{"id":"https://openalex.org/W3119790400","doi":"https://doi.org/10.1109/acit50332.2020.9300055","title":"Visual Steganography and Encryption Tachniques with Hardware Implementation","display_name":"Visual Steganography and Encryption Tachniques with Hardware Implementation","publication_year":2020,"publication_date":"2020-11-28","ids":{"openalex":"https://openalex.org/W3119790400","doi":"https://doi.org/10.1109/acit50332.2020.9300055","mag":"3119790400"},"language":"en","primary_location":{"id":"doi:10.1109/acit50332.2020.9300055","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit50332.2020.9300055","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 21st International Arab Conference on Information Technology (ACIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051098902","display_name":"Hare Ram Sah","orcid":"https://orcid.org/0000-0003-3640-0869"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Hare Ram Sah","raw_affiliation_strings":["Institute of Advanced Computing, SAGE University Indore, India"],"affiliations":[{"raw_affiliation_string":"Institute of Advanced Computing, SAGE University Indore, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018336941","display_name":"Hemang Shrivastava","orcid":"https://orcid.org/0009-0003-2423-0628"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hemang Shrivastava","raw_affiliation_strings":["Institute of Advanced Computing, SAGE University Indore, India"],"affiliations":[{"raw_affiliation_string":"Institute of Advanced Computing, SAGE University Indore, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082167418","display_name":"Manoj Ramaiya","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Manoj Ramaiya","raw_affiliation_strings":["Institute of Advanced Computing, SAGE University Indore, India"],"affiliations":[{"raw_affiliation_string":"Institute of Advanced Computing, SAGE University Indore, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5051098902"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.16380991,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2","issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.9383626580238342},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8330942392349243},{"id":"https://openalex.org/keywords/steganography-tools","display_name":"Steganography tools","score":0.8171648979187012},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8056873083114624},{"id":"https://openalex.org/keywords/thread","display_name":"Thread (computing)","score":0.5583961009979248},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.35569971799850464},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3252438008785248},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.30276942253112793},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.20224693417549133},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10769841074943542}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.9383626580238342},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8330942392349243},{"id":"https://openalex.org/C13179402","wikidata":"https://www.wikidata.org/wiki/Q7606662","display_name":"Steganography tools","level":4,"score":0.8171648979187012},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8056873083114624},{"id":"https://openalex.org/C138101251","wikidata":"https://www.wikidata.org/wiki/Q213092","display_name":"Thread (computing)","level":2,"score":0.5583961009979248},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.35569971799850464},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3252438008785248},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.30276942253112793},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.20224693417549133},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10769841074943542}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/acit50332.2020.9300055","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit50332.2020.9300055","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 21st International Arab Conference on Information Technology (ACIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1484239490","https://openalex.org/W1556757892","https://openalex.org/W1995653799","https://openalex.org/W2001095020","https://openalex.org/W2001336960","https://openalex.org/W2010861517","https://openalex.org/W2083122891","https://openalex.org/W2116025923","https://openalex.org/W2139864694","https://openalex.org/W2162105856","https://openalex.org/W2171673865","https://openalex.org/W2290518786","https://openalex.org/W6628929493"],"related_works":["https://openalex.org/W2560172240","https://openalex.org/W3146660591","https://openalex.org/W1995538220","https://openalex.org/W3020816551","https://openalex.org/W2338095724","https://openalex.org/W2804412098","https://openalex.org/W2186632617","https://openalex.org/W2548321233","https://openalex.org/W2188948172","https://openalex.org/W2154118756"],"abstract_inverted_index":{"The":[0,18],"visual":[1,24,52],"steganography":[2,22,25,53],"is":[3,27,37,74],"used":[4,38],"to":[5,59,76],"hide":[6],"secret":[7],"message":[8],"within":[9],"an":[10],"image":[11,30],"and":[12,42,54],"extracting":[13],"it":[14],"from":[15],"destination":[16],"image.":[17],"secure":[19],"forms":[20],"of":[21,46,63,66,84],"are":[23,57],"which":[26,87],"implemented":[28,75,90],"in":[29],"files.":[31],"For":[32],"securing":[33],"data":[34],"encryption":[35,55],"method":[36],"with":[39],"mathematical":[40],"concepts":[41],"achieves":[43],"higher":[44],"level":[45],"secured":[47],"communication.":[48],"Both":[49],"the":[50,69,78],"techniques":[51],"technique":[56],"combined":[58],"achieve":[60],"two":[61],"layer":[62],"security.":[64],"Instead":[65],"sequential":[67],"search,":[68],"thread":[70],"based":[71],"parallel":[72],"search":[73,86],"increase":[77],"retrieval":[79],"speed":[80],"at":[81],"high":[82],"rate":[83],"concurrent":[85],"can":[88],"be":[89],"on":[91],"any":[92],"real-time":[93],"architecture.":[94]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
