All Stories

  1. ON Chip peripherals are ON for chaos – an image fused encryption
  2. Encryption and watermark-treated medical image against hacking disease—An immune convention in spatial and frequency domains
  3. Encrypted Biography of Biomedical Image - a Pentalayer Cryptosystem on FPGA
  4. Lightweight chaotic image encryption algorithm for real-time embedded system: Implementation and analysis on 32-bit microcontroller
  5. Networked hardware assisted key image and chaotic attractors for secure RGB image communication
  6. DNA Chaos Blend to Secure Medical Privacy
  7. Tamper Proofing Identification and Authenticated DICOM Image Transmission Using Wireless Channels and CR Network
  8. Chaos triggered image encryption - a reconfigurable security solution
  9. Hybrid image crypto system for secure image communication– A VLSI approach
  10. Transreceiving of encrypted medical image – a cognitive approach
  11. Secured Emergency Based Adaptive Batch and Fuzzy Inference System Management in Cognitive Radio
  12. Cellular automata + LFSR + synthetic image: A trio approach to image encryption
  13. Confusion and diffusion on FPGA — Onchip solution for medical image security
  14. Graphics control on LCD via digital accelerometer — An open maze game
  15. Numerical password via graphical input — An authentication system on embedded platform
  16. On the lossless image recovery analysis of cyclic shift and chaotic system based image encryption
  17. Optic assisted image encryption: Confluence of chaos and virtual instrumentation
  18. Quantum polarized image encryption — A secure communication
  19. Stego integrated image encryption using row and column indexing — An information security
  20. Data Security Through Data Hiding in Images: A Review
  21. Logistic and Standard Coupled Mapping on Pre and Post Shuffled Images: A Method of Image Encryption
  22. Reversible Secret Data Hiding Based on Adjacency Pixel Difference
  23. Multiplexed stego path on reconfigurable hardware: A novel random approach
  24. Fusion of confusion and diffusion: a novel image encryption approach
  25. Chaos based crossover and mutation for securing DICOM image
  26. Tri Layer Image Encryption Based on Quantum Principle
  27. Chaotic & partial encrypted image on XOR bus - an unidentified carrier approach
  28. Competition among interleavers in OFDM-an encrypted modulated modulation approach
  29. Convoluted Rubik's encoded quantum polarized-a secure DICOM image
  30. Enhancing the Security of Customer Data in Cloud Environments Using a Novel Digital Fingerprinting Technique
  31. Horse DNA Runs on Image: A Novel Road to Image Encryption
  32. Image Merger Encryptor: A Chaotic and Chebyshev Key Approach
  33. Yet another but an incremental reversible data hiding- for an irreversible data safety
  34. Medical data sheet in safe havens – A tri-layer cryptic solution
  35. Triple chaotic image scrambling on RGB - a random image encryption approach
  36. Chain of Shuffling and Chaos: A Tied Encryptic Approach
  37. Light Weight Steganography on RISC Platform-Implementation and Analysis
  38. Pixel scattering matrix formalism for image encryption—A key scheduled substitution and diffusion approach
  39. 2π rotated Key2 shuffling and scrambling - a cryptic track
  40. Hungarian sculptured Discrete Gould transformed bit planes-a double puzzled image
  41. A New Approach for Enabling Context-Awareness Towards People-centric and Smarter Applications
  42. Comparative Analysis of (5/3) and Haar IWT Based Steganography
  43. Cryptic Cover for Covered Writing: A Pre-Layered Stego
  44. Least Significant Bit but Quantum Bit: A Quasi Stego
  45. SVPWM Based Stator Oriented Non-linear Control of Induction Motor Drives
  46. A novel audio steg for secret communication
  47. Biosensors for Gas Detection: A Smart Approach Towards Kitchen Security
  48. Blend of error control codes in OFDM - effect of channel - a comparative approach
  49. Compiler Optimization and Plain Text Pre-Processing to Hoist the Height of HIGHT in AVR Platform
  50. Encrypted RS and cyclic doubles in OFDM - a channel variable approach
  51. Galois Field Proficient Product for Secure Image Encryption on FPGA
  52. Graphical Password Authentication Scheme for Embedded Platform
  53. Image Encryption
