{"id":"https://openalex.org/W2064345582","doi":"https://doi.org/10.1109/aiccsa.2011.6126588","title":"A comparative study of PVD-based schemes for data hiding in digital images","display_name":"A comparative study of PVD-based schemes for data hiding in digital images","publication_year":2011,"publication_date":"2011-12-01","ids":{"openalex":"https://openalex.org/W2064345582","doi":"https://doi.org/10.1109/aiccsa.2011.6126588","mag":"2064345582"},"language":"en","primary_location":{"id":"doi:10.1109/aiccsa.2011.6126588","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiccsa.2011.6126588","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 9th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057893924","display_name":"El-Sayed M. El-Alfy","orcid":"https://orcid.org/0000-0001-6279-9776"},"institutions":[{"id":"https://openalex.org/I134085113","display_name":"King Fahd University of Petroleum and Minerals","ror":"https://ror.org/03yez3163","country_code":"SA","type":"education","lineage":["https://openalex.org/I134085113"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"El-Sayed M. El-Alfy","raw_affiliation_strings":["College of Computer Sciences and Engineering, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia","College of Computer Sciences and Engineering King Fahd University of Petroleum and Minerals, Dhahran 31261, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"College of Computer Sciences and Engineering, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]},{"raw_affiliation_string":"College of Computer Sciences and Engineering King Fahd University of Petroleum and Minerals, Dhahran 31261, Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067026104","display_name":"Azzat A. Al-Sadi","orcid":null},"institutions":[{"id":"https://openalex.org/I134085113","display_name":"King Fahd University of Petroleum and Minerals","ror":"https://ror.org/03yez3163","country_code":"SA","type":"education","lineage":["https://openalex.org/I134085113"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Azzat A. Al-Sadi","raw_affiliation_strings":["College of Computer Sciences and Engineering, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia","College of Computer Sciences and Engineering King Fahd University of Petroleum and Minerals, Dhahran 31261, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"College of Computer Sciences and Engineering, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]},{"raw_affiliation_string":"College of Computer Sciences and Engineering King Fahd University of Petroleum and Minerals, Dhahran 31261, Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5057893924"],"corresponding_institution_ids":["https://openalex.org/I134085113"],"apc_list":null,"apc_paid":null,"fwci":0.5236,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.6914887,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"144","last_page":"149"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8181977868080139},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7569394707679749},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.7340794801712036},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.7242701649665833},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6493723392486572},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.6453032493591309},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.5578345060348511},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5482193231582642},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5162186622619629},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.4753948450088501},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44220879673957825},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.4334200322628021},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.36766594648361206},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.34319403767585754},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3338072896003723},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.292572021484375},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.15322408080101013},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.13427650928497314}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8181977868080139},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7569394707679749},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.7340794801712036},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.7242701649665833},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6493723392486572},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.6453032493591309},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.5578345060348511},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5482193231582642},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5162186622619629},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.4753948450088501},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44220879673957825},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.4334200322628021},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.36766594648361206},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34319403767585754},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3338072896003723},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.292572021484375},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.15322408080101013},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.13427650928497314},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/aiccsa.2011.6126588","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiccsa.2011.6126588","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 9th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7799999713897705}],"awards":[],"funders":[{"id":"https://openalex.org/F4320322323","display_name":"King Fahd University of Petroleum and Minerals","ror":"https://ror.org/03yez3163"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1534614880","https://openalex.org/W1641371701","https://openalex.org/W1982422912","https://openalex.org/W2016226405","https://openalex.org/W2041560266","https://openalex.org/W2046423394","https://openalex.org/W2047069990","https://openalex.org/W2069233503","https://openalex.org/W2069314928","https://openalex.org/W2073449274","https://openalex.org/W2075652908","https://openalex.org/W2124890704","https://openalex.org/W2135965751","https://openalex.org/W2146621575","https://openalex.org/W2168782982","https://openalex.org/W6632113096"],"related_works":["https://openalex.org/W2356840395","https://openalex.org/W3203504906","https://openalex.org/W2497446005","https://openalex.org/W3190769222","https://openalex.org/W2171676767","https://openalex.org/W4312890355","https://openalex.org/W83713408","https://openalex.org/W1716757876","https://openalex.org/W4285356283","https://openalex.org/W4293373802"],"abstract_inverted_index":{"Unlike":[0],"data":[1,11,37,72],"encryption,":[2],"steganography":[3],"provides":[4,108],"a":[5,44,92],"crucial":[6],"means":[7],"for":[8,34],"hiding":[9],"confidential":[10],"into":[12,73],"cover":[13,85],"media":[14],"so":[15],"that":[16,38,96],"the":[17,25,50,67,80,84,101,114,117],"unauthorized":[18],"person":[19],"will":[20],"not":[21],"be":[22,41],"aware":[23],"of":[24,27,70,83,94,113],"existence":[26],"this":[28],"data.":[29],"This":[30,87],"is":[31],"particularly":[32],"useful":[33],"protecting":[35],"sensitive":[36],"needs":[39],"to":[40,65,90],"transmitted":[42],"over":[43],"public":[45],"access":[46],"network":[47],"such":[48],"as":[49],"Internet.":[51],"Several":[52],"schemes":[53],"have":[54],"been":[55],"proposed":[56],"based":[57],"on":[58,98],"pixel":[59,102],"value":[60,103],"differencing":[61,104],"with":[62],"an":[63],"attempt":[64],"increase":[66],"embedding":[68],"capacity":[69],"secret":[71],"digital":[74],"images":[75],"without":[76],"significant":[77],"loss":[78],"in":[79],"perceived":[81],"quality":[82],"images.":[86],"paper":[88],"aims":[89],"survey":[91],"number":[93],"methods":[95],"depend":[97],"or":[99],"extend":[100],"scheme.":[105],"It":[106],"also":[107],"empirical":[109],"comparison":[110],"and":[111],"discussion":[112],"differences":[115],"between":[116],"various":[118],"methods.":[119]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
