4D chaotic system-based secure data hiding method to improve robustness and embedding capacity of videos (English)
- New search for: Kaçar, Sezgin
- New search for: Konyar, Mehmet Zeki
- Further information on Konyar, Mehmet Zeki:
-
https://orcid.org/0000-0001-8914-5553
- New search for: Çavuşoğlu, Ünal
- New search for: Kaçar, Sezgin
- New search for: Konyar, Mehmet Zeki
- New search for: Çavuşoğlu, Ünal
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:4D chaotic system-based secure data hiding method to improve robustness and embedding capacity of videos
-
Contributors:
-
Publisher:
- New search for: Elsevier Ltd
-
Publication date:2022-01-01
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 71
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
-
SEAF: A Scalable, Efficient, and Application-independent Framework for container security detectionChen, Libo / Xia, Yihang / Ma, Zhenbang / Zhao, Ruijie / Wang, Yanhao / Liu, Yue / Sun, Wenqi / Xue, Zhi et al. | 2022
-
Blockchain-based verifiable and dynamic multi-keyword ranked searchable encryption scheme in cloud computingYan, Xixi / Feng, Suwei / Tang, Yongli / Yin, Pei / Deng, Dazhi et al. | 2022
-
Quaternion with quantum walks for designing a novel color image cryptosystemAbd-El-Atty, Bassem et al. | 2022
-
Classification of random number generator applications in IoT: A comprehensive taxonomySeyhan, Kübra / Akleylek, Sedat et al. | 2022
-
CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networksTaleby Ahvanooey, Milad / Zhu, Mark Xuefang / Mazurczyk, Wojciech / Li, Qianmu / Kilger, Max / Choo, Kim-Kwang Raymond / Conti, Mauro et al. | 2022
-
Improved differential attacks on the reduced-round SNOW-V and SNOW-Vi stream cipherMa, Sudong / Jin, Chenhui / Guan, Jie / Liu, Shuai et al. | 2022
-
A Trusted Platform Module-based, Pre-emptive and Dynamic Asset Discovery ToolDiaz-Honrubia, Antonio Jesus / Blázquez Herranz, Alberto / Prieto Santamaría, Lucía / Menasalvas Ruiz, Ernestina / Rodríguez-González, Alejandro / Gonzalez-Granadillo, Gustavo / Diaz, Rodrigo / Panaousis, Emmanouil / Xenakis, Christos et al. | 2022
-
A modified secure hash design to circumvent collision and length extension attacksAl-Odat, Zeyad A. / Khan, Samee U. / Al-Qtiemat, Eman et al. | 2022
-
Exposing the darkness within: A review of dark personality traits, models, and measures and their relationship to insider threatsHarms, P.D. / Marbut, Alexander / Johnston, Allen C. / Lester, Paul / Fezzey, Tyler et al. | 2022
-
An trustworthy intrusion detection framework enabled by ex-post-interpretation-enabled approachPeng, Junfeng / Cai, Ziwei / Chen, Zhenyu / Liu, Xujiang / Zheng, Mianyu / Song, Chufeng / Zhu, Xiongyong / Teng, Yi / Zhang, Ruilin / Zhou, Yanqin et al. | 2022
-
IFKMS: Inverse Function-based Key Management Scheme for IoT networksNafi, Mohammed / Messai, Mohamed-Lamine / Bouzefrane, Samia / Omar, Mawloud et al. | 2022
-
An end-to-end method for advanced persistent threats reconstruction in large-scale networks based on alert and log correlationWang, Yifeng / Guo, Yuanbo / Fang, Chen et al. | 2022
-
A method for decrypting data infected with Hive ransomwareKim, Giyoon / Kim, Soram / Kang, Soojin / Kim, Jongsung et al. | 2022
-
A sanitizable signcryption scheme with public verifiability via chameleon hash functionHu, Shuang / Zhang, Renjun / Wang, Fuqun / Chen, Kefei / Lian, Bin / Chen, Gongliang et al. | 2022
-
SAMPARK: Secure and lightweight communication protocols for smart parking managementLimbasiya, Trupil / Sahay, Sanjay K. / Das, Debasis et al. | 2022
-
Verifiable quaternion fully homomorphic encryption scheme for mitigating false data injection attacks by privacy preservation in fog environmentSendhil, R. / Amuthan, A. et al. | 2022
-
ELAT: Ensemble Learning with Adversarial Training in defending against evaded intrusionsLin, Ying-Dar / Pratama, Jehoshua-Hanky / Sudyana, Didik / Lai, Yuan-Cheng / Hwang, Ren-Hung / Lin, Po-Ching / Lin, Hsuan-Yu / Lee, Wei-Bin / Chiang, Chen-Kuo et al. | 2022
-
A hybrid BTP approach with filtered BCH codes for improved performance and securityAbdullahi, Sani M. / Sun, Shuifa / Wang, Yifei / Yang, PengPeng / Wang, HuaZheng / Wang, Beng et al. | 2022
-
Corrigendum to “An efficient verifiable secret redistribution scheme” [Journal of information security and applications, 69 (2022)103295]Bagherpour, Bagher et al. | 2022
-
Differential privacy performance evaluation under the condition of non-uniform noise distributionLiu, Jiaju / Hu, Yun / Guo, Xiaojun / Liang, Tianxing / Jin, Weikun et al. | 2022
-
4D chaotic system-based secure data hiding method to improve robustness and embedding capacity of videosKaçar, Sezgin / Konyar, Mehmet Zeki / Çavuşoğlu, Ünal et al. | 2022
-
GwPFV: A novel packet forwarding verification mechanism based on gateways in SDN-based storage environmentYuming, Liu / Yong, Wang / Hao, Feng / Zeyu, Wang et al. | 2022
-
Editorial Board| 2022
-
RiderAuth: A cancelable touch-signature based rider authentication scheme for driverless taxisGupta, Sandeep / Raja, Kiran / Martinelli, Fabio / Crispo, Bruno et al. | 2022
-
Completely Anonymous Certificateless Multi-Receiver Signcryption Scheme with Sender TraceabilityLi, Huixian / Wu, Chenhao / Pang, Liaojun et al. | 2022
-
TIM: Secure and usable authentication for smartphonesYang, Gi-Chul / Hu, Qinwen / Asghar, Muhammad Rizwan et al. | 2022
-
A new anonymous authentication framework for secure smart grids applicationsTanveer, Muhammad / Ahmad, Musheer / Khalifa, Hany S. / Alkhayyat, Ahmed / El-Latif, Ahmed A. Abd et al. | 2022
-
Secure word-level sorting based on fully homomorphic encryptionHuang, Hai / Wang, Yongjian / Wang, Luyao / Ge, Huasheng / Gu, Qiang et al. | 2022
-
Constructions of non-basic totally disjoint spectra plateaued functions for cryptographic applicationsHu, Xuewei / Yang, Bo / Zhang, Jing / Huang, Meijuan et al. | 2022