Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (68)
  • Open Access

    REVIEW

    Unveiling the Hidden Pixels: A Comprehensive Exploration of Digital Image Steganography Schemes

    Nagaraj V. Dharwadkar*

    Journal of Information Hiding and Privacy Protection, Vol.7, pp. 1-31, 2025, DOI:10.32604/jihpp.2025.060898 - 27 March 2025

    Abstract Steganography, the art of concealing information within innocuous mediums, has been practiced for centuries and continues to evolve with advances in digital technology. In the modern era, steganography has become an essential complementary tool to cryptography, offering an additional layer of security, stealth, and deniability in digital communications. With the rise of cyber threats such as hacking, malware, and phishing, it is crucial to adopt methods that protect the confidentiality and integrity of data. This review focuses specifically on text-in-image steganography, exploring a range of techniques, including Least Significant Bit (LSB), Pixel Value Differencing (PVD),… More >

  • Open Access

    ARTICLE

    Hybrid Metaheuristic Lion and Firefly Optimization Algorithm with Chaotic Map for Substitution S-Box Design

    Arkan Kh Shakr Sabonchi*

    Journal of Information Hiding and Privacy Protection, Vol.6, pp. 21-45, 2024, DOI:10.32604/jihpp.2024.058954 - 31 December 2024

    Abstract Substitution boxes (S-boxes) are key components of symmetrical cryptosystems, acting as nonlinear substitution functions that hide the relationship between the encrypted text and input key. This confusion mechanism is vital for cryptographic security because it prevents attackers from intercepting the secret key by analyzing the encrypted text. Therefore, the S-box design is essential for the robustness of cryptographic systems, especially for the data encryption standard (DES) and advanced encryption standard (AES). This study focuses on the application of the firefly algorithm (FA) and metaheuristic lion optimization algorithm (LOA), thereby proposing a hybrid approach called the… More >

  • Open Access

    ARTICLE

    Pairwise Reversible Data Hiding for Medical Images with Contrast Enhancement

    Isaac Asare Boateng1,2,*, Lord Amoah2, Isogun Toluwalase Adewale3

    Journal of Information Hiding and Privacy Protection, Vol.6, pp. 1-19, 2024, DOI:10.32604/jihpp.2024.051354 - 24 June 2024

    Abstract Contrast enhancement in medical images has been vital since the prevalence of image representations in healthcare. In this research, the PRDHMCE (pairwise reversible data hiding for medical images with contrast enhancement) algorithm is proposed as an automatic contrast enhancement (CE) method for medical images based on region of interest (ROI) and non-region of interest (NROI). The PRDHMCE algorithm strategically enhances the ROI after segmentation using histogram stretching and data embedding. An initial histogram evaluation compares histogram bins with their neighbours to select the bin with the maximum pixel count. The selected bin is set as More >

  • Open Access

    ARTICLE

    Ensuring Information Security in Electronic Health Record System Using Cryptography and Cuckoo Search Algorithm

    Arkan Kh Shakr Sabonchi1,*, Zainab Hashim Obaid2

    Journal of Information Hiding and Privacy Protection, Vol.5, pp. 1-18, 2023, DOI:10.32604/jihpp.2023.041972 - 07 September 2023

    Abstract In the contemporary era, the abundant availability of health information through internet and mobile technology raises concerns. Safeguarding and maintaining the confidentiality of patients’ medical data becomes paramount when sharing such information with authorized healthcare providers. Although electronic patient records and the internet have facilitated the exchange of medical information among healthcare providers, concerns persist regarding the security of the data. The security of Electronic Health Record Systems (EHRS) can be improved by employing the Cuckoo Search Algorithm (CS), the SHA-256 algorithm, and the Elliptic Curve Cryptography (ECC), as proposed in this study. The suggested… More >

  • Open Access

    REVIEW

    An Overview of Image Tamper Detection

    Xingyu Chen*

    Journal of Information Hiding and Privacy Protection, Vol.4, No.2, pp. 103-113, 2022, DOI:10.32604/jihpp.2022.039766 - 17 April 2023

