{"id":"https://openalex.org/W4313484685","doi":"https://doi.org/10.1109/acit57182.2022.9994148","title":"Digital Image Slicing to Strengthen the Security of LSB Technique of Encrypting Text Messages","display_name":"Digital Image Slicing to Strengthen the Security of LSB Technique of Encrypting Text Messages","publication_year":2022,"publication_date":"2022-11-22","ids":{"openalex":"https://openalex.org/W4313484685","doi":"https://doi.org/10.1109/acit57182.2022.9994148"},"language":"en","primary_location":{"id":"doi:10.1109/acit57182.2022.9994148","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit57182.2022.9994148","pdf_url":null,"source":{"id":"https://openalex.org/S4363608405","display_name":"2022 International Arab Conference on Information Technology (ACIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Arab Conference on Information Technology (ACIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048693125","display_name":"Mohamad Al-Laham","orcid":"https://orcid.org/0000-0002-5995-6336"},"institutions":[{"id":"https://openalex.org/I153687341","display_name":"Zarqa University","ror":"https://ror.org/01wf1es90","country_code":"JO","type":"education","lineage":["https://openalex.org/I153687341"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"Mohamad M Al-Laham","raw_affiliation_strings":["Albalqa university,Mangment information Systems,Amman,Jordan","Mangment information Systems, Albalqa university, Amman, Jordan"],"affiliations":[{"raw_affiliation_string":"Albalqa university,Mangment information Systems,Amman,Jordan","institution_ids":["https://openalex.org/I153687341"]},{"raw_affiliation_string":"Mangment information Systems, Albalqa university, Amman, Jordan","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086536501","display_name":"Firas Omar","orcid":"https://orcid.org/0000-0002-9313-0378"},"institutions":[{"id":"https://openalex.org/I36622005","display_name":"Petra University","ror":"https://ror.org/039d9es10","country_code":"JO","type":"education","lineage":["https://openalex.org/I36622005"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Firas Omar","raw_affiliation_strings":["Petra University,E-Business,Amman,Jordan","E-Business, Petra University, Amman, Jordan"],"affiliations":[{"raw_affiliation_string":"Petra University,E-Business,Amman,Jordan","institution_ids":["https://openalex.org/I36622005"]},{"raw_affiliation_string":"E-Business, Petra University, Amman, Jordan","institution_ids":["https://openalex.org/I36622005"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025189279","display_name":"Ziad Alqadi\ufeff","orcid":"https://orcid.org/0000-0003-4734-8605"},"institutions":[{"id":"https://openalex.org/I33926330","display_name":"Al-Balqa Applied University","ror":"https://ror.org/00qedmt22","country_code":"JO","type":"education","lineage":["https://openalex.org/I33926330"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Ziad A Alqadi","raw_affiliation_strings":["Al-balqa university,Computer Engineering,Amman,Jordan","Computer Engineering, Al-balqa university, Amman, Jordan"],"affiliations":[{"raw_affiliation_string":"Al-balqa university,Computer Engineering,Amman,Jordan","institution_ids":["https://openalex.org/I33926330"]},{"raw_affiliation_string":"Computer Engineering, Al-balqa university, Amman, Jordan","institution_ids":["https://openalex.org/I33926330"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5048693125"],"corresponding_institution_ids":["https://openalex.org/I153687341"],"apc_list":null,"apc_paid":null,"fwci":0.2399,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.60516184,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9368000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9368000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9162999987602234,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/least-significant-bit","display_name":"Least significant bit","score":0.9055813550949097},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7499613165855408},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6453639268875122},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5935351848602295},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.5291930437088013},{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.4926955997943878},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4768161177635193},{"id":"https://openalex.org/keywords/column","display_name":"Column (typography)","score":0.4646923243999481},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4608769714832306},{"id":"https://openalex.org/keywords/line","display_name":"Line (geometry)","score":0.42100614309310913},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4182093143463135},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.2630510926246643},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.17021444439888},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10681870579719543},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10597965121269226}],"concepts":[{"id":"https://openalex.org/C4305246","wikidata":"https://www.wikidata.org/wiki/Q3885225","display_name":"Least