{"id":"https://openalex.org/W3211153845","doi":"https://doi.org/10.1109/access.2021.3125128","title":"Social Media and Steganography: Use, Risks and Current Status","display_name":"Social Media and Steganography: Use, Risks and Current Status","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3211153845","doi":"https://doi.org/10.1109/access.2021.3125128","mag":"3211153845"},"language":"en","primary_location":{"id":"doi:10.1109/access.2021.3125128","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3125128","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2021.3125128","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012913140","display_name":"R. Gurunath","orcid":null},"institutions":[{"id":"https://openalex.org/I48018076","display_name":"Christ University","ror":"https://ror.org/022tv9y30","country_code":"IN","type":"education","lineage":["https://openalex.org/I48018076"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"R. Gurunath","raw_affiliation_strings":["Department of Computer Science, CHRIST (Deemed to be) University, Bangalore, Karnataka, India","Department of Computer Science, CHRIST (Deemed to be University), Bengaluru, Karnataka, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, CHRIST (Deemed to be) University, Bangalore, Karnataka, India","institution_ids":["https://openalex.org/I48018076"]},{"raw_affiliation_string":"Department of Computer Science, CHRIST (Deemed to be University), Bengaluru, Karnataka, India","institution_ids":["https://openalex.org/I48018076"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005433219","display_name":"Mohammad F. J. Klaib","orcid":null},"institutions":[{"id":"https://openalex.org/I23075662","display_name":"Taibah University","ror":"https://ror.org/01xv1nn60","country_code":"SA","type":"education","lineage":["https://openalex.org/I23075662"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Mohammad Fadel Jamil Klaib","raw_affiliation_strings":["Department of Computer Science, Taibah University Madinah Al Munawara, Saudi Arabia","ORCiD","Department of Computer Science, Taibah University, Madinah Al Munawara, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Taibah University Madinah Al Munawara, Saudi Arabia","institution_ids":["https://openalex.org/I23075662"]},{"raw_affiliation_string":"ORCiD","institution_ids":[]},{"raw_affiliation_string":"Department of Computer Science, Taibah University, Madinah Al Munawara, Saudi Arabia","institution_ids":["https://openalex.org/I23075662"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027099057","display_name":"Debabrata Samanta","orcid":"https://orcid.org/0000-0003-4118-2480"},"institutions":[{"id":"https://openalex.org/I48018076","display_name":"Christ University","ror":"https://ror.org/022tv9y30","country_code":"IN","type":"education","lineage":["https://openalex.org/I48018076"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Debabrata Samanta","raw_affiliation_strings":["Department of Computer Science, CHRIST (Deemed to be) University, Bangalore, Karnataka, India","ORCiD","Department of Computer Science, CHRIST (Deemed to be University), Bengaluru, Karnataka, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, CHRIST (Deemed to be) University, Bangalore, Karnataka, India","institution_ids":["https://openalex.org/I48018076"]},{"raw_affiliation_string":"ORCiD","institution_ids":[]},{"raw_affiliation_string":"Department of Computer Science, CHRIST (Deemed to be University), Bengaluru, Karnataka, India","institution_ids":["https://openalex.org/I48018076"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018144959","display_name":"Mohammad Zubair Khan","orcid":"https://orcid.org/0000-0002-2409-7172"},"institutions":[{"id":"https://openalex.org/I23075662","display_name":"Taibah University","ror":"https://ror.org/01xv1nn60","country_code":"SA","type":"education","lineage":["https://openalex.org/I23075662"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Mohammad Zubair Khan","raw_affiliation_strings":["Department of Computer Science, Taibah University Madinah Al Munawara, Saudi Arabia. (e-mail: mkhanb@taibahu.edu.sa)","Department of Computer Science, Taibah University, Madinah Al Munawara, Saudi Arabia","ORCiD"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Taibah University Madinah Al Munawara, Saudi Arabia. (e-mail: mkhanb@taibahu.edu.sa)","institution_ids":["https://openalex.org/I23075662"]},{"raw_affiliation_string":"Department of Computer Science, Taibah University, Madinah Al Munawara, Saudi Arabia","institution_ids":["https://openalex.org/I23075662"]},{"raw_affiliation_string":"ORCiD","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5012913140"],"corresponding_institution_ids":["https://openalex.org/I48018076"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.9709,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.78039558,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"9","issue":null,"first_page":"153656","last_page":"153665"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8547183275222778},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.8503928184509277},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.759589672088623},{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.7456469535827637},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.7255288362503052},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.7082722783088684},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7060180306434631},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6126507520675659},{"id":"https://openalex.org/keywords/steganography-tools","display_name":"Steganography tools","score":0.5964953303337097},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.542595386505127},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.44808968901634216},{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.43774300813674927},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.34204721450805664},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.19501736760139465},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.08625942468643188}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8547183275222778},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.8503928184509277},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.759589672088623},{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.7456469535827637},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.7255288362503052},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.7082722783088684},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7060180306434631},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6126507520675659},{"id":"https://openalex.org/C13179402","wikidata":"https://www.wikidata.org/wiki/Q7606662","display_name":"Steganography