{"id":"https://openalex.org/W4414196880","doi":"https://doi.org/10.1109/access.2025.3609789","title":"Exploiting Human Visual Limitations for High Capacity Information Hiding in Digital Images Using Alpha Channel","display_name":"Exploiting Human Visual Limitations for High Capacity Information Hiding in Digital Images Using Alpha Channel","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4414196880","doi":"https://doi.org/10.1109/access.2025.3609789"},"language":"en","primary_location":{"id":"doi:10.1109/access.2025.3609789","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3609789","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2025.3609789","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036544225","display_name":"Mohsin Shah","orcid":"https://orcid.org/0000-0003-2227-9797"},"institutions":[{"id":"https://openalex.org/I12832649","display_name":"Gachon University","ror":"https://ror.org/03ryywt80","country_code":"KR","type":"education","lineage":["https://openalex.org/I12832649"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Mohsin Shah","raw_affiliation_strings":["Department of Computer Engineering, Gachon University, Seongnam-si, Gyeonggi-do, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Gachon University, Seongnam-si, Gyeonggi-do, Republic of Korea","institution_ids":["https://openalex.org/I12832649"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013248212","display_name":"Sokjoon Lee","orcid":"https://orcid.org/0000-0002-4632-8322"},"institutions":[{"id":"https://openalex.org/I12832649","display_name":"Gachon University","ror":"https://ror.org/03ryywt80","country_code":"KR","type":"education","lineage":["https://openalex.org/I12832649"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Sokjoon Lee","raw_affiliation_strings":["Department of Smart Security, Gachon University, Seongnam-si, Gyeonggi-do, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Smart Security, Gachon University, Seongnam-si, Gyeonggi-do, Republic of Korea","institution_ids":["https://openalex.org/I12832649"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001422612","display_name":"Muhammad Nawaz Khan","orcid":"https://orcid.org/0000-0002-6682-7049"},"institutions":[{"id":"https://openalex.org/I12832649","display_name":"Gachon University","ror":"https://ror.org/03ryywt80","country_code":"KR","type":"education","lineage":["https://openalex.org/I12832649"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Muhammad Nawaz Khan","raw_affiliation_strings":["Department of Smart Security, Gachon University, Seongnam-si, Gyeonggi-do, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Smart Security, Gachon University, Seongnam-si, Gyeonggi-do, Republic of Korea","institution_ids":["https://openalex.org/I12832649"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080554401","display_name":"Hyeokchan Kwon","orcid":"https://orcid.org/0000-0002-4120-5999"},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Hyeokchan Kwon","raw_affiliation_strings":["Cyber Security Research Division, Electronics and Telecommunications Research Institute, Yuseong-gu, Daejeon, Republic of Korea","Cyber Security Research Division, Electronics and Telecommunications Research Institute, 218 Gajeong-ro, Yuseong-gu, Daejeon, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Cyber Security Research Division, Electronics and Telecommunications Research Institute, Yuseong-gu, Daejeon, Republic of Korea","institution_ids":["https://openalex.org/I142401562"]},{"raw_affiliation_string":"Cyber Security Research Division, Electronics and Telecommunications Research Institute, 218 Gajeong-ro, Yuseong-gu, Daejeon, Republic of Korea","institution_ids":["https://openalex.org/I142401562"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5036544225"],"corresponding_institution_ids":["https://openalex.org/I12832649"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.23364581,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":null,"first_page":"162933","last_page":"162946"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9577000141143799,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9577000141143799,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.84170001745224},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.8364999890327454},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.6276999711990356},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.6136999726295471},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5990999937057495},{"id":"https://openalex.org/keywords/human-visual-system-model","display_name":"Human visual system model","score":0.5533000230789185},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4810999929904938},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.45829999446868896},{"id":"https://openalex.org/keywords/image-quality","display_name":"Image quality","score":0.4318999946117401}],"concepts":[{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.84170001745224},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.8364999890327454},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.801800012588501},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.6276999711990356},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.6136999726295471},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5990999937057495},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.572700023651123},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5631999969482422},{"id":"https://openalex.org/C160086991","wikidata":"https://www.wikidata.org/wiki/Q5939193","display_name":"Human