significant bit","level":2,"score":0.9055813550949097},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7499613165855408},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6453639268875122},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5935351848602295},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.5291930437088013},{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.4926955997943878},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4768161177635193},{"id":"https://openalex.org/C2780551164","wikidata":"https://www.wikidata.org/wiki/Q2306599","display_name":"Column (typography)","level":3,"score":0.4646923243999481},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4608769714832306},{"id":"https://openalex.org/C198352243","wikidata":"https://www.wikidata.org/wiki/Q37105","display_name":"Line (geometry)","level":2,"score":0.42100614309310913},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4182093143463135},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.2630510926246643},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.17021444439888},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10681870579719543},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10597965121269226},{"id":"https://openalex.org/C126042441","wikidata":"https://www.wikidata.org/wiki/Q1324888","display_name":"Frame (networking)","level":2,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/acit57182.2022.9994148","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit57182.2022.9994148","pdf_url":null,"source":{"id":"https://openalex.org/S4363608405","display_name":"2022 International Arab Conference on Information Technology (ACIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Arab Conference on Information Technology (ACIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7599999904632568,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2181446147","https://openalex.org/W828573108","https://openalex.org/W2303580201","https://openalex.org/W2902286438","https://openalex.org/W2343732178","https://openalex.org/W2993833576","https://openalex.org/W2776877297","https://openalex.org/W3125718803","https://openalex.org/W2127920220","https://openalex.org/W2962875264"],"abstract_inverted_index":{"Among":[0],"the":[1,12,41,51,57,65,93,105,137,140,171,181,187,195,199,209,213],"different":[2,87],"forms":[3,15],"of":[4,16,49,59,96,116,189,208],"social":[5],"media,":[6],"textmessages":[7,36],"are":[8,174],"known":[9],"to":[10,55,91,132,135,163,168,185,211],"be":[11,20,78],"most":[13],"extensivelydisseminated":[14],"information.":[17],"This":[18],"informationcould":[19],"private":[21,127],"or":[22,108],"sensitive":[23],"in":[24,37],"nature,":[25],"and":[26,70,88,98,126,151,192,194],"so":[27],"need":[28],"tobe":[29],"shielded":[30],"from":[31],"prying":[32],"eyes.":[33],"To":[34],"conceal":[35,136,164],"an":[38],"electronic":[39],"photograph,":[40],"LeastSignificant":[42],"Bit":[43],"(LSB)":[44],"technique":[45,179],"is":[46,53,130,161,183],"employed.":[47],"Themechanism":[48],"concealing":[50],"message":[52,107],"simpleenough":[54],"accomplish":[56],"process":[58],"concealingprivate":[60],"information":[61],"yet,":[62],"not":[63],"change":[64],"carrierImage.":[66],"Despite":[67],"its":[68,110],"simplicity":[69],"apparent":[71],"success":[72],"inhiding":[73],"things,":[74],"this":[75,81,145,202],"approach":[76,90],"must":[77],"used":[79,162,184],"cautiously.In":[80],"study,":[82],"we":[83],"will":[84,203],"examine":[85],"a":[86,113,177],"simpleto-implement":[89],"increase":[92],"LSB":[94,117],"method'slevel":[95],"security":[97],"blocking":[99],"any":[100],"attacker":[101],"attemptingto":[102],"spy":[103],"on":[104,123],"text":[106,200],"retrieving":[109],"content,while":[111],"maintaining":[112],"certain":[114],"level":[115],"method'sefficiency.":[118],"The":[119],"suggested":[120],"solution":[121],"relies":[122],"creating":[124],"asecret":[125],"key":[128,182],"that":[129,170],"difficult":[131],"crack":[133],"inorder":[134],"message.":[138],"Cutting":[139],"digitalImage":[141],"into":[142],"blocks":[143],"generates":[144],"key,":[146],"which":[147,160],"comprisesthe":[148],"block's":[149],"row":[150],"column":[152,193],"lengths":[153],"as":[154,156],"well":[155],"theblock's":[157],"image":[158],"size,":[159],"themessage":[165],"In":[166],"addition":[167],"ensure":[169],"sender":[172],"andreceiver":[173],"both":[175],"has":[176],"compatible":[178],"bywhich":[180],"define":[186],"length":[188],"eachblock":[190],"line":[191],"block":[196],"number":[197],"thatcontains":[198],"message,":[201],"also":[204],"set":[205],"aside":[206],"aportion":[207],"Image":[210],"store":[212],"key.":[214]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
