Wang3

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5167-5182, 2022, DOI:10.32604/cmc.2022.023993

    Abstract Nowadays since the Internet is ubiquitous, the frequency of data transfer through the public network is increasing. Hiding secure data in these transmitted data has emerged broad security issue, such as authentication and copyright protection. On the other hand, considering the transmission efficiency issue, image transmission usually involves image compression in Internet-based applications. To address both issues, this paper presents a data hiding scheme for the image compression method called absolute moment block truncation coding (AMBTC). First, an image is divided into non-overlapping blocks through AMBTC compression, the blocks are classified four types, namely smooth, semi-smooth, semi-complex, and complex. The… More >

  • Open Access

    ARTICLE

    A QR Data Hiding Method Based on Redundant Region and BCH

    Ying Zhou*, Weiwei Luo

    Journal on Big Data, Vol.3, No.3, pp. 127-133, 2021, DOI:10.32604/jbd.2021.019236

    Abstract In recent years, QR code has been widely used in the Internet and mobile devices. It is based on open standards and easy to generate a code, which lead to that anyone can generate their own QR code. Because the QR code does not have the ability of information hiding, any device can access the content in QR code. Thus, hiding the secret data in QR code becomes a hot topic. Previously, the information hiding methods based on QR code all use the way of information hiding based on image, mostly using digital watermarking technology, and not using the coding… More >

  • Open Access

    ARTICLE

    DAMFO-Based Optimal Path Selection and Data Aggregation in WSN

    S. Sudha Mercy1,*, J. M. Mathana2, J. S. Leena Jasmine3

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 589-604, 2022, DOI:10.32604/iasc.2022.021068

    Abstract Wireless Sensor Network (WSN) encompasses several tiny devices termed as Sensor Nodes (SN) that have restriction in resources with lower energy, memory, together with computation. Data Aggregation (DA) is required to optimize WSN for secured data transmission at Cluster Head (CH) together with Base Station (BS). With regard to the Energy Efficiency (EE) along with the privacy conservation requirements of WSN in big-data processing and aggregation, this paper proposed Diversity centered Adaptive Moth-Flame Optimization (DAMFO) for Optimal Path Selection (OPS) and DA in WSN. In the proposed work, initially, the Trust Evaluation (TE) process is performed. The Pompeiu Distance-centered Fuzzy… More >

  • Open Access

    ARTICLE

    A Reversible Data Hiding Algorithm Based on Secret Sharing

    Xin Jin*, Lanxin Su, Jitao Huang

    Journal of Information Hiding and Privacy Protection, Vol.3, No.2, pp. 69-82, 2021, DOI:10.32604/jihpp.2021.014108

    Abstract In traditional secret sharing schemes, all shared images containing secret segments are needed to recover secret information. In this paper, a reversible data hiding scheme based on Shamir secret sharing is used. Secret information can be recovered even if only part of the encrypted sharing is owned. This method can reduce the vulnerability of traditional encryption sharing schemes to attack. Before uploading the secret information to the cloud server, embed the encrypted n segments of secret information into n different pictures. The receiver downloads t images from the cloud server (t < n), extracts the encrypted information using the watermark… More >

  • Open Access

    ARTICLE

    Reversible Data Hiding Based on Varying Radix Numeral System

    J. Hemalatha1, S. Geetha2, R. Geetha3, C. Balasubramanian4, Daniela Elena Popescu5, D. Jude Hemanth6,*

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 283-300, 2021, DOI:10.32604/cmc.2021.017203

    Abstract A novel image reversible data-hiding scheme based on primitive and varying radix numerical model is presented in this article. Using varying radix, variable sum of data may be embedded in various pixels of images. This scheme is made adaptive using the correlation of the neighboring pixels. Messages are embedded as blocks of non-uniform length in the high-frequency regions of the rhombus mean interpolated image. A higher amount of data is embedded in the high-frequency regions and lesser data in the low-frequency regions of the image. The size of the embedded data depends on the statistics of the pixel distribution in… More >

Displaying 11-20 on page 2 of 40. Per Page