Securing Sensitive Data Through Corner Filters, Chaotic Maps and LSB Embedding.
Wassim AlexanEyad MamdouhAbdelrahman ElkhateebFahd Al-Seba'eyZiad AmrHana KhalilPublished in: NILES (2021)
Keyphrases
- sensitive data
- chaotic maps
- information security
- data hiding
- data embedding
- image encryption
- smart card
- privacy preserving
- data storage
- data sharing
- image encryption algorithm
- authentication scheme
- image encryption scheme
- third party
- digital images
- sensitive information
- chaotic sequence
- cover image
- information systems
- encryption algorithm
- error correction
- security analysis
- privacy protection
- reversible data hiding
- intrusion detection
- watermarking technique
- spatial domain
- e government
- database