Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (18)
  • Open Access

    ARTICLE

    High-Secured Image LSB Steganography Using AVL-Tree with Random RGB Channel Substitution

    Murad Njoum1,2,*, Rossilawati Sulaiman1, Zarina Shukur1, Faizan Qamar1

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 183-211, 2024, DOI:10.32604/cmc.2024.050090 - 15 October 2024

    Abstract Random pixel selection is one of the image steganography methods that has achieved significant success in enhancing the robustness of hidden data. This property makes it difficult for steganalysts’ powerful data extraction tools to detect the hidden data and ensures high-quality stego image generation. However, using a seed key to generate non-repeated sequential numbers takes a long time because it requires specific mathematical equations. In addition, these numbers may cluster in certain ranges. The hidden data in these clustered pixels will reduce the image quality, which steganalysis tools can detect. Therefore, this paper proposes a… More >

  • Open Access

    REVIEW

    A Review of Image Steganography Based on Multiple Hashing Algorithm

    Abdullah Alenizi1, Mohammad Sajid Mohammadi2, Ahmad A. Al-Hajji2, Arshiya Sajid Ansari1,*

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2463-2494, 2024, DOI:10.32604/cmc.2024.051826 - 15 August 2024

    Abstract Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item. From ancient times to the present, the security of secret or vital information has always been a significant problem. The development of secure communication methods that keep recipient-only data transmissions secret has always been an area of interest. Therefore, several approaches, including steganography, have been developed by researchers over time to enable safe data transit. In this review, we have discussed image steganography based on Discrete Cosine Transform (DCT) algorithm, etc. We have also discussed image steganography based… More >

  • Open Access

    ARTICLE

    Elevating Image Steganography: A Fusion of MSB Matching and LSB Substitution for Enhanced Concealment Capabilities

    Muhammad Zaman Ali1, Omer Riaz1, Hafiz Muhammad Hasnain2, Waqas Sharif2, Tenvir Ali2, Gyu Sang Choi3,*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2923-2943, 2024, DOI:10.32604/cmc.2024.049139 - 15 May 2024

    Abstract In today’s rapidly evolving landscape of communication technologies, ensuring the secure delivery of sensitive data has become an essential priority. To overcome these difficulties, different steganography and data encryption methods have been proposed by researchers to secure communications. Most of the proposed steganography techniques achieve higher embedding capacities without compromising visual imperceptibility using LSB substitution. In this work, we have an approach that utilizes a combination of Most Significant Bit (MSB) matching and Least Significant Bit (LSB) substitution. The proposed algorithm divides confidential messages into pairs of bits and connects them with the MSBs of… More >

  • Open Access

    ARTICLE

    An Efficient Sleep Spindle Detection Algorithm Based on MP and LSBoost

    Fei Wang1,2, Li Li1, Yinxing Wan1, Zhuorong Li1, Lixian Luo3, Bangshun Hu1, Jiahui Pan1,2, Zhenfu Wen4, Haiyun Huang1,2,*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2301-2316, 2023, DOI:10.32604/cmc.2023.037727 - 30 August 2023

    Abstract Sleep spindles are an electroencephalogram (EEG) biomarker of non-rapid eye movement (NREM) sleep and have important implications for clinical diagnosis and prognosis. However, it is challenging to accurately detect sleep spindles due to the complexity of the human brain and the uncertainty of neural mechanisms. To improve the reliability and objectivity of sleep spindle detection and to compensate for the limitations of manual annotation, this study proposes a new automatic detection algorithm based on Matching Pursuit (MP) and Least Squares Boosting (LSBoost), where the automatic sleep spindle detection algorithm can help reduce the visual annotation… More >

  • Open Access

    ARTICLE

    Comparative Analysis of Execution of CNN-Based Sanguine Data Transmission with LSB-SS and PVD-SS

    Alaknanda S. Patil1,*, G. Sundari1, Arun Kumar Sivaraman2

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1707-1721, 2023, DOI:10.32604/csse.2023.034270 - 09 February 2023

    Abstract The intact data transmission to the authentic user is becoming crucial at every moment in the current era. Steganography; is a technique for concealing the hidden message in any cover media such as image, video; and audio to increase the protection of data. The resilience and imperceptibility are improved by choosing an appropriate embedding position. This paper gives a novel system to immerse the secret information in different videos with different methods. An audio and video steganography with novel amalgamations are implemented to immerse the confidential auditory information and the authentic user’s face image. A… More >