tools","level":4,"score":0.5964953303337097},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.542595386505127},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.44808968901634216},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.43774300813674927},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.34204721450805664},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.19501736760139465},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.08625942468643188},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.0},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2021.3125128","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3125128","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:aa7900b11c8c4c58844895fe61fff062","is_oa":true,"landing_page_url":"https://doaj.org/article/aa7900b11c8c4c58844895fe61fff062","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 9, Pp 153656-153665 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2021.3125128","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3125128","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6200000047683716,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W2162174114","https://openalex.org/W2618218947","https://openalex.org/W2785886132","https://openalex.org/W2893556909","https://openalex.org/W2908162093","https://openalex.org/W2916048747","https://openalex.org/W2920220640","https://openalex.org/W2952070453","https://openalex.org/W2957062012","https://openalex.org/W2963828702","https://openalex.org/W2963849010","https://openalex.org/W2970579346","https://openalex.org/W2979792193","https://openalex.org/W2981863007","https://openalex.org/W3001446745","https://openalex.org/W3006014246","https://openalex.org/W3015749122","https://openalex.org/W3029493814","https://openalex.org/W3036102152","https://openalex.org/W3046507427","https://openalex.org/W3084404385","https://openalex.org/W3089349608","https://openalex.org/W3119691296","https://openalex.org/W3126341416","https://openalex.org/W3129832193","https://openalex.org/W3153659550","https://openalex.org/W3159557723","https://openalex.org/W3185797710","https://openalex.org/W3197040611","https://openalex.org/W4200092639","https://openalex.org/W6781577816"],"related_works":["https://openalex.org/W2154118756","https://openalex.org/W129330134","https://openalex.org/W1965991389","https://openalex.org/W2166431153","https://openalex.org/W2158736088","https://openalex.org/W1659544335","https://openalex.org/W2370747589","https://openalex.org/W1716757876","https://openalex.org/W1974279004","https://openalex.org/W2497446005"],"abstract_inverted_index":{"Steganography":[0,71,238],"or":[1],"data":[2,40],"hiding":[3],"is":[4,29,53,146,163,275],"used":[5,79,197],"to":[6,36,56,60,88,96,100,120,177],"protect":[7],"the":[8,13,20,46,49,73,83,121,137,147,180,188,206,235,244,248,254,270],"privacy":[9],"of":[10,45,128,144,149,166,217,237,247,253,257],"information":[11,21,47,150],"in":[12,107,228],"transit;":[14],"it":[15,153],"has":[16,154,260],"been":[17,155,261],"observed":[18],"that":[19,22,208],"flows":[23],"through":[24,72],"Online":[25,112],"Social":[26,113],"Networks":[27,114],"(OSN)":[28],"very":[30],"much":[31],"unsafe.":[32],"Therefore,":[33],"people":[34],"hesitate":[35],"communicate":[37,97],"their":[38],"sensitive":[39],"on":[41,48,198],"social":[42,51,90,104,190,218],"media..":[43],"Most":[44],"online":[50],"network":[52],"not":[54],"useful":[55],"users":[57,102],"and":[58,125,201,214,266],"appears":[59],"disregard":[61],"such":[62,194],"details.":[63],"People\u2019s":[64],"actions":[65],"provided":[66],"a":[67,93,164],"possibility":[68],"for":[69,80,158],"digital":[70],"Internet..":[74],"TCPIP":[75],"covert":[76,94,134],"channels":[77,135],"were":[78],"steganography":[81,145,192],"until":[82],"last":[84],"decade.":[85],"People":[86],"began":[87],"utilize":[89],"media":[91,105,191],"as":[92,103,133,195,203,205,220,222],"conduit":[95],"hidden":[98],"messages":[99],"targeted":[101],"grew":[106],"popularity.":[108],"There":[109],"are":[110,173,226],"numerous":[111],"accessible":[115],"nowadays,":[116],"ranging":[117],"from":[118],"Facebook":[119],"more":[122,157],"contemporary":[123],"Twitter":[124],"Instagram.":[126],"All":[127],"them":[129],"may":[130,240],"be":[131,241],"utilized":[132,156],"without":[136],"general":[138],"public":[139],"noticing.":[140],"The":[141,212],"primary":[142],"characteristic":[143],"protection":[148],"privacy;":[151],"nonetheless,":[152],"illicit":[159],"message":[160],"transmission,":[161],"which":[162],"source":[165],"concern.":[167],"To":[168],"make":[169],"matters":[170],"worse,":[171],"adversaries":[172],"using":[174,243],"steganalysis":[175],"techniques":[176],"mess":[178],"with":[179,263],"concealed":[181],"data.":[182],"In":[183],"this":[184,229],"article,":[185],"we":[186],"examine":[187],"different":[189],"techniques,":[193],"those":[196],"Facebook,":[199],"WhatsApp,":[200],"Twitter,":[202],"well":[204,221],"difficulties":[207],"these":[209],"approaches":[210],"raise.":[211],"positive":[213],"negative":[215],"consequences":[216],"media,":[219],"its":[223],"current":[224],"state,":[225],"discussed":[227],"study.":[230],"This":[231],"paper":[232],"discusses":[233],"how":[234],"performances":[236],"methods":[239],"assessed":[242],"Entropy":[245],"value":[246],"Stego":[249],"object.":[250],"A":[251],"look":[252],"three":[255],"features":[256],"steganography.":[258],"It":[259],"given":[262],"undetectability,":[264],"robustness,":[265],"payload":[267],"capacity.":[268],"Finally,":[269],"paper\u2019s":[271],"concept\u2019s":[272],"future":[273],"scope":[274],"explored.":[276]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
