Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (70)
  • Open Access

    ARTICLE

    A Steganography Model Data Protection Method Based on Scrambling Encryption

    Xintao Duan1,*, Zhiqiang Shao1, Wenxin Wang1, En Zhang1, Dongli Yue1, Chuan Qin2, Haewoon Nam3

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5363-5375, 2022, DOI:10.32604/cmc.2022.027807

    Abstract At present, the image steganography method based on CNN has achieved good results. The trained model and its parameters are of great value. Once leaked, the secret image will be exposed. To protect the security of steganographic network model parameters in the transmission process, an idea based on network model parameter scrambling is proposed in this paper. Firstly, the sender trains the steganography network and extraction network, encrypts the extraction network parameters with the key shared by the sender and the receiver, then sends the extraction network and parameters to the receiver through the public channel, and the receiver recovers… More >

  • Open Access

    ARTICLE

    Competitive Swarm Optimization with Encryption Based Steganography for Digital Image Security

    Ala’ A. Eshmawi1, Suliman A. Alsuhibany2, Sayed Abdel-Khalek3, Romany F. Mansour4,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 4173-4184, 2022, DOI:10.32604/cmc.2022.028008

    Abstract Digital image security is a fundamental and tedious process on shared communication channels. Several methods have been employed for accomplishing security on digital image transmission, such as encryption, steganography, and watermarking. Image stenography and encryption are commonly used models to achieve improved security. Besides, optimal pixel selection process (OPSP) acts as a vital role in the encryption process. With this motivation, this study designs a new competitive swarm optimization with encryption based stenographic technique for digital image security, named CSOES-DIS technique. The proposed CSOES-DIS model aims to encrypt the secret image prior to the embedding process. In addition, the CSOES-DIS… More >

  • Open Access

    ARTICLE

    Cost and Efficiency Analysis of Steganography in the IEEE 802.11ah IoT Protocol

    Akram A. Almohammedi1,2,*, Vladimir Shepelev1, Sam Darshi3, Mohammed Balfaqih4, Fayad Ghawbar5

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3929-3943, 2022, DOI:10.32604/cmc.2022.026307

    Abstract The widespread use of the Internet of Things (IoT) applications has enormously increased the danger level of data leakage and theft in IoT as data transmission occurs through a public channel. As a result, the security of the IoT has become a serious challenge in the field of information security. Steganography on the network is a critical tool for preventing the leakage of private information and enabling secure and encrypted communication. The primary purpose of steganography is to conceal sensitive information in any form of media such as audio, video, text, or photos, and securely transfer it through wireless networks.… More >

  • Open Access

    ARTICLE

    Reversible Video Steganography Using Quick Response Codes and Modified ElGamal Cryptosystem

    Ramadhan J. Mstafa1,2,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3349-3368, 2022, DOI:10.32604/cmc.2022.025791

    Abstract The rapid transmission of multimedia information has been achieved mainly by recent advancements in the Internet's speed and information technology. In spite of this, advancements in technology have resulted in breaches of privacy and data security. When it comes to protecting private information in today's Internet era, digital steganography is vital. Many academics are interested in digital video because it has a great capability for concealing important data. There have been a vast number of video steganography solutions developed lately to guard against the theft of confidential data. The visual imperceptibility, robustness, and embedding capacity of these approaches are all… More >

  • Open Access

    ARTICLE

    DWT-SVD Based Image Steganography Using Threshold Value Encryption Method

    Jyoti Khandelwal1, Vijay Kumar Sharma1, Dilbag Singh2,*, Atef Zaguia3

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3299-3312, 2022, DOI:10.32604/cmc.2022.023116

    Abstract Digital image steganography technique based on hiding the secret data behind of cover image in such a way that it is not detected by the human visual system. This paper presents an image scrambling method that is very useful for grayscale secret images. In this method, the secret image decomposes in three parts based on the pixel's threshold value. The division of the color image into three parts is very easy based on the color channel but in the grayscale image, it is difficult to implement. The proposed image scrambling method is implemented in image steganography using discrete wavelet transform… More >

  • Open Access

    ARTICLE

    Encryption with Image Steganography Based Data Hiding Technique in IIoT Environment

    Mahmoud Ragab1,2,3,*, Samah Alshehri4, Hani A. Alhadrami5,6,7, Faris Kateb1, Ehab Bahaudien Ashary8, S. Abdel-khalek9,10

