Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2017 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-017-5446-7
Abstract: Reversible information hiding plays an important roles in the field of privacy protection. In this paper, a new reversible information hiding scheme is proposed which supports the direct operation in homomorphic encrypted domain. The proposed…
read more here.
Keywords:
scheme;
reversible information;
integrity authentication;
information hiding ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-018-6444-0
Abstract: In traditional information hiding methods, the secret information is embedded into the carriers, which will inevitably leave traces of modification on the carriers. In those methods, the modified images can be easily detected by some…
read more here.
Keywords:
hiding method;
information;
information hiding;
novel coverless ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-020-09610-1
Abstract: Due to exponential technological advancement, secure transmission of multimedia content is a serious challenge. These days, securing and hiding digital information most efficiently is the focus of the digital computer world. Information confidentiality and information…
read more here.
Keywords:
information;
information hiding;
confidentiality;
scheme ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2021 at "Chemical Engineering Journal"
DOI: 10.1016/j.cej.2021.131293
Abstract: Abstract Protecting the confidential information by hiding its existence exhibits great security. To achieve this, the materials showing several distinct luminescent states upon continuous external stimuli are eagerly anticipated because they can provide pseudo-information to…
read more here.
Keywords:
luminescent;
information hiding;
luminescence;
typed carbazole ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "Optics and Lasers in Engineering"
DOI: 10.1016/j.optlaseng.2021.106569
Abstract: Abstract Since the ptychographic encoding can transform the secret information into series of diffractive patterns optically, it achieves the high security for information hiding. However, traditional ptychographic encoding requires the mechanical movements of the illuminated…
read more here.
Keywords:
optical information;
mechanical ptychography;
information hiding;
ptychographic encoding ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Communications Magazine"
DOI: 10.1109/mcom.001.2200035
Abstract: Visible Light Communication (VLC) is an emerging short-range optical communication technology that can alleviate spectrum congestion. However, VLC faces security problems with man-in-the-middie hijacking and bypass listening. Since the covert transmission of visible light information…
read more here.
Keywords:
information;
communication;
extraction;
visible light ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "International Journal of Electrical and Computer Engineering"
DOI: 10.11591/ijece.v8i2.pp1156-1168
Abstract: Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission.…
read more here.
Keywords:
dev pso;
stego;
pso algorithm;
information hiding ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "International Journal of Electronics and Telecommunications"
DOI: 10.1515/eletel-2017-0029
Abstract: Science 2.0 aims at using the information sharing and collaborative features of the Internet to offer new features to the research community. Science 2.0 has been already applied to computer sciences, especially bioinformatics. For network…
read more here.
Keywords:
information;
information hiding;
science;
hiding science ... See more keywords
Sign Up to like & get
recommendations!
3
Published in 2022 at "Entropy"
DOI: 10.3390/e24030318
Abstract: (k,n)-threshold secret image sharing (SIS) protects an image by dividing it into n shadow images. The secret image will be recovered as we gather k or more shadow images. In complex networks, the security, robustness…
read more here.
Keywords:
threshold;
secret images;
multiple secret;
information hiding ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "Entropy"
DOI: 10.3390/e24050684
Abstract: A computational technique for the determination of optimal hiding conditions of a digital image in a self-organizing pattern is presented in this paper. Three statistical features of the developing pattern (the Wada index based on…
read more here.
Keywords:
statistical features;
self organizing;
information hiding;
pattern ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2023 at "Entropy"
DOI: 10.3390/e25050744
Abstract: In this era of rapid information exchange in public networks, there is a risk to information security. Data hiding is an important technique for privacy protection. Image interpolation is an important data-hiding technique in image…
read more here.
Keywords:
information;
capacity;
method;
dynamic information ... See more keywords