Optimal Data Hiding Key in Encrypted Images Based Digital Image Security in Wireless Sensor Networks
暂无分享,去创建一个
[1] P. Eswaran,et al. RGB-Based Secure Share Creation in Visual Cryptography Using Optimal Elliptic Curve Cryptography Technique , 2016, J. Circuits Syst. Comput..
[2] Dipankar Majumdar,et al. Cuckoo search algorithm for constraint satisfaction and optimization , 2016, 2016 Second International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN).
[3] Mohamed Elhoseny,et al. Hybrid optimization with cryptography encryption for medical image security in Internet of Things , 2018, Neural Computing and Applications.
[4] Kai Chen,et al. Separable Reversible Data Hiding in Encrypted Images Based on Two-Dimensional Histogram Modification , 2018, Secur. Commun. Networks.
[5] Yicong Zhou,et al. Reversible data hiding in encrypted images using adaptive block-level prediction-error expansion , 2018, Signal Process. Image Commun..
[6] Joel J. P. C. Rodrigues,et al. Efficient artificial fish swarm based clustering approach on mobility aware energy‐efficient for MANET , 2018, Trans. Emerg. Telecommun. Technol..
[7] Ahmed Farouk,et al. K-Coverage Model Based on Genetic Algorithm to Extend WSN Lifetime , 2017, IEEE Sensors Letters.
[8] William J Buchanan,et al. Lightweight cryptography methods , 2017 .
[9] Wei Zhang,et al. Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection , 2018, Signal Process..
[10] Mohamed Elhoseny,et al. A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption , 2016, J. King Saud Univ. Comput. Inf. Sci..
[11] S. El-Rabaie,et al. High security data hiding using image cropping and LSB least significant bit steganography , 2016, 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt).
[12] Xinpeng Zhang,et al. Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.
[13] Mohamed Elhoseny,et al. Energy efficient collaborative proactive routing protocol for Wireless Sensor Network , 2018, Comput. Networks.
[14] Xiaohui Yuan,et al. An energy efficient encryption method for secure dynamic WSN , 2016, Secur. Commun. Networks.
[15] Di Xiao,et al. Meaningful Image Encryption Based on Reversible Data Hiding in Compressive Sensing Domain , 2018, Secur. Commun. Networks.
[16] Tung-Shou Chen,et al. Reversible data hiding for high quality images using modification of prediction errors , 2009, J. Syst. Softw..
[17] K. Shankar,et al. A new k out of n secret image sharing scheme in visual cryptography , 2016, 2016 10th International Conference on Intelligent Systems and Control (ISCO).
[18] Mohamed Elhoseny,et al. Self-maintenance model for Wireless Sensor Networks , 2017, Comput. Electr. Eng..
[19] Weiming Zhang,et al. Reversibility improved data hiding in encrypted images , 2014, Signal Process..
[20] Mohamed Elhoseny,et al. Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique , 2018, Journal of Ambient Intelligence and Humanized Computing.
[21] Victor Fedoseev,et al. A model for data hiding system description , 2017 .
[22] Ashish Khanna,et al. Adaptive optimal multi key based encryption for digital image security , 2020, Concurr. Comput. Pract. Exp..
[23] K. Shankar,et al. RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography , 2017, China Communications.
[24] Mohamed Elhoseny,et al. An Efficient Optimal Key Based Chaos Function for Medical Image Security , 2018, IEEE Access.
[25] Andino Maseleno,et al. Nur algorithm on data encryption and decryption , 2018 .
[26] Mohamed Elhoseny,et al. Autonomic Self-healing Approach to Eliminate Hardware Faults in Wireless Sensor Networks , 2017, AISI.
[27] Xinpeng Zhang,et al. Effective reversible data hiding in encrypted image with privacy protection for image content , 2015, J. Vis. Commun. Image Represent..