{"id":"https://openalex.org/W4312549659","doi":"https://doi.org/10.1109/access.2022.3224745","title":"A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method","display_name":"A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4312549659","doi":"https://doi.org/10.1109/access.2022.3224745"},"language":"en","primary_location":{"id":"doi:10.1109/access.2022.3224745","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3224745","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09963925.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09963925.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090719760","display_name":"Shahid Rahman","orcid":"https://orcid.org/0000-0002-4343-7187"},"institutions":[{"id":"https://openalex.org/I4210145034","display_name":"Qurtuba University of Science and Information Technology","ror":"https://ror.org/04ke3vc41","country_code":"PK","type":"education","lineage":["https://openalex.org/I4210145034"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Shahid Rahman","raw_affiliation_strings":["Department of Computer Science, Qurtuba University of Science and Information Technology, Dera Ismail Khan, Pakistan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Qurtuba University of Science and Information Technology, Dera Ismail Khan, Pakistan","institution_ids":["https://openalex.org/I4210145034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021931891","display_name":"Jamal Uddin","orcid":"https://orcid.org/0000-0001-5618-8469"},"institutions":[{"id":"https://openalex.org/I4210145034","display_name":"Qurtuba University of Science and Information Technology","ror":"https://ror.org/04ke3vc41","country_code":"PK","type":"education","lineage":["https://openalex.org/I4210145034"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Jamal Uddin","raw_affiliation_strings":["Department of Computer Science, Qurtuba University of Science and Information Technology, Dera Ismail Khan, Pakistan"],"raw_orcid":"https://orcid.org/0000-0001-5618-8469","affiliations":[{"raw_affiliation_string":"Department of Computer Science, Qurtuba University of Science and Information Technology, Dera Ismail Khan, Pakistan","institution_ids":["https://openalex.org/I4210145034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091086588","display_name":"Habib Ullah Khan","orcid":"https://orcid.org/0000-0001-8373-2781"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Habib Ullah Khan","raw_affiliation_strings":["Department of Accounting and Information Systems, College of Business and Economics, Qatar University, Doha, Qatar"],"raw_orcid":"https://orcid.org/0000-0001-8373-2781","affiliations":[{"raw_affiliation_string":"Department of Accounting and Information Systems, College of Business and Economics, Qatar University, Doha, Qatar","institution_ids":["https://openalex.org/I60342839"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003815049","display_name":"Hameed Hussain","orcid":"https://orcid.org/0000-0002-2003-940X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hameed Hussain","raw_affiliation_strings":["Department of Computer Science, The University of Buner, Buner, Pakistan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, The University of Buner, Buner, Pakistan","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081010414","display_name":"Ayaz Ali Khan","orcid":"https://orcid.org/0000-0002-2793-858X"},"institutions":[{"id":"https://openalex.org/I87482320","display_name":"University of Management and Technology","ror":"https://ror.org/0095xcq10","country_code":"PK","type":"education","lineage":["https://openalex.org/I87482320"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Ayaz Ali Khan","raw_affiliation_strings":["Department of Computer Science, University of Lakki Marwat, Lakki Marwat, Pakistan"],"raw_orcid":"https://orcid.org/0000-0002-2793-858X","affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Lakki Marwat, Lakki Marwat, Pakistan","institution_ids":["https://openalex.org/I87482320"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012944437","display_name":"Muhammad Zakarya","orcid":"https://orcid.org/0000-0001-7070-6699"},"institutions":[{"id":"https://openalex.org/I181063083","display_name":"Abdul Wali Khan University Mardan","ror":"https://ror.org/03b9y4e65","country_code":"PK","type":"education","lineage":["https://openalex.org/I181063083"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Muhammad Zakarya","raw_affiliation_strings":["Department of Computer Science, Abdul Wali Khan University Mardan, Mardan, Pakistan"],"raw_orcid":"https://orcid.org/0000-0001-7070-6699","affiliations":[{"raw_affiliation_string":"Department of Computer Science, Abdul Wali Khan University Mardan, Mardan, Pakistan","institution_ids":["https://openalex.org/I181063083"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5090719760"],"corresponding_institution_ids":["https://openalex.org/I4210145034"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":4.0644,"has_fulltext":true,"cited_by_count":46,"citation_normalized_percentile":{"value":0.95220025,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"10","issue":null,"first_page":"124053","last_page":"124075"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8957959413528442},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8329756259918213},{"id":"https://openalex.org/keywords/least-significant-bit","display_name":"Least