  • Open Access

    ARTICLE

    Proposed Privacy Preservation Technique for Color Medical Images

    Walid El-Shafai1,2, Hayam A. Abd El-Hameed3, Noha A. El-Hag4, Ashraf A. M. Khalaf3, Naglaa F. Soliman5, Hussah Nasser AlEisa6,*, Fathi E. Abd El-Samie1

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 719-732, 2023, DOI:10.32604/iasc.2023.031079 - 29 September 2022

    Abstract Nowadays, the security of images or information is very important. This paper introduces a proposed hybrid watermarking and encryption technique for increasing medical image security. First, the secret medical image is encrypted using Advanced Encryption Standard (AES) algorithm. Then, the secret report of the patient is embedded into the encrypted secret medical image with the Least Significant Bit (LSB) watermarking algorithm. After that, the encrypted secret medical image with the secret report is concealed in a cover medical image, using Kekre’s Median Codebook Generation (KMCG) algorithm. Afterwards, the stego-image obtained is split into 16 parts.… More >

  • Open Access

    ARTICLE

    A Robust Data Hiding Reversible Technique for Improving the Security in e-Health Care System

    Saima Kanwal1, Feng Tao1,*, Ahmad Almogren2, Ateeq Ur Rehman3, Rizwan Taj1, Ayman Radwan4

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.1, pp. 201-219, 2023, DOI:10.32604/cmes.2022.020255 - 24 August 2022

    Abstract The authenticity and integrity of healthcare is the primary objective. Numerous reversible watermarking schemes have been developed to improve the primary objective but increasing the quantity of embedding data leads to covering image distortion and visual quality resulting in data security detection. A trade-off between robustness, imperceptibility, and embedded capacity is difficult to achieve with current algorithms due to limitations in their ability. Keeping this purpose insight, an improved reversibility watermarking methodology is proposed to maximize data embedding capacity and imperceptibility while maintaining data security as a primary concern. A key is generated by a… More >

  • Open Access

    ARTICLE

    High Efficiency Crypto-Watermarking System Based on Clifford-Multiwavelet for 3D Meshes Security

    Wajdi Elhamzi1,2,*, Malika Jallouli3, Yassine Bouteraa1,4

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4329-4347, 2022, DOI:10.32604/cmc.2022.030954 - 16 June 2022

    Abstract Since 3D mesh security has become intellectual property, 3D watermarking algorithms have continued to appear to secure 3D meshes shared by remote users and saved in distant multimedia databases. The novelty of our approach is that it uses a new Clifford-multiwavelet transform to insert copyright data in a multiresolution domain, allowing us to greatly expand the size of the watermark. After that, our method does two rounds of insertion, each applying a different type of Clifford-wavelet transform. Before being placed into the Clifford-multiwavelet coefficients, the watermark, which is a mixture of the mesh description, source… More >

  • Open Access

    ARTICLE

    Reversible Watermarking Method with Low Distortion for the Secure Transmission of Medical Images

    Rizwan Taj1, Feng Tao1,*, Shahzada Khurram2, Ateeq Ur Rehman3, Syed Kamran Haider4, Akber Abid Gardezi5, Saima Kanwal1

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.3, pp. 1309-1324, 2022, DOI:10.32604/cmes.2022.017650 - 30 December 2021

    Abstract In telemedicine, the realization of reversible watermarking through information security is an emerging research field. However, adding watermarks hinders the distribution of pixels in the cover image because it creates distortions (which lead to an increase in the detection probability). In this article, we introduce a reversible watermarking method that can transmit medical images with minimal distortion and high security. The proposed method selects two adjacent gray pixels whose least significant bit (LSB) is different from the relevant message bit and then calculates the distortion degree. We use the LSB pairing method to embed the secret… More >

  • Open Access

    ARTICLE

    Scrambling Based Riffle Shift on Stego-Image to Channelize the Ensured Data

    R. Bala Krishnan1, M. M. Anishin Raj2, N. Rajesh Kumar1, B. Karthikeyan3, G. Manikandan3,*, N. R. Raajan4

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 221-235, 2022, DOI:10.32604/iasc.2022.021775 - 26 October 2021

    Abstract In recent years information hiding has got much attention as it acts as an alternate option for secured communication. The Secret content would get imbedded with the image using various possible image embodiment techniques, in which the Least Significant Bit (LSB) substitution is one of the preferred content embodiment strategy; however, asserting the quality and the originality of the content embedded image (stego) is yet a grievous concern in the field of Information Security. In this article, a proficient Scrambling Based Haar Wavelet Transform (SBHWT) approach has been sought to ensure the novelty of the… More >

Displaying 1-10 on page 1 of 18. Per Page