scinapse is loading now...
  • References (0)
  • Citations (179)
References0
Newest
Cited By179
Newest
Published on Nov 24, 2018in Journal of Real-time Image Processing 1.57
Zhenjun Tang2
Estimated H-index: 2
(Guangxi Normal University),
Shijie Xu1
Estimated H-index: 1
(Guangxi Normal University)
+ 3 AuthorsChuanqiang Yu (Guangxi Normal University)
Reversible data hiding in encrypted image (RDH-EI) is a hot topic of data hiding in recent years. Most RDH-EI algorithms do not reach desirable embedding rate and their computational costs are not suitable for real-time applications. Aiming at these problems, we propose an efficient RDH-EI algorithm with shifting block histogram of pixel differences in homomorphic encrypted domain. A key step of our RDH-EI algorithm is the block-based encryption scheme with additive homomorphism, which can prese...
Source Cite
Published on Apr 1, 2019in Multimedia Tools and Applications 1.54
Heng Yao5
Estimated H-index: 5
(University of Shanghai for Science and Technology),
Xiaokai Liu1
Estimated H-index: 1
(University of Shanghai for Science and Technology)
+ 2 AuthorsYing Tian2
Estimated H-index: 2
(University of Shanghai for Science and Technology)
The development of image decryption techniques means that some current encryption techniques that turn a secret image into a meaningless image are no longer safe. Recently, encrypting an image into another meaningful image has opened a new route to transmit the secret image. This paper proposes an improved image encryption approach to camouflage the secret image into another host image. The visual quality of the final camouflage image has been significantly improved by using a human visual syste...
Source Cite
Published on Apr 1, 2019in Multimedia Tools and Applications 1.54
Zhenjun Tang2
Estimated H-index: 2
(Guangxi Normal University),
Shijie Xu1
Estimated H-index: 1
(Guangxi Normal University)
+ 2 AuthorsXianquan Zhang13
Estimated H-index: 13
(Guangxi Normal University)
This paper proposes a novel reversible data hiding (RDH) algorithm with differential compression (DC) in encrypted image, which has high embedding capacity. The key contributions are two sides. (1) An efficient block-based encryption scheme is developed for encrypting image. It can transfer spatial correlation between neighboring pixels of plaintext image into encrypted image. (2) The DC scheme is proposed to conduct compression of encrypted image. It can efficiently compress encrypted image by ...
2 Citations Source Cite
Published on Jan 1, 2019
Samir Bendoukha3
Estimated H-index: 3
(Taibah University),
Salem Abdelmalek2
Estimated H-index: 2
,
Adel Ouannas15
Estimated H-index: 15
Over the last three decades, chaotic dynamical systems have found many applications in science and engineering particularly in the field of secure communications and data encryption. The vast majority of such applications start from the synchronization control of two chaotic systems where one system’s states are forced to follow the exact same trajectory set out by another system with different initial conditions. The general theme seems to be that a master system is placed at the transmitter an...
Source Cite
Published on Jan 1, 2018
Juan Chen , Fei Peng9
Estimated H-index: 9
(Hunan University),
Min Long9
Estimated H-index: 9
(Changsha University of Science and Technology)
Aiming to protect the video content and facilitate online video consumption, a perceptual encryption scheme is proposed for high efficiency video coding (HEVC) video. Based on RC4 algorithm, a key stream generation method is constructed, whose proportion of “1” and “0” can be regulated. During HEVC encoding, four kinds of syntax elements including motion vector difference (MVD)’ sign, MVD’s amplitude, sign of the luma residual coefficient and sign of the chroma residual coefficient, are encrypte...
Source Cite
Published on Dec 11, 2017
Youssef Harmouch1
Estimated H-index: 1
,
Rachid El Kouch1
Estimated H-index: 1
The current article statistically analyzes several high-speed stream ciphers. The study focuses on frequency cryptanalysis and the goodness-of-fit test. The purpose of this work is to show if there is a signature left by these stream ciphers in each of the encrypted streams. In addition, the work compares these ciphers to indicate which is the safest against statistical cryptanalysis.
1 Citations Source Cite
Published on Nov 16, 2016
Asha Liza John1
Estimated H-index: 1
(Indian Institute of Information Technology and Management, Kerala),
Sabu M. Thampi10
Estimated H-index: 10
(Indian Institute of Information Technology and Management, Kerala)
In modern times, common man uses small computing devices like mobile phones, RFID systems and embedded systems. Such devices are resource constrained. Hence, algorithms used in such devices must consume less power and should have minimal memory requirements. But, several existing cryptosystems like RSA require more memory and other resources for operation. So, in the proposed work an optimized and secure encryption scheme is developed to ensure confidentiality in communication. This algorithm is...
Source Cite
Published on Oct 19, 2016
Rafael Álvarez5
Estimated H-index: 5
(University of Alicante),
Antonio Zamora7
Estimated H-index: 7
(University of Alicante)
Even if combined with other techniques, passwords are still the main way of authentication in many services and systems. Attackers can usually test many passwords very quickly when using standard hash functions, so specific password hashing algorithms have been designed to slow down brute force attacks.
1 Citations Source Cite
Published on Mar 10, 2016in PLOS ONE 2.77
Tarik Idbeaa3
Estimated H-index: 3
(National University of Malaysia),
Salina Abdul Samad14
Estimated H-index: 14
(National University of Malaysia),
Hafizah Husain8
Estimated H-index: 8
(National University of Malaysia)
This paper presents a novel secure and robust steganographic technique in the compressed video domain namely embedding-based byte differencing (EBBD). Unlike most of the current video steganographic techniques which take into account only the intra frames for data embedding, the proposed EBBD technique aims to hide information in both intra and inter frames. The information is embedded into a compressed video by simultaneously manipulating the quantized AC coefficients (AC-QTCs) of luminance com...
3 Citations Source Cite