visual system model","level":3,"score":0.5533000230789185},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4810999929904938},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.45829999446868896},{"id":"https://openalex.org/C55020928","wikidata":"https://www.wikidata.org/wiki/Q3813865","display_name":"Image quality","level":3,"score":0.4318999946117401},{"id":"https://openalex.org/C64943373","wikidata":"https://www.wikidata.org/wiki/Q2651003","display_name":"Alpha (finance)","level":4,"score":0.4253999888896942},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.4124000072479248},{"id":"https://openalex.org/C42781572","wikidata":"https://www.wikidata.org/wiki/Q1250322","display_name":"Digital image","level":4,"score":0.3813999891281128},{"id":"https://openalex.org/C25343380","wikidata":"https://www.wikidata.org/wiki/Q277521","display_name":"Relation (database)","level":2,"score":0.37119999527931213},{"id":"https://openalex.org/C4305246","wikidata":"https://www.wikidata.org/wiki/Q3885225","display_name":"Least significant bit","level":2,"score":0.3138999938964844},{"id":"https://openalex.org/C105842133","wikidata":"https://www.wikidata.org/wiki/Q1899679","display_name":"Visual communication","level":2,"score":0.3005000054836273},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.298799991607666},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2930000126361847},{"id":"https://openalex.org/C159620131","wikidata":"https://www.wikidata.org/wiki/Q1938983","display_name":"Spatial analysis","level":2,"score":0.2867000102996826},{"id":"https://openalex.org/C205372480","wikidata":"https://www.wikidata.org/wiki/Q210521","display_name":"Image resolution","level":2,"score":0.2660999894142151},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.26109999418258667},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.2542000114917755}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2025.3609789","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3609789","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:4a7b1f257f954c1a81f37248c9824336","is_oa":true,"landing_page_url":"https://doaj.org/article/4a7b1f257f954c1a81f37248c9824336","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 13, Pp 162933-162946 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2025.3609789","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3609789","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1306404972","display_name":null,"funder_award_id":"RS-2023-00241376","funder_id":"https://openalex.org/F4320335489","funder_display_name":"Institute for Information and Communications Technology Promotion"},{"id":"https://openalex.org/G3929022770","display_name":null,"funder_award_id":"RS-2024-00396797","funder_id":"https://openalex.org/F4320335489","funder_display_name":"Institute for Information and Communications Technology Promotion"}],"funders":[{"id":"https://openalex.org/F4320335489","display_name":"Institute for Information and Communications Technology Promotion","ror":"https://ror.org/01g0hqq23"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Information":[0],"hiding":[1,62],"in":[2,12,30,112,123,131,165],"digital":[3],"images":[4,154],"is":[5,138],"a":[6,55],"critical":[7],"technique":[8],"for":[9,49],"secure":[10],"communication":[11],"the":[13,31,43,46,67,79,82,135,157],"era":[14],"of":[15,45,69],"high-volume":[16],"multimedia":[17],"exchange.":[18],"While":[19],"many":[20],"existing":[21,163],"methods":[22,164],"embed":[23,109,121],"secret":[24],"data":[25,50,111],"by":[26],"modifying":[27],"image":[28],"parameters":[29],"spatial":[32],"or":[33],"frequency":[34],"domains,":[35],"they":[36],"often":[37],"overlook":[38],"local":[39],"pixel":[40,74],"characteristics":[41],"and":[42,95,115,125],"potential":[44],"alpha":[47,136],"channel":[48,137],"embedding.":[51],"This":[52],"paper":[53],"proposes":[54],"flexible":[56],"Least":[57],"Significant":[58],"Bit":[59],"(LSB)":[60],"information":[61],"framework":[63,83,160],"that":[64,156],"adaptively":[65],"adjusts":[66],"number":[68],"embedded":[70],"bits":[71,91],"based":[72],"on":[73,151],"intensity":[75],"ranges.":[76],"By":[77],"configuring":[78],"embedding":[80,143,166],"function,":[81],"can":[84],"support":[85],"multiple":[86],"strategies:":[87],"(i)":[88],"allocating":[89],"more":[90,110,122],"to":[92,97,108,120,140],"low-intensity":[93],"regions":[94,127],"fewer":[96],"high-intensity":[98,113,126],"ones,":[99],"(ii)":[100],"leveraging":[101],"Weber\u2019s":[102],"Just":[103],"Noticeable":[104],"Difference":[105],"(JND)":[106],"principle":[107],"pixels,":[114],"(iii)":[116],"combining":[117],"both":[118],"approaches":[119],"low-":[124],"while":[128,145,168],"reducing":[129],"payload":[130],"mid-intensity":[132],"regions.":[133],"Additionally,":[134],"exploited":[139],"further":[141],"enhance":[142],"capacity":[144],"preserving":[146],"visual":[147,171],"fidelity.":[148],"Experimental":[149],"results":[150],"standard":[152],"test":[153],"demonstrate":[155],"proposed":[158],"adaptive":[159],"significantly":[161],"outperforms":[162],"capacity,":[167],"maintaining":[169],"high":[170],"quality":[172],"with":[173],"PSNR":[174],"values":[175],"consistently":[176],"above":[177],"practical":[178],"thresholds.":[179]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
