Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (70)
  • Open Access

    ARTICLE

    A New Generative Mathematical Model for Coverless Steganography System Based on Image Generation

    Al-Hussien Seddik1, Mohammed Salah2, Gamal Behery2, Ahmed El-harby2, Ahmed Ismail Ebada2, Sokea Teng3, Yunyoung Nam3,*, Mohamed Abouhawwash4,5

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5087-5103, 2023, DOI:10.32604/cmc.2023.035364

    Abstract The ability of any steganography system to correctly retrieve the secret message is the primary criterion for measuring its efficiency. Recently, researchers have tried to generate a new natural image driven from only the secret message bits rather than using a cover to embed the secret message within it; this is called the stego image. This paper proposes a new secured coverless steganography system using a generative mathematical model based on semi Quick Response (QR) code and maze game image generation. This system consists of two components. The first component contains two processes, encryption process, and hiding process. The encryption… More >

  • Open Access

    ARTICLE

    Optimal Deep Learning Model Enabled Secure UAV Classification for Industry 4.0

    Khalid A. Alissa1, Mohammed Maray2, Areej A. Malibari3, Sana Alazwari4, Hamed Alqahtani5, Mohamed K. Nour6, Marwa Obbaya7, Mohamed A. Shamseldin8, Mesfer Al Duhayyim9,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5349-5367, 2023, DOI:10.32604/cmc.2023.033532

    Abstract Emerging technologies such as edge computing, Internet of Things (IoT), 5G networks, big data, Artificial Intelligence (AI), and Unmanned Aerial Vehicles (UAVs) empower, Industry 4.0, with a progressive production methodology that shows attention to the interaction between machine and human beings. In the literature, various authors have focused on resolving security problems in UAV communication to provide safety for vital applications. The current research article presents a Circle Search Optimization with Deep Learning Enabled Secure UAV Classification (CSODL-SUAVC) model for Industry 4.0 environment. The suggested CSODL-SUAVC methodology is aimed at accomplishing two core objectives such as secure communication via image… More >

  • Open Access

    ARTICLE

    Improved Video Steganography with Dual Cover Medium, DNA and Complex Frames

    Asma Sajjad1, Humaira Ashraf1, NZ Jhanjhi2,3,*, Mamoona Humayun4, Mehedi Masud5, Mohammed A. AlZain6

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3881-3898, 2023, DOI:10.32604/cmc.2023.030197

    Abstract The most valuable resource on the planet is no longer oil, but data. The transmission of this data securely over the internet is another challenge that comes with its ever-increasing value. In order to transmit sensitive information securely, researchers are combining robust cryptography and steganographic approaches. The objective of this research is to introduce a more secure method of video steganography by using Deoxyribonucleic acid (DNA) for embedding encrypted data and an intelligent frame selection algorithm to improve video imperceptibility. In the previous approach, DNA was used only for frame selection. If this DNA is compromised, then our frames with… More >

  • Open Access

    ARTICLE

    Proposed Privacy Preservation Technique for Color Medical Images

    Walid El-Shafai1,2, Hayam A. Abd El-Hameed3, Noha A. El-Hag4, Ashraf A. M. Khalaf3, Naglaa F. Soliman5, Hussah Nasser AlEisa6,*, Fathi E. Abd El-Samie1

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 719-732, 2023, DOI:10.32604/iasc.2023.031079

    Abstract Nowadays, the security of images or information is very important. This paper introduces a proposed hybrid watermarking and encryption technique for increasing medical image security. First, the secret medical image is encrypted using Advanced Encryption Standard (AES) algorithm. Then, the secret report of the patient is embedded into the encrypted secret medical image with the Least Significant Bit (LSB) watermarking algorithm. After that, the encrypted secret medical image with the secret report is concealed in a cover medical image, using Kekre’s Median Codebook Generation (KMCG) algorithm. Afterwards, the stego-image obtained is split into 16 parts. Finally, it is sent to… More >

  • Open Access

    ARTICLE

    An Enhanced Graphical Authentication Scheme Using Multiple-Image Steganography

    Khalil Hamdi Ateyeh Al-Shqeerat*

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2095-2107, 2023, DOI:10.32604/csse.2023.028975