    Abstract With the popularization of high-performance electronic imaging equipment and the wide application of digital image editing software, the threshold of digital image editing becomes lower and lower. This makes it easy to trick the human visual system with professionally altered images. These tampered images have brought serious threats to many fields, including personal privacy, news communication, judicial evidence collection, information security and so on. Therefore, the security and reliability of digital information has been increasingly concerned by the international community. In this paper, digital image tamper detection methods are classified according to the clues that More >

  • Open Access

    REVIEW

    An Overview of Double JPEG Compression Detection and Anti-detection

    Kun Wan*

    Journal of Information Hiding and Privacy Protection, Vol.4, No.2, pp. 89-101, 2022, DOI:10.32604/jihpp.2022.039764 - 17 April 2023

    Abstract JPEG (Joint Image Experts Group) is currently the most widely used image format on the Internet. Existing cases show that many tampering operations occur on JPEG images. The basic process of the operation is that the JPEG file is first decompressed, modified in the null field, and then the tampered image is compressed and saved in JPEG format, so that the tampered image may be compressed several times. Therefore, the double compression detection of JPEG images can be an important part for determining whether an image has been tampered with, and the study of double More >

  • Open Access

    REVIEW

    A Survey of GAN Based Image Synthesis

    Jiahe Ni*

    Journal of Information Hiding and Privacy Protection, Vol.4, No.2, pp. 79-88, 2022, DOI:10.32604/jihpp.2022.039751 - 17 April 2023

    Abstract Image generation is a hot topic in the academic recently, and has been applied to AI drawing, which can bring Vivid AI paintings without labor costs. In image generation, we represent the image as a random vector, assuming that the images of the natural scene obey an unknown distribution, we hope to estimate its distribution through some observation samples. Especially, with the development of GAN (Generative Adversarial Network), The generator and discriminator improve the model capability through adversarial, the quality of the generated image is also increasing. The image quality generated by the existing GAN More >

  • Open Access

    REVIEW

    A Survey of Privacy Preservation for Deep Learning Applications

    Ling Zhang1,*, Lina Nie1, Leyan Yu2

    Journal of Information Hiding and Privacy Protection, Vol.4, No.2, pp. 69-78, 2022, DOI:10.32604/jihpp.2022.039284 - 17 April 2023

    Abstract Deep learning is widely used in artificial intelligence fields such as computer vision, natural language recognition, and intelligent robots. With the development of deep learning, people’s expectations for this technology are increasing daily. Enterprises and individuals usually need a lot of computing power to support the practical work of deep learning technology. Many cloud service providers provide and deploy cloud computing environments. However, there are severe risks of privacy leakage when transferring data to cloud service providers and using data for model training, which makes users unable to use deep learning technology in cloud computing More >

  • Open Access

    ARTICLE

    Video Compressed Sensing Reconstruction Based on Multi-Dimensional Reference Frame Multi Hypothesis Rediction

    Hua Li1,*, Yuchen Yue2, Jianhua Luo3

    Journal of Information Hiding and Privacy Protection, Vol.4, No.2, pp. 61-68, 2022, DOI:10.32604/jihpp.2022.027692 - 17 April 2023

    Abstract In this paper, a video compressed sensing reconstruction algorithm based on multidimensional reference frames is proposed using the sparse characteristics of video signals in different sparse representation domains. First, the overall structure of the proposed video compressed sensing algorithm is introduced in this paper. The paper adopts a multi-reference frame bidirectional prediction hypothesis optimization algorithm. Then, the paper proposes a reconstruction method for CS frames at the re-decoding end. In addition to using key frames of each GOP reconstructed in the time domain as reference frames for reconstructing CS frames, half-pixel reference frames and scaled More >

  • Open Access

    ARTICLE

    Conceptual Modeling and Simulation Application Analysis of In-service Assessment

    Jian-Hua Luo1, Xi Chen1,*, Hua Li1, Yu-Hang Zhou1, Jing-Wen Li2

    Journal of Information Hiding and Privacy Protection, Vol.4, No.1, pp. 53-60, 2022, DOI:10.32604/jihpp.2022.032109 - 17 June 2022

    Abstract Firstly, this paper expounds the conceptual connotation of in-service assessment in the new system, then applies modeling and Simulation in the field of in-service assessment, establishes the conceptual model of in-service assessment and its process, and finally analyzes the application of modeling and simulation in the specific links of in-service assessment. More >

Displaying 1-10 on page 1 of 68. Per Page