{"id":"https://openalex.org/W2398022845","doi":"https://doi.org/10.1007/978-3-319-26961-0_36","title":"DWT Difference Modulation Based Novel Steganographic Algorithm","display_name":"DWT Difference Modulation Based Novel Steganographic Algorithm","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W2398022845","doi":"https://doi.org/10.1007/978-3-319-26961-0_36","mag":"2398022845"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-26961-0_36","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-26961-0_36","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041001020","display_name":"Imon Mukherjee","orcid":"https://orcid.org/0000-0002-8598-148X"},"institutions":[{"id":"https://openalex.org/I3283852","display_name":"Thomas College","ror":"https://ror.org/00z6yks89","country_code":"US","type":"education","lineage":["https://openalex.org/I3283852"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Imon Mukherjee","raw_affiliation_strings":["Department of Computer Science and Engineering, St. Thomas\u2019 College of Engineering and Technology, Kolkata, 700 023, India","Department of Computer Science and Engineering, St. Thomas' College of Engineering and Technology, Kolkata, 700 023, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, St. Thomas\u2019 College of Engineering and Technology, Kolkata, 700 023, India","institution_ids":["https://openalex.org/I3283852"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, St. Thomas' College of Engineering and Technology, Kolkata, 700 023, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103202634","display_name":"Biswajita Datta","orcid":"https://orcid.org/0000-0001-8102-9742"},"institutions":[{"id":"https://openalex.org/I3283852","display_name":"Thomas College","ror":"https://ror.org/00z6yks89","country_code":"US","type":"education","lineage":["https://openalex.org/I3283852"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Biswajita Datta","raw_affiliation_strings":["Department of Computer Science and Engineering, St. Thomas\u2019 College of Engineering and Technology, Kolkata, 700 023, India","Department of Computer Science and Engineering, St. Thomas' College of Engineering and Technology, Kolkata, 700 023, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, St. Thomas\u2019 College of Engineering and Technology, Kolkata, 700 023, India","institution_ids":["https://openalex.org/I3283852"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, St. Thomas' College of Engineering and Technology, Kolkata, 700 023, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029054764","display_name":"Reeturaj Banerjee","orcid":null},"institutions":[{"id":"https://openalex.org/I213512949","display_name":"T A Pai Management Institute","ror":"https://ror.org/05saacc29","country_code":"IN","type":"education","lineage":["https://openalex.org/I213512949"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Reeturaj Banerjee","raw_affiliation_strings":["T.A. Pai Management Institute, Manipal, 576 104, India"],"affiliations":[{"raw_affiliation_string":"T.A. Pai Management Institute, Manipal, 576 104, India","institution_ids":["https://openalex.org/I213512949"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057061455","display_name":"Srijan Das","orcid":"https://orcid.org/0000-0002-3373-6749"},"institutions":[{"id":"https://openalex.org/I16292982","display_name":"National Institute of Technology Rourkela","ror":"https://ror.org/011gmn932","country_code":"IN","type":"education","lineage":["https://openalex.org/I16292982"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Srijan Das","raw_affiliation_strings":["Department of Computer Science and Engineering, National Institute of Technology, Rourkela, 769 008, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, National Institute of Technology, Rourkela, 769 008, India","institution_ids":["https://openalex.org/I16292982"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5041001020"],"corresponding_institution_ids":["https://openalex.org/I3283852"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.7465,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.72974269,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"573","last_page":"582"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10901","display_name":"Advanced Data Compression Techniques","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8625824451446533},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8081148862838745},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.7075187563896179},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.6447077989578247},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.548017144203186},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.49746349453926086},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.47838059067726135},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4501684308052063},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.44391751289367676},{"id":"https://openalex.org/keywords/least-significant-bit","display_name":"Least significant bit","score":0.4375772774219513},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.43756672739982605},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.426769495010376},{"id":"https://openalex.org/keywords/notice","display_name":"Notice","score":0.4150317311286926},{"id":"https://openalex.org/keywords/distortion","display_name":"Distortion (music)","score":0.41288959980010986},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39676618576049805},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.36686792969703674},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3155233860015869},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.23100700974464417},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.15583962202072144},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.10828036069869995}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8625824451446533},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8081148862838745},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.7075187563896179},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.6447077989578247},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.548017144203186},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.49746349453926086},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.47838059067726135},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4501684308052063},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.44391751289367676},{"id":"https://openalex.org/C4305246","wikidata":"https://www.wikidata.org/wiki/Q3885225","display_name":"Least significant bit","level":2,"score":0.4375772774219513},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.43756672739982605},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.426769495010376},{"id":"https://openalex.org/C2779913896","wikidata":"https://www.wikidata.org/wiki/Q7063001","display_name":"Notice","level":2,"score":0.4150317311286926},{"id":"https://openalex.org/C126780896","wikidata":"https://www.wikidata.org/wiki/Q899871","display_name":"Distortion (music)","level":4,"score":0.41288959980010986},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39676618576049805},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.36686792969703674},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3155233860015869},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.23100700974464417},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.15583962202072144},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.10828036069869995},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.0},{"id":"https://openalex.org/C194257627","wikidata":"https://www.wikidata.org/wiki/Q211554","display_name":"Amplifier","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-319-26961-0_36","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-26961-0_36","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.47999998927116394,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W202794614","https://openalex.org/W1908930637","https://openalex.org/W2041560266","https://openalex.org/W2075372638","https://openalex.org/W2092045181","https://openalex.org/W2093252824","https://openalex.org/W2112786918","https://openalex.org/W2118426301","https://openalex.org/W2134453072","https://openalex.org/W2157369176","https://openalex.org/W4230434002"],"related_works":["https://openalex.org/W3127945325","https://openalex.org/W2205085860","https://openalex.org/W2885826910","https://openalex.org/W2134958869","https://openalex.org/W2181427603","https://openalex.org/W2409080236","https://openalex.org/W2977151837","https://openalex.org/W3042389042","https://openalex.org/W2796470635","https://openalex.org/W2771684231"],"abstract_inverted_index":null,"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