  54. Logic Elements Consumption Analysis of Cellular Automata Based Image Encryption on FPGA
  55. Race among error control codes in OFDM - role of modulation techniques
  56. Smarter Environments: A Compact Service-Oriented Framework for Context-Awareness
  57. Analysis of Multi Level Current Source Inverter: A Critic Based on Various PWM Control Strategies
  58. Dual Cellular Automata on FPGA: An Image Encryptors Chip
  59. Image Encryption: An Information Security Perceptive
  60. LabVIEW Based PIN Hider on ATM Cards: A Transform Domain Secret Concealment Approach
  61. Model Identification and Predictive Controller Design for a Nonlinear Process
  62. Modeling and Simulation of Shunt Active Filter for Non Linear Load
  63. Rubik's Cube Blend with Logistic Map on RGB: A Way for Image Encryption
  64. Space Filling Curve for Data Filling: An Embedded Security Approach
  65. Why Information Security Demands Transform Domain, Compression and Encryption?
  66. Audio Fingerprint Indicator in Embedded Platform: A Way for Hardware Steganography
  67. PVD Based Steganography on Scrambled RGB Cover Images with Pixel Indicator
  68. Stego on FPGA: An IWT Approach
  69. Intersect embedding on OFDM channel — A stego perspective
  70. Random hide to hide random — A stego affair encryption for We(e/a)k secret
  71. Standard deviation converges for random image steganography
  72. Horse Communication against Harsh Attack: A Stego Ride
  73. Bio-hiding for Smart Swipe Card: A Secret Security
  74. Captivating CODEC Stego (CCS): A Cover on Camouflage
  75. Compressed and Encrypted Secret Hides in Image for Rugged Stego
  76. Concealed to Protect and Protect to Conceal: A Conserved Stego Image
  77. Envisioning Smart Hotels Through Spontaneous Device Integration
  78. Image Hides Image: A Secret Stego Tri-layer Approach
  79. Key Decided Cover for Random Image Steganography
  80. Mind Game for Cover Steganography: A Refuge
  81. Pixel Indicated Triple Layer: A Way for Random Image Steganography
  82. Pixel Indicated User Indicator: A Muxed Stego
  83. Steganography-Time to Time: A Review
  84. A Graph Theory Practice on Transformed Image: A Random Image Steganography
  85. An Ambient Assisted Living for Smart Home to Wealthy Life: A Short Review
  86. Can we Reduce PAPR? OFDM+PTS+SLM+STEGO: A Novel Approach
  87. Convolution & Viterbi EN(DE)coders on OFDM hides, rides & conveys message — A Neural STEGO
  88. DS-CDMA in stego pitch
  89. OFDM with Low PAPR: A Novel Role of Partial Transmit Sequence
  90. An intelligent chaotic embedding approach to enhance stego-image quality
  91. Inverted Pattern in Inverted Time Domain for Icon Steganography
  92. Brownian Motion of Binary, Gray-Binary and Gray Bits in Image for Stego
  93. Random Image Steganography and Steganalysis: Present Status and Future Directions
  94. Evaluation of the Chemical Composition and Anti Nutritional Factors Levels of Different Thermally Processed Soybeans
  95. Pixel Authorized by Pixel to Trace with SFC on Image to Sabotage Data Mugger: A Comparative Study on PI Stego
  96. Regulated OFDM-Role of ECC and ANN: A Review
  97. Who decides hiding capacity? I, the pixel intensity
  98. Firmware for Data Security: A Review
  99. Modulation of hiding intensity by channel intensity - Stego by pixel commando
  100. Reflective code for gray block embedding
  101. Survey and Analysis of Hardware Cryptographic and Steganographic Systems on FPGA
  102. OFDM+CDMA+Stego = Secure Communication: A Review
  103. Horse Riding & Hiding in Image for Data Guarding
  104. Phase for Face saving-a multicarrier Stego
  105. Pixel bit manipulation for encoded hiding — An inherent stego
  106. Random & AWGN road for MC-CDMA & CDMA bus to phase hide — A MUX in MUX stego
  107. Wavelet Pave the Trio Travel for a Secret Mission – A Stego Vision
  108. MSB over hides LSB — A dark communication with integrity
  109. Smart bit manipulation for K bit encoded hiding in K-1 pixel bits
  110. Stego on 2n:1 Platform for Users and Embedding
  111. Wave (let) decide choosy pixel embedding for stego
  112. Covered CDMA multi-user writing on spatially divided image
  113. Steg-OFDM blend for highly secure multi-user communication
  114. Security Building at the Line of Control for Image Stego
  115. Tri-layer stego for enhanced security - a keyless random approach