About the Journal
Journal of Information Hiding and Privacy Protection focuses on original papers addressing novel ideas, issues, theoretical analysis, implementation, experimental results, systems and applications in the field of Watermarking, Data Hiding, Multimedia Security, and Privacy Protection.
-
Open Access
ARTICLE
Hybrid Metaheuristic Lion and Firefly Optimization Algorithm with Chaotic Map for Substitution S-Box Design
Journal of Information Hiding and Privacy Protection, Vol.6, pp. 21-45, 2024, DOI:10.32604/jihpp.2024.058954 - 31 December 2024
Abstract Substitution boxes (S-boxes) are key components of symmetrical cryptosystems, acting as nonlinear substitution functions that hide the relationship between the encrypted text and input key. This confusion mechanism is vital for cryptographic security because it prevents attackers from intercepting the secret key by analyzing the encrypted text. Therefore, the S-box design is essential for the robustness of cryptographic systems, especially for the data encryption standard (DES) and advanced encryption standard (AES). This study focuses on the application of the firefly algorithm (FA) and metaheuristic lion optimization algorithm (LOA), thereby proposing a hybrid approach called the… More >
-
Open Access
ARTICLE
Pairwise Reversible Data Hiding for Medical Images with Contrast Enhancement
Journal of Information Hiding and Privacy Protection, Vol.6, pp. 1-19, 2024, DOI:10.32604/jihpp.2024.051354 - 24 June 2024
Abstract Contrast enhancement in medical images has been vital since the prevalence of image representations in healthcare. In this research, the PRDHMCE (pairwise reversible data hiding for medical images with contrast enhancement) algorithm is proposed as an automatic contrast enhancement (CE) method for medical images based on region of interest (ROI) and non-region of interest (NROI). The PRDHMCE algorithm strategically enhances the ROI after segmentation using histogram stretching and data embedding. An initial histogram evaluation compares histogram bins with their neighbours to select the bin with the maximum pixel count. The selected bin is set as More >
-
Open Access
ARTICLE
Ensuring Information Security in Electronic Health Record System Using Cryptography and Cuckoo Search Algorithm
Journal of Information Hiding and Privacy Protection, Vol.5, pp. 1-18, 2023, DOI:10.32604/jihpp.2023.041972
Abstract In the contemporary era, the abundant availability of health information through internet and mobile technology raises concerns. Safeguarding and maintaining the confidentiality of patients’ medical data becomes paramount when sharing such information with authorized healthcare providers. Although electronic patient records and the internet have facilitated the exchange of medical information among healthcare providers, concerns persist regarding the security of the data. The security of Electronic Health Record Systems (EHRS) can be improved by employing the Cuckoo Search Algorithm (CS), the SHA-256 algorithm, and the Elliptic Curve Cryptography (ECC), as proposed in this study. The suggested… More >
-
Open Access
ARTICLE
Pairwise Reversible Data Hiding for Medical Images with Contrast Enhancement
Journal of Information Hiding and Privacy Protection, Vol.6, pp. 1-19, 2024, DOI:10.32604/jihpp.2024.051354
Abstract Contrast enhancement in medical images has been vital since the prevalence of image representations in healthcare. In this research, the PRDHMCE (pairwise reversible data hiding for medical images with contrast enhancement) algorithm is proposed as an automatic contrast enhancement (CE) method for medical images based on region of interest (ROI) and non-region of interest (NROI). The PRDHMCE algorithm strategically enhances the ROI after segmentation using histogram stretching and data embedding. An initial histogram evaluation compares histogram bins with their neighbours to select the bin with the maximum pixel count. The selected bin is set as More >
-
Open Access
ARTICLE
Hybrid Metaheuristic Lion and Firefly Optimization Algorithm with Chaotic Map for Substitution S-Box Design
Journal of Information Hiding and Privacy Protection, Vol.6, pp. 21-45, 2024, DOI:10.32604/jihpp.2024.058954
Abstract Substitution boxes (S-boxes) are key components of symmetrical cryptosystems, acting as nonlinear substitution functions that hide the relationship between the encrypted text and input key. This confusion mechanism is vital for cryptographic security because it prevents attackers from intercepting the secret key by analyzing the encrypted text. Therefore, the S-box design is essential for the robustness of cryptographic systems, especially for the data encryption standard (DES) and advanced encryption standard (AES). This study focuses on the application of the firefly algorithm (FA) and metaheuristic lion optimization algorithm (LOA), thereby proposing a hybrid approach called the… More >
Copyright © 2025 The Author(s). Published by Tech Science Press.