significant bit","score":0.6901279091835022},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5467743277549744},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5318897366523743},{"id":"https://openalex.org/keywords/steganography-tools","display_name":"Steganography tools","score":0.4934634268283844},{"id":"https://openalex.org/keywords/data-transmission","display_name":"Data transmission","score":0.47289028763771057},{"id":"https://openalex.org/keywords/digital-image","display_name":"Digital image","score":0.4658929109573364},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.4351557493209839},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4205440580844879},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.4159366488456726},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.40544116497039795},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3436114192008972},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.3294060230255127},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.31162384152412415},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.29408371448516846},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.23243603110313416},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.21565982699394226}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8957959413528442},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8329756259918213},{"id":"https://openalex.org/C4305246","wikidata":"https://www.wikidata.org/wiki/Q3885225","display_name":"Least significant bit","level":2,"score":0.6901279091835022},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5467743277549744},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5318897366523743},{"id":"https://openalex.org/C13179402","wikidata":"https://www.wikidata.org/wiki/Q7606662","display_name":"Steganography tools","level":4,"score":0.4934634268283844},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.47289028763771057},{"id":"https://openalex.org/C42781572","wikidata":"https://www.wikidata.org/wiki/Q1250322","display_name":"Digital image","level":4,"score":0.4658929109573364},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.4351557493209839},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4205440580844879},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.4159366488456726},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.40544116497039795},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3436114192008972},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.3294060230255127},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.31162384152412415},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.29408371448516846},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.23243603110313416},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.21565982699394226},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/access.2022.3224745","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3224745","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09963925.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:9c5c36c8c012446681b45f364156e801","is_oa":true,"landing_page_url":"https://doaj.org/article/9c5c36c8c012446681b45f364156e801","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 10, Pp 124053-124075 (2022)","raw_type":"article"},{"id":"pmh:oai:figshare.com:article/24056301","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/A_Novel_Steganography_Technique_for_Digital_Images_Using_the_Least_Significant_Bit_Substitution_Method/24056301","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},{"id":"pmh:oai:qspace.qu.edu.qa:10576/54112","is_oa":false,"landing_page_url":"http://hdl.handle.net/10576/54112","pdf_url":null,"source":{"id":"https://openalex.org/S4306400014","display_name":"Qatar University QSpace (Qatar University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I60342839","host_organization_name":"Qatar University","host_organization_lineage":["https://openalex.org/I60342839"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"}],"best_oa_location":{"id":"doi:10.1109/access.2022.3224745","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3224745","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09963925.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1032608227","display_name":null,"funder_award_id":"IRCC-2021-010","funder_id":"https://openalex.org/F4320309815","funder_display_name":"Qatar Foundation"},{"id":"https://openalex.org/G2593933118","display_name":null,"funder_award_id":"IRCC-2021-010","funder_id":"https://openalex.org/F4320322472","funder_display_name":"Qatar University"}],"funders":[{"id":"https://openalex.org/F4320309815","display_name":"Qatar Foundation","ror":"https://ror.org/01cawbq05"},{"id":"https://openalex.org/F4320322472","display_name":"Qatar University","ror":"https://ror.org/00yhnba62"},{"id":"https://openalex.org/F4320334468","display_name":"Qatar National