{"id":"https://openalex.org/W1996964086","doi":"https://doi.org/10.1016/s0167-4048(02)00515-1","title":"Steganographic Method for Secure Communications","display_name":"Steganographic Method for Secure Communications","publication_year":2002,"publication_date":"2002-09-17","ids":{"openalex":"https://openalex.org/W1996964086","doi":"https://doi.org/10.1016/s0167-4048(02)00515-1","mag":"1996964086"},"language":"en","primary_location":{"id":"doi:10.1016/s0167-4048(02)00515-1","is_oa":false,"landing_page_url":"https://doi.org/10.1016/s0167-4048(02)00515-1","pdf_url":null,"source":{"id":"https://openalex.org/S12529635","display_name":"Computers & Security","issn_l":"0167-4048","issn":["0167-4048","1872-6208"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers &amp; Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017883735","display_name":"Der\u2010Chyuan Lou","orcid":"https://orcid.org/0000-0001-6697-7648"},"institutions":[{"id":"https://openalex.org/I4210094862","display_name":"National Defense University","ror":"https://ror.org/00hkj1v53","country_code":"TW","type":"education","lineage":["https://openalex.org/I4210094862"]},{"id":"https://openalex.org/I111149068","display_name":"National Defense University","ror":"https://ror.org/01nqk4x38","country_code":"US","type":"education","lineage":["https://openalex.org/I111149068"]}],"countries":["TW","US"],"is_corresponding":true,"raw_author_name":"Der-Chyuan Lou","raw_affiliation_strings":["Department of Electrical Engineering Chung Cheng Institute of Technology National Defense University Tahsi, Taoyuan 33509, Taiwan","Department of Electrical Engineering, Chung Cheng Institute of Technology, National Defense University, Tahsi, Taoyuan 33509, Taiwan#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering Chung Cheng Institute of Technology National Defense University Tahsi, Taoyuan 33509, Taiwan","institution_ids":["https://openalex.org/I4210094862"]},{"raw_affiliation_string":"Department of Electrical Engineering, Chung Cheng Institute of Technology, National Defense University, Tahsi, Taoyuan 33509, Taiwan#TAB#","institution_ids":["https://openalex.org/I111149068"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010826026","display_name":"Jiang-Lung Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I111149068","display_name":"National Defense University","ror":"https://ror.org/01nqk4x38","country_code":"US","type":"education","lineage":["https://openalex.org/I111149068"]},{"id":"https://openalex.org/I4210094862","display_name":"National Defense University","ror":"https://ror.org/00hkj1v53","country_code":"TW","type":"education","lineage":["https://openalex.org/I4210094862"]}],"countries":["TW","US"],"is_corresponding":false,"raw_author_name":"Jiang-Lung Liu","raw_affiliation_strings":["Department of Electrical Engineering Chung Cheng Institute of Technology National Defense University Tahsi, Taoyuan 33509, Taiwan","Department of Electrical Engineering, Chung Cheng Institute of Technology, National Defense University, Tahsi, Taoyuan 33509, Taiwan#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering Chung Cheng Institute of Technology National Defense University Tahsi, Taoyuan 33509, Taiwan","institution_ids":["https://openalex.org/I4210094862"]},{"raw_affiliation_string":"Department of Electrical Engineering, Chung Cheng Institute of Technology, National Defense University, Tahsi, Taoyuan 33509, Taiwan#TAB#","institution_ids":["https://openalex.org/I111149068"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5017883735"],"corresponding_institution_ids":["https://openalex.org/I111149068","https://openalex.org/I4210094862"],"apc_list":{"value":3190,"currency":"USD","value_usd":3190},"apc_paid":null,"fwci":1.6309,"has_fulltext":false,"cited_by_count":65,"citation_normalized_percentile":{"value":0.84907423,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"21","issue":"5","first_page":"449","last_page":"460"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9860000014305115,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.857323408126831},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8361949920654297},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.7845314741134644},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6880599856376648},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6282806992530823},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.5694844126701355},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5415421724319458},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.5017704963684082},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.383828729391098},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.33450090885162354},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.2242179811000824},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.19159147143363953}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.857323408126831},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8361949920654297},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.7845314741134644},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6880599856376648},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6282806992530823},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.5694844126701355},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5415421724319458},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.5017704963684082},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.383828729391098},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33450090885162354},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.2242179811000824},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.19159147143363953},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1016/s0167-4048(02)00515-1","is_oa":false,"landing_page_url":"https://doi.org/10.1016/s0167-4048(02)00515-1","pdf_url":null,"source":{"id":"https://openalex.org/S12529635","display_name":"Computers & Security","issn_l":"0167-4048","issn":["0167-4048","1872-6208"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers &amp; Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5099999904632568}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W161402390","https://openalex.org/W1486248847","https://openalex.org/W1565757079","https://openalex.org/W1988255533","https://openalex.org/W2001792341","https://openalex.org/W2040903332","https://openalex.org/W2057475819","https://openalex.org/W2124890704","https://openalex.org/W2138760583","https://openalex.org/W2150010995","https://openalex.org/W2157624084","https://openalex.org/W2159390040","https://openalex.org/W2295555613","https://openalex.org/W2506763343","https://openalex.org/W3142067920","https://openalex.org/W3199461601","https://openalex.org/W4240221988","https://openalex.org/W6801435285"],"related_works":["https://openalex.org/W2588780717","https://openalex.org/W2732488017","https://openalex.org/W2891774131","https://openalex.org/W1604915031","https://openalex.org/W3089223619","https://openalex.org/W4288849478","https://openalex.org/W2940752727","https://openalex.org/W2050704528","https://openalex.org/W2613922291","https://openalex.org/W1561797008"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":5},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