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1323-1338, 2022, DOI:10.32604/cmc.2022.024775

    Abstract Rapid advancements of the Industrial Internet of Things (IIoT) and artificial intelligence (AI) pose serious security issues by revealing secret data. Therefore, security data becomes a crucial issue in IIoT communication where secrecy needs to be guaranteed in real time. Practically, AI techniques can be utilized to design image steganographic techniques in IIoT. In addition, encryption techniques act as an important role to save the actual information generated from the IIoT devices to avoid unauthorized access. In order to accomplish secure data transmission in IIoT environment, this study presents novel encryption with image steganography based data hiding technique (EIS-DHT) for… More >

  • Open Access

    ARTICLE

    An Improved Optimized Model for Invisible Backdoor Attack Creation Using Steganography

    Daniyal M. Alghazzawi1, Osama Bassam J. Rabie1, Surbhi Bhatia2, Syed Hamid Hasan1,*

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1173-1193, 2022, DOI:10.32604/cmc.2022.022748

    Abstract The Deep Neural Networks (DNN) training process is widely affected by backdoor attacks. The backdoor attack is excellent at concealing its identity in the DNN by performing well on regular samples and displaying malicious behavior with data poisoning triggers. The state-of-art backdoor attacks mainly follow a certain assumption that the trigger is sample-agnostic and different poisoned samples use the same trigger. To overcome this problem, in this work we are creating a backdoor attack to check their strength to withstand complex defense strategies, and in order to achieve this objective, we are developing an improved Convolutional Neural Network (ICNN) model… More >

  • Open Access

    ARTICLE

    Pixel Based Steganography for Secure Information Hiding

    N. Shyla*, K. Kalimuthu

    Journal of Information Hiding and Privacy Protection, Vol.3, No.3, pp. 143-149, 2021, DOI:10.32604/jihpp.2021.026760

    Abstract The term “steganography” is derived from the Greek words steganos, which means “verified, concealed, or guaranteed”, and graphein, which means “writing”. The primary motivation for considering steganography is to prevent unapproved individuals from obtaining disguised data. With the ultimate goal of comprehending the fundamental inspiration driving the steganography procedures, there should be no significant change in the example report. The Least Significant Bit (LSB) system, which is one of the methodologies for concealing propelled picture data, is examined in this assessment. In this evaluation, another procedure for data stowing indefinitely is proposed with the ultimate goal of limiting the progressions… More >

  • Open Access

    ARTICLE

    Quantum Steganography Application in the Electrical Network for Quantum Image and Watermark with Self-Adaptive

    Jie Shen1,3,*,#, Wenqi Dong2,#, Jing Wang1,2,3,#, Yang Wang1, Haiyan Li4

    Journal of Information Hiding and Privacy Protection, Vol.3, No.3, pp. 109-120, 2021, DOI:10.32604/jihpp.2021.025602

    Abstract With the development of Globe Energy Internet, quantum steganography has been used for information hiding to improve copyright protection. Based on secure quantum communication protocol, and flexible steganography, secret information is embedded in quantum images in covert communication. Under the premise of guaranteeing the quality of the quantum image, the secret information is transmitted safely with virtue of good imperceptibility. A novel quantum watermark algorithm is proposed in the paper, based on the shared group key value of the communication parties and the transmission of the selected carrier map pixel gray higher than 8 bits. According to the shared group… More >

  • Open Access

    ARTICLE

    Medical Image Transmission Using Novel Crypto-Compression Scheme

    Arwa Mashat1, Surbhi Bhatia2,*, Ankit Kumar3, Pankaj Dadheech3, Aliaa Alabdali4

    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 841-857, 2022, DOI:10.32604/iasc.2022.021636

    Abstract The transmission of medical records over indiscrete and open networks has caused an increase in fraud involving stealing patients’ information, owing to a lack of security over these links. An individual’s medical documents represent confidential information that demands strict protocols and security, chiefly to protect the individual’s identity. Medical image protection is a technology intended to transmit digital data and medical images securely over public networks. This paper presents some background on the different methods used to provide authentication and protection in medical information security. This work develops a secure cryptography-based medical image reclamation algorithm based on a combination of… More >

Displaying 21-30 on page 3 of 70. Per Page