Library","ror":"https://ror.org/02jv93662"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4312549659.pdf","grobid_xml":"https://content.openalex.org/works/W4312549659.grobid-xml"},"referenced_works_count":37,"referenced_works":["https://openalex.org/W1760182598","https://openalex.org/W2022747097","https://openalex.org/W2041426082","https://openalex.org/W2049703184","https://openalex.org/W2057475819","https://openalex.org/W2096050104","https://openalex.org/W2111282197","https://openalex.org/W2118296934","https://openalex.org/W2145636305","https://openalex.org/W2296056180","https://openalex.org/W2318413963","https://openalex.org/W2736455588","https://openalex.org/W2805249073","https://openalex.org/W2900141423","https://openalex.org/W2914517108","https://openalex.org/W2914923289","https://openalex.org/W2938275879","https://openalex.org/W2962583447","https://openalex.org/W2996785075","https://openalex.org/W3003921256","https://openalex.org/W3030392886","https://openalex.org/W3086149171","https://openalex.org/W3097192538","https://openalex.org/W3120866035","https://openalex.org/W3127746873","https://openalex.org/W3142067920","https://openalex.org/W3181370845","https://openalex.org/W3197205161","https://openalex.org/W4212764377","https://openalex.org/W4239092273","https://openalex.org/W4255039382","https://openalex.org/W4288732578","https://openalex.org/W6681721475","https://openalex.org/W6697014570","https://openalex.org/W6758783540","https://openalex.org/W6772165159","https://openalex.org/W6798490562"],"related_works":["https://openalex.org/W2049703184","https://openalex.org/W2977151837","https://openalex.org/W2158736088","https://openalex.org/W2181427603","https://openalex.org/W2409080236","https://openalex.org/W2796470635","https://openalex.org/W2347929411","https://openalex.org/W2238140690","https://openalex.org/W2047695298","https://openalex.org/W4214583425"],"abstract_inverted_index":{"Communication":[0],"has":[1,25,50,113],"become":[2,26],"a":[3,188,264,272,306,311],"lot":[4],"easier":[5],"in":[6,80,144,166,174,191,253,269,278,291,297,310],"this":[7,145,184],"era":[8],"of":[9,12,20,65,95,137,221,233,255,275,289,293,305,328],"technology,":[10],"development":[11],"highspeed":[13],"computer":[14],"networks,":[15],"and":[16,29,60,62,101,116,118,169,211,229,319],"the":[17,46,54,58,63,93,131,134,141,150,163,194,222,231,242,246,260,286],"inexpensive":[18],"uses":[19],"Internet.":[21,47],"Therefore,":[22,140],"data":[23,42,66],"transmission":[24,64],"vulnerable":[27],"to":[28,39,82,122,129,205],"unsafe":[30],"from":[31],"different":[32,303,312],"external":[33],"attacks.":[34],"Every":[35],"communication":[36,79],"body":[37],"wants":[38],"secure":[40,78],"their":[41,114],"while":[43],"communicating":[44],"over":[45,67],"The":[48,157,218],"internet":[49],"various":[51],"benefits":[52],"but":[53,111],"main":[55],"demerit":[56],"is":[57,92,147,198],"privacy":[59],"security":[61],"insecure":[68],"network":[69],"or":[70],"channel":[71],"may":[72],"happen.":[73],"Various":[74],"techniques":[75],"used":[76],"for":[77],"order":[81],"address":[83],"these":[84],"issues,":[85],"steganography":[86,105,127,192],"plays":[87],"an":[88],"important":[89],"role.":[90],"Steganography":[91],"process":[94,168],"obfuscation":[96],"that":[97,241],"makes":[98],"something":[99],"incomprehensible":[100],"unclear.":[102],"Different":[103],"image":[104,126,138,313],"research":[106],"methods":[107],"are":[108],"proposed":[109,142,187,243,261],"recently":[110],"each":[112],"advantages":[115],"disadvantages":[117],"still":[119],"have":[120],"necessity":[121],"develop":[123],"some":[124],"better":[125,267,329],"mechanisms":[128],"achieve":[130,171,206],"reliability":[132,173],"between":[133],"basics":[135],"criteria":[136],"steganography.":[139],"work,":[143],"paper,":[146,185],"based":[148,179],"on":[149,180],"Least":[151],"Significant":[152],"Bit":[153],"(LSB)":[154],"substitution":[155,159],"method.":[156],"LSB":[158],"method":[160],"can":[161,170],"minimize":[162],"error":[164],"rate":[165],"embedding":[167],"greater":[172],"criteria,":[175],"using":[176],"novel":[177,189],"algorithm":[178],"value":[181],"difference.":[182],"In":[183],"we":[186,239],"technique":[190],"within":[193],"digital":[195],"images":[196,204,280,292],"such":[197],"RGB,":[199],"Gray":[200],"Scale,":[201],"Texture,":[202,317],"Aerial":[203,318],"higher":[207],"security,":[208],"imperceptibility,":[209],"capacity,":[210],"robustness":[212],"as":[213,315],"compared":[214],"with":[215,271,281,324],"existing":[216],"methods.":[217],"experimental":[219],"outcomes":[220],"suggested":[223],"approach":[224,262],"prove":[225],"further":[226],"developed":[227],"strength":[228],"justify":[230],"feasibility":[232],"our":[234],"research.":[235],"Through":[236],"numerical":[237],"simulations,":[238],"observed":[240],"strategy":[244],"outperformed":[245],"next-best":[247],"current":[248],"methodology":[249],"by":[250],"5.561":[251],"percent":[252,266,300,327],"terms":[254],"PSNR":[256,270],"Correlation":[257],"score.":[258,330],"Additionally,":[259],"achieved":[263],"6.43":[265],"score":[268],"variable":[273],"measure":[274],"code":[276],"inserted":[277],"similar":[279],"distinct":[282],"dimensions.":[283],"Furthermore,":[284],"encrypting":[285],"same":[287],"amount":[288],"information":[290],"varying":[294],"sizes":[295,304],"resulted":[296],"approximately":[298],"6.77":[299],"improvements.":[301],"Embedding":[302],"particular":[307],"secret":[308],"message":[309],"(such":[314],"Gray,":[316],"RGB":[320],"images)":[321],"came":[322],"out":[323],"about":[325],"5.466":[326]},"counts_by_year":[{"year":2026,"cited_by_count":6},{"year":2025,"cited_by_count":16},{"year":2024,"cited_by_count":16},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