    Abstract Most remote systems require user authentication to access resources. Text-based passwords are still widely used as a standard method of user authentication. Although conventional text-based passwords are rather hard to remember, users often write their passwords down in order to compromise security. One of the most complex challenges users may face is posting sensitive data on external data centers that are accessible to others and do not be controlled directly by users. Graphical user authentication methods have recently been proposed to verify the user identity. However, the fundamental limitation of a graphical password is that it must have a colorful… More >

  • Open Access

    ARTICLE

    A Steganography Based on Optimal Multi-Threshold Block Labeling

    Shuying Xu1, Chin-Chen Chang1, Ji-Hwei Horng2,*

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 721-739, 2023, DOI:10.32604/csse.2023.026046

    Abstract Hiding secret data in digital images is one of the major research fields in information security. Recently, reversible data hiding in encrypted images has attracted extensive attention due to the emergence of cloud services. This paper proposes a novel reversible data hiding method in encrypted images based on an optimal multi-threshold block labeling technique (OMTBL-RDHEI). In our scheme, the content owner encrypts the cover image with block permutation, pixel permutation, and stream cipher, which preserve the in-block correlation of pixel values. After uploading to the cloud service, the data hider applies the prediction error rearrangement (PER), the optimal threshold selection… More >

  • Open Access

    ARTICLE

    Image Steganography Using Deep Neural Networks

    Kavitha Chinniyan*, Thamil Vani Samiyappan, Aishvarya Gopu, Narmatha Ramasamy

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1877-1891, 2022, DOI:10.32604/iasc.2022.027274

    Abstract Steganography is the technique of hiding secret data within ordinary data by modifying pixel values which appear normal to a casual observer. Steganography which is similar to cryptography helps in secret communication. The cryptography method focuses on the authenticity and integrity of the messages by hiding the contents of the messages. Sometimes, it is not only just enough to encrypt the message but also essential to hide the existence of the message itself. As this avoids misuse of data, this kind of encryption is less suspicious and does not catch attention. To achieve this, Stacked Autoencoder model is developed which… More >

  • Open Access

    ARTICLE

    Coverless Video Steganography Based on Frame Sequence Perceptual Distance Mapping

    Runze Li1, Jiaohua Qin1,*, Yun Tan1, Neal N. Xiong2

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1571-1583, 2022, DOI:10.32604/cmc.2022.029378

    Abstract Most existing coverless video steganography algorithms use a particular video frame for information hiding. These methods do not reflect the unique sequential features of video carriers that are different from image and have poor robustness. We propose a coverless video steganography method based on frame sequence perceptual distance mapping. In this method, we introduce Learned Perceptual Image Patch Similarity (LPIPS) to quantify the similarity between consecutive video frames to obtain the sequential features of the video. Then we establish the relationship map between features and the hash sequence for information hiding. In addition, the MongoDB database is used to store… More >

  • Open Access

    ARTICLE

    An Animated GIF Steganography Using Variable Block Partition Scheme

    Maram Abdullah M. Alyahya1, Arshiya S. Ansari1,*, Mohammad Sajid Mohammadi2

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 897-914, 2022, DOI:10.32604/csse.2022.023904

    Abstract The paper presents a novel Graphics Interchange Format (GIF) Steganography system. The algorithm uses an animated (GIF) file format video to apply on, a secured and variable image partition scheme for data embedding. The secret data could be any character text, any image, an audio file, or a video file; that is converted in the form of bits. The proposed method uses a variable partition scheme structure for data embedding in the (GIF) file format video. The algorithm estimates the capacity of the cover (GIF) image frames to embed data bits. Our method built variable partition blocks in an empty… More >

  • Open Access

    ARTICLE

    Secured Medical Data Transfer Using Reverse Data Hiding System Through Steganography

    S. Aiswarya*, R. Gomathi

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 969-982, 2022, DOI:10.32604/iasc.2022.025475

    Abstract Reversible Data Hiding (RDH) is the process of transferring secret data hidden inside cover media to the recipient so the recipient can securely retrieve both the secret data and cover media. The RDH approach is applied in this study in the field of telemedicine, and medical-secret data is conveyed privately via medical cover video. Morse code-based data encryption technique tends to encrypt the medical-secret data by compression using the Arithmetic coding technique. Discrete Shearlet transform (DST) compresses the selected frame from the medical cover video and the compressed secret data is embedded into the compressed frame using logical operations. On… More >

Displaying 11-20 on page 2 of 70. Per Page