Safeguarding the identity of people in photographs or videos published through social networks or television is of great importance to those who do not wish to be recognized. In this paper, a face detecting and coding system is designed with the goal of solving this problem. Mathematical models to generate chaotic orbits are deployed. One of them applies the diffusion technique to scramble the pixels of each face while another implements the confusion technique to alter the relation between plain text and ciphered text. Afterward, another two orbits are utilized for the steganography technique to modify the least significant bit (LSB) to conceal data that would allow authorized users to decipher the faces. To verify the robustness of the pr...
International audienceIn this paper, we firstly study the security enhancement of three steganograph...
Images are widely used in diverse areas such as medical, military, science, engineering, art, advert...
The art of information hiding has been around nearly as long as the need for covert communication. S...
In this article, a safe communication system is proposed that implements one or more portable device...
Cryptography and steganography are among the most important sciences that have been properly used to...
Abstract—In recent years, one of the necessary requirements of communication is to prevent data thef...
In this work, steganography is implemented in photographs captured by an unmanned aerial vehicle (dr...
Demand for data security is increasing as information technology advances. Encryption technology bas...
The Internet provides very economical real-time communications between computers and delivers servic...
Image steganography is a technique to hide secret information in an image without leaving any appare...
This paper, presents a novel chaos-based image steganography algorithm. Because of efficient propert...
The exchange of data is not limited to personal text information or information about institutions a...
This contribution proposes a novel steganographic method based on the compression standard according...
This paper proposes a novel steganographic technique for secure data communication by combining Secr...
Even after rapid development of encryption and decryption algorithms, the communication channels sti...
International audienceIn this paper, we firstly study the security enhancement of three steganograph...
Images are widely used in diverse areas such as medical, military, science, engineering, art, advert...
The art of information hiding has been around nearly as long as the need for covert communication. S...
In this article, a safe communication system is proposed that implements one or more portable device...
Cryptography and steganography are among the most important sciences that have been properly used to...
Abstract—In recent years, one of the necessary requirements of communication is to prevent data thef...
In this work, steganography is implemented in photographs captured by an unmanned aerial vehicle (dr...
Demand for data security is increasing as information technology advances. Encryption technology bas...
The Internet provides very economical real-time communications between computers and delivers servic...
Image steganography is a technique to hide secret information in an image without leaving any appare...
This paper, presents a novel chaos-based image steganography algorithm. Because of efficient propert...
The exchange of data is not limited to personal text information or information about institutions a...
This contribution proposes a novel steganographic method based on the compression standard according...
This paper proposes a novel steganographic technique for secure data communication by combining Secr...
Even after rapid development of encryption and decryption algorithms, the communication channels sti...
International audienceIn this paper, we firstly study the security enhancement of three steganograph...
Images are widely used in diverse areas such as medical, military, science, engineering, art, advert...
The art of information hiding has been around nearly as long as the need for covert communication. S...