{"id":"https://openalex.org/W2031312397","doi":"https://doi.org/10.1109/cidm.2013.6597231","title":"Detecting pixel-value differencing steganography using Levenberg-Marquardt neural network","display_name":"Detecting pixel-value differencing steganography using Levenberg-Marquardt neural network","publication_year":2013,"publication_date":"2013-04-01","ids":{"openalex":"https://openalex.org/W2031312397","doi":"https://doi.org/10.1109/cidm.2013.6597231","mag":"2031312397"},"language":"en","primary_location":{"id":"doi:10.1109/cidm.2013.6597231","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cidm.2013.6597231","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE Symposium on Computational Intelligence and Data Mining (CIDM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057893924","display_name":"El-Sayed M. El-Alfy","orcid":"https://orcid.org/0000-0001-6279-9776"},"institutions":[{"id":"https://openalex.org/I134085113","display_name":"King Fahd University of Petroleum and Minerals","ror":"https://ror.org/03yez3163","country_code":"SA","type":"education","lineage":["https://openalex.org/I134085113"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"El-Sayed M. El-Alfy","raw_affiliation_strings":["College of Computer Sciences and Engineering, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia","King Fahd University of Petroleum and Minerals, College of Computer Sciences and Engineering, Dhahran 31261, Saudi Arabia#TAB#"],"affiliations":[{"raw_affiliation_string":"College of Computer Sciences and Engineering, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]},{"raw_affiliation_string":"King Fahd University of Petroleum and Minerals, College of Computer Sciences and Engineering, Dhahran 31261, Saudi Arabia#TAB#","institution_ids":["https://openalex.org/I134085113"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5057893924"],"corresponding_institution_ids":["https://openalex.org/I134085113"],"apc_list":null,"apc_paid":null,"fwci":0.8165,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.76128214,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"6","issue":null,"first_page":"160","last_page":"165"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8137834072113037},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7973611950874329},{"id":"https://openalex.org/keywords/gradient-descent","display_name":"Gradient descent","score":0.696076512336731},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.6752272844314575},{"id":"https://openalex.org/keywords/levenberg\u2013marquardt-algorithm","display_name":"Levenberg\u2013Marquardt algorithm","score":0.6692907810211182},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5726611614227295},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.5298305153846741},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.49636298418045044},{"id":"https://openalex.org/keywords/backpropagation","display_name":"Backpropagation","score":0.4914289712905884},{"id":"https://openalex.org/keywords/convergence","display_name":"Convergence (economics)","score":0.48541459441185},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.4675442576408386},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4434022307395935},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.434159517288208},{"id":"https://openalex.org/keywords/rate-of-convergence","display_name":"Rate of convergence","score":0.42765721678733826},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.4274228811264038},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.1506718099117279}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8137834072113037},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7973611950874329},{"id":"https://openalex.org/C153258448","wikidata":"https://www.wikidata.org/wiki/Q1199743","display_name":"Gradient descent","level":3,"score":0.696076512336731},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.6752272844314575},{"id":"https://openalex.org/C87578567","wikidata":"https://www.wikidata.org/wiki/Q1426494","display_name":"Levenberg\u2013Marquardt algorithm","level":3,"score":0.6692907810211182},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5726611614227295},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.5298305153846741},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.49636298418045044},{"id":"https://openalex.org/C155032097","wikidata":"https://www.wikidata.org/wiki/Q798503","display_name":"Backpropagation","level":3,"score":0.4914289712905884},{"id":"https://openalex.org/C2777303404","wikidata":"https://www.wikidata.org/wiki/Q759757","display_name":"Convergence (economics)","level":2,"score":0.48541459441185},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.4675442576408386},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4434022307395935},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.434159517288208},{"id":"https://openalex.org/C57869625","wikidata":"https://www.wikidata.org/wiki/Q1783502","display_name":"Rate of convergence","level":3,"score":0.42765721678733826},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.4274228811264038},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1506718099117279},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cidm.2013.6597231","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cidm.2013.6597231","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE Symposium on Computational Intelligence and Data Mining (CIDM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6600000262260437,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320322323","display_name":"King Fahd University of Petroleum and Minerals","ror":"https://ror.org/03yez3163"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1556531089","https://openalex.org/W1879023407","https://openalex.org/W1980758497","https://openalex.org/W1985749074","https://openalex.org/W1998058925","https://openalex.org/W2016226405","https://openalex.org/W2022649217","https://openalex.org/W2041560266","https://openalex.org/W2046423394","https://openalex.org/W2059136996","https://openalex.org/W2096110568","https://openalex.org/W2096933452","https://openalex.org/W2115936998","https://openalex.org/W2122710250","https://openalex.org/W2122942551","https://openalex.org/W2134172592","https://openalex.org/W2146621575","https://openalex.org/W2153615901","https://openalex.org/W2333907441","https://openalex.org/W2335888457","https://openalex.org/W2488544472","https://openalex.org/W4253000688","https://openalex.org/W4285719527","https://openalex.org/W6633472159","https://openalex.org/W6702639412","https://openalex.org/W6722687045"],"related_works":["https://openalex.org/W3048650638","https://openalex.org/W2115605526","https://openalex.org/W3164758156","https://openalex.org/W3093883775","https://openalex.org/W2379583542","https://openalex.org/W4321133157","https://openalex.org/W2207919472","https://openalex.org/W1539246760","https://openalex.org/W2786746258","https://openalex.org/W4225893763"],"abstract_inverted_index":{"With":[0],"the":[1,30,74,82,86,102],"wide":[2],"use":[3],"of":[4,77,85,101],"steganographic":[5,105],"techniques,":[6],"several":[7],"security":[8],"challenges":[9],"emerge,":[10],"e.g.":[11],"criminals":[12],"and":[13,26,36,81,118,125,139],"network":[14,34,58,130],"intruders":[15],"can":[16,155],"hide":[17],"any":[18],"information":[19],"they":[20],"want":[21],"into":[22],"legitimate":[23],"multimedia":[24],"data":[25],"exchange":[27],"it":[28],"over":[29],"Internet.":[31],"This":[32,66],"requires":[33],"designers":[35],"service":[37],"providers":[38],"to":[39,72,114,121],"investigate":[40],"new":[41],"tools":[42],"for":[43],"detecting":[44],"such":[45],"misuse.":[46],"In":[47],"this":[48],"paper,":[49],"we":[50],"explore":[51],"a":[52,128],"detection":[53,153],"method":[54],"based":[55],"on":[56,93],"neural":[57,129],"approach":[59,135],"with":[60,141,158],"Levenberg-Marquardt":[61],"back":[62,79],"propagation":[63,80],"learning":[64,67],"algorithm.":[65],"technique":[68],"has":[69],"been":[70],"known":[71,107],"overcome":[73],"slow":[75],"convergence":[76],"traditional":[78],"instability":[83],"problem":[84],"steepest":[87],"descent":[88],"optimization":[89],"method.":[90],"We":[91],"focus":[92],"digital":[94],"images":[95,116],"containing":[96],"messages":[97],"embedded":[98],"by":[99],"one":[100],"recently":[103],"proposed":[104,134],"methods,":[106],"as":[108],"pixel-value":[109],"differencing.":[110],"The":[111,133,146],"idea":[112],"is":[113,136],"analyze":[115],"before":[117],"after":[119],"embedding":[120],"extract":[122],"discriminating":[123],"features":[124],"then":[126],"build":[127],"recognition":[131],"model.":[132],"empirically":[137],"evaluated":[138],"compared":[140],"four":[142],"other":[143],"machine-learning":[144],"methods.":[145],"results":[147],"show":[148],"that":[149],"more":[150],"than":[151],"99%":[152],"rate":[154],"be":[156],"attained":[157],"very":[159],"few":[160],"false":[161],"alarms.":[162]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
