{"id":"https://openalex.org/W1605302982","doi":"https://doi.org/10.1007/978-3-540-92238-4_9","title":"Steganalysis of Multi Bit Plane Image Steganography","display_name":"Steganalysis of Multi Bit Plane Image Steganography","publication_year":2008,"publication_date":"2008-01-01","ids":{"openalex":"https://openalex.org/W1605302982","doi":"https://doi.org/10.1007/978-3-540-92238-4_9","mag":"1605302982"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-540-92238-4_9","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-92238-4_9","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072623500","display_name":"Johann Barbier","orcid":null},"institutions":[{"id":"https://openalex.org/I95583923","display_name":"Direction G\u00e9n\u00e9rale de l'Armement","ror":"https://ror.org/04wsqd844","country_code":"FR","type":"funder","lineage":["https://openalex.org/I2799681489","https://openalex.org/I2802818602","https://openalex.org/I95583923"]},{"id":"https://openalex.org/I55921689","display_name":"La Roche College","ror":"https://ror.org/04bthcb08","country_code":"US","type":"education","lineage":["https://openalex.org/I55921689"]}],"countries":["FR","US"],"is_corresponding":true,"raw_author_name":"Johann Barbier","raw_affiliation_strings":["D\u00e9partement de Cryptologie, La Roche Marguerite, Centre d\u2019\u00c9Lectronique de l\u2019ARmement, BP 57419, 35174, Bruz Cedex, France","Laboratoire de Virologie et Cryptologie, \u00c9cole Sup\u00e9rieure et d\u2019Application des Transmissions, BP 18, 35998, Rennes Cedex, France","Laboratoire de Virologie et Cryptologie, \u00c9cole Sup\u00e9rieure et d'Application des Transmissions, Rennes Cedex, France 35998 and D\u00e9partement de Cryptologie, La Roche Marguerite, Centre ...#TAB#"],"affiliations":[{"raw_affiliation_string":"D\u00e9partement de Cryptologie, La Roche Marguerite, Centre d\u2019\u00c9Lectronique de l\u2019ARmement, BP 57419, 35174, Bruz Cedex, France","institution_ids":["https://openalex.org/I95583923"]},{"raw_affiliation_string":"Laboratoire de Virologie et Cryptologie, \u00c9cole Sup\u00e9rieure et d\u2019Application des Transmissions, BP 18, 35998, Rennes Cedex, France","institution_ids":[]},{"raw_affiliation_string":"Laboratoire de Virologie et Cryptologie, \u00c9cole Sup\u00e9rieure et d'Application des Transmissions, Rennes Cedex, France 35998 and D\u00e9partement de Cryptologie, La Roche Marguerite, Centre ...#TAB#","institution_ids":["https://openalex.org/I55921689"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5053104075","display_name":"Kichenakoumar Mayoura","orcid":null},"institutions":[{"id":"https://openalex.org/I29607241","display_name":"\u00c9cole Normale Sup\u00e9rieure - PSL","ror":"https://ror.org/05a0dhs15","country_code":"FR","type":"funder","lineage":["https://openalex.org/I2746051580","https://openalex.org/I29607241"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Kichenakoumar Mayoura","raw_affiliation_strings":["Laboratoire de Virologie et Cryptologie, \u00c9cole Sup\u00e9rieure et d\u2019Application des Transmissions, BP 18, 35998, Rennes Cedex, France","Laboratoire de Virologie et Cryptologie, \u00c9cole Sup\u00e9rieure et d'Application des Transmissions, Rennes Cedex, France 35998#TAB#"],"affiliations":[{"raw_affiliation_string":"Laboratoire de Virologie et Cryptologie, \u00c9cole Sup\u00e9rieure et d\u2019Application des Transmissions, BP 18, 35998, Rennes Cedex, France","institution_ids":[]},{"raw_affiliation_string":"Laboratoire de Virologie et Cryptologie, \u00c9cole Sup\u00e9rieure et d'Application des Transmissions, Rennes Cedex, France 35998#TAB#","institution_ids":["https://openalex.org/I29607241"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5072623500"],"corresponding_institution_ids":["https://openalex.org/I55921689","https://openalex.org/I95583923"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.8838,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.74501992,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"99","last_page":"111"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.9722756743431091},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8548652529716492},{"id":"https://openalex.org/keywords/bit-plane","display_name":"Bit plane","score":0.8117257356643677},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8075045347213745},{"id":"https://openalex.org/keywords/steganography-tools","display_name":"Steganography tools","score":0.5535302758216858},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5104516744613647},{"id":"https://openalex.org/keywords/least-significant-bit","display_name":"Least significant bit","score":0.4786190390586853},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.47427472472190857},{"id":"https://openalex.org/keywords/bit","display_name":"Bit (key)","score":0.44331279397010803},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.4211725890636444},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.35933125019073486},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22806581854820251},{"id":"https://openalex.org/keywords/bit-field","display_name":"Bit field","score":0.0756945013999939},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.061791300773620605}],"concepts":[{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.9722756743431091},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8548652529716492},{"id":"https://openalex.org/C56056324","wikidata":"https://www.wikidata.org/wiki/Q878866","display_name":"Bit plane","level":4,"score":0.8117257356643677},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8075045347213745},{"id":"https://openalex.org/C13179402","wikidata":"https://www.wikidata.org/wiki/Q7606662","display_name":"Steganography tools","level":4,"score":0.5535302758216858},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5104516744613647},{"id":"https://openalex.org/C4305246","wikidata":"https://www.wikidata.org/wiki/Q3885225","display_name":"Least significant bit","level":2,"score":0.4786190390586853},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.47427472472190857},{"id":"https://openalex.org/C117011727","wikidata":"https://www.wikidata.org/wiki/Q1278488","display_name":"Bit (key)","level":2,"score":0.44331279397010803},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4211725890636444},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.35933125019073486},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22806581854820251},{"id":"https://openalex.org/C183383400","wikidata":"https://www.wikidata.org/wiki/Q2374485","display_name":"Bit field","level":3,"score":0.0756945013999939},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.061791300773620605},{"id":"https://openalex.org/C25197100","wikidata":"https://www.wikidata.org/wiki/Q890886","display_name":"Drilling","level":2,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-540-92238-4_9","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-92238-4_9","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W372779940","https://openalex.org/W1526973745","https://openalex.org/W1589812914","https://openalex.org/W1599408200","https://openalex.org/W1760530029","https://openalex.org/W1806317803","https://openalex.org/W1989550934","https://openalex.org/W2014516283","https://openalex.org/W2075652908","https://openalex.org/W2120024458","https://openalex.org/W2124022325","https://openalex.org/W2155447586","https://openalex.org/W2155962691","https://openalex.org/W2161022751","https://openalex.org/W2166143274","https://openalex.org/W2480664052","https://openalex.org/W2576355915","https://openalex.org/W2611745365","https://openalex.org/W3143468379","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2205085860","https://openalex.org/W2134958869","https://openalex.org/W2059133021","https://openalex.org/W2154118756","https://openalex.org/W2771684231","https://openalex.org/W129330134","https://openalex.org/W2158736088","https://openalex.org/W2977151837","https://openalex.org/W2101650951","https://openalex.org/W2014913808"],"abstract_inverted_index":null,"counts_by_year":[{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
