About the Journal
Journal of Information Hiding and Privacy Protection focuses on original papers addressing novel ideas, issues, theoretical analysis, implementation, experimental results, systems and applications in the field of Watermarking, Data Hiding, Multimedia Security, and Privacy Protection.
Read More
-
Open Access
REVIEW
Unveiling the Hidden Pixels: A Comprehensive Exploration of Digital Image Steganography Schemes
Journal of Information Hiding and Privacy Protection, Vol.7, pp. 1-31, 2025, DOI:10.32604/jihpp.2025.060898 - 27 March 2025
Abstract Steganography, the art of concealing information within innocuous mediums, has been practiced for centuries and continues to evolve with advances in digital technology. In the modern era, steganography has become an essential complementary tool to cryptography, offering an additional layer of security, stealth, and deniability in digital communications. With the rise of cyber threats such as hacking, malware, and phishing, it is crucial to adopt methods that protect the confidentiality and integrity of data. This review focuses specifically on text-in-image steganography, exploring a range of techniques, including Least Significant Bit (LSB), Pixel Value Differencing (PVD),… More >
-
Open Access
ARTICLE
Ensuring Information Security in Electronic Health Record System Using Cryptography and Cuckoo Search Algorithm
Journal of Information Hiding and Privacy Protection, Vol.5, pp. 1-18, 2023, DOI:10.32604/jihpp.2023.041972
Abstract In the contemporary era, the abundant availability of health information through internet and mobile technology raises concerns. Safeguarding and maintaining the confidentiality of patients’ medical data becomes paramount when sharing such information with authorized healthcare providers. Although electronic patient records and the internet have facilitated the exchange of medical information among healthcare providers, concerns persist regarding the security of the data. The security of Electronic Health Record Systems (EHRS) can be improved by employing the Cuckoo Search Algorithm (CS), the SHA-256 algorithm, and the Elliptic Curve Cryptography (ECC), as proposed in this study. The suggested… More >
-
Open Access
ARTICLE
Pairwise Reversible Data Hiding for Medical Images with Contrast Enhancement
Journal of Information Hiding and Privacy Protection, Vol.6, pp. 1-19, 2024, DOI:10.32604/jihpp.2024.051354
Abstract Contrast enhancement in medical images has been vital since the prevalence of image representations in healthcare. In this research, the PRDHMCE (pairwise reversible data hiding for medical images with contrast enhancement) algorithm is proposed as an automatic contrast enhancement (CE) method for medical images based on region of interest (ROI) and non-region of interest (NROI). The PRDHMCE algorithm strategically enhances the ROI after segmentation using histogram stretching and data embedding. An initial histogram evaluation compares histogram bins with their neighbours to select the bin with the maximum pixel count. The selected bin is set as More >
-
Open Access
ARTICLE
Hybrid Metaheuristic Lion and Firefly Optimization Algorithm with Chaotic Map for Substitution S-Box Design
Journal of Information Hiding and Privacy Protection, Vol.6, pp. 21-45, 2024, DOI:10.32604/jihpp.2024.058954
Abstract Substitution boxes (S-boxes) are key components of symmetrical cryptosystems, acting as nonlinear substitution functions that hide the relationship between the encrypted text and input key. This confusion mechanism is vital for cryptographic security because it prevents attackers from intercepting the secret key by analyzing the encrypted text. Therefore, the S-box design is essential for the robustness of cryptographic systems, especially for the data encryption standard (DES) and advanced encryption standard (AES). This study focuses on the application of the firefly algorithm (FA) and metaheuristic lion optimization algorithm (LOA), thereby proposing a hybrid approach called the… More >
-
Open Access
REVIEW
Unveiling the Hidden Pixels: A Comprehensive Exploration of Digital Image Steganography Schemes
Journal of Information Hiding and Privacy Protection, Vol.7, pp. 1-31, 2025, DOI:10.32604/jihpp.2025.060898
Abstract Steganography, the art of concealing information within innocuous mediums, has been practiced for centuries and continues to evolve with advances in digital technology. In the modern era, steganography has become an essential complementary tool to cryptography, offering an additional layer of security, stealth, and deniability in digital communications. With the rise of cyber threats such as hacking, malware, and phishing, it is crucial to adopt methods that protect the confidentiality and integrity of data. This review focuses specifically on text-in-image steganography, exploring a range of techniques, including Least Significant Bit (LSB), Pixel Value Differencing (PVD),… More >
Copyright © 2025 The Author(s). Published by Tech Science Press.