Abstract—A secure communication scheme for true color image was proposed. It is aimed at the hiding problem of a huge amount of true-color image data in the covert communication and maintaining the good visual quality of carrier image. Secure communication is achieved by combining encryption and hiding. Encryption on secret image is performed in the spatial domain of carrier image. Instead of changing pixel physics position or gray value, encryption method is searching the index value of secret image and hiding it in carrier image. Carrier image is designed as a palette, and the use of chaotic signal to act on the carrier image makes palette colors rich and evenly distributed. Each pixel of secret image is adaptively mapped to a subscript i...
Abstract: Nowadays, Internet and digital media are getting more popular. So, the need and requiremen...
Abstract:- In this paper we design a new practical computer algorithm based on chaotic map lattices ...
Considering the embedding capacity and the security of the algorithm, the paper proposes a reversibl...
A secure image transmission method is presented, which transforms an input secret image into a secre...
In order to encrypt and compress a color image simultaneously, an encryption and compression algorit...
The process of information propagation through the Internet may expose it to risk by discovering and...
A new secret sharing scheme suitable for encrypting color images is introduced. The scheme, which ca...
The internet security has become the important criteria in the 21st century security applications an...
The internet security has become the important criteria in the 21st century security applications an...
In today’s world information security is an important issue in the areas of communication and the st...
In view of feature matching between carrier and secret images, an information hiding scheme based on...
The Internet provides very economical real-time communications between computers and delivers servic...
Cryptography and steganography are among the most important sciences that have been properly used to...
Abstract In recent years, meaningful visual image encryption schemes that the plain image is compres...
[[abstract]]For developing a safety network transmission environment, there are many cryptography me...
Abstract: Nowadays, Internet and digital media are getting more popular. So, the need and requiremen...
Abstract:- In this paper we design a new practical computer algorithm based on chaotic map lattices ...
Considering the embedding capacity and the security of the algorithm, the paper proposes a reversibl...
A secure image transmission method is presented, which transforms an input secret image into a secre...
In order to encrypt and compress a color image simultaneously, an encryption and compression algorit...
The process of information propagation through the Internet may expose it to risk by discovering and...
A new secret sharing scheme suitable for encrypting color images is introduced. The scheme, which ca...
The internet security has become the important criteria in the 21st century security applications an...
The internet security has become the important criteria in the 21st century security applications an...
In today’s world information security is an important issue in the areas of communication and the st...
In view of feature matching between carrier and secret images, an information hiding scheme based on...
The Internet provides very economical real-time communications between computers and delivers servic...
Cryptography and steganography are among the most important sciences that have been properly used to...
Abstract In recent years, meaningful visual image encryption schemes that the plain image is compres...
[[abstract]]For developing a safety network transmission environment, there are many cryptography me...
Abstract: Nowadays, Internet and digital media are getting more popular. So, the need and requiremen...
Abstract:- In this paper we design a new practical computer algorithm based on chaotic map lattices ...
Considering the embedding capacity and the security of the algorithm, the paper proposes a reversibl...