{"id":"https://openalex.org/W2066085064","doi":"https://doi.org/10.1109/coginf.2010.5599777","title":"Predicting embedding strength in audio steganography","display_name":"Predicting embedding strength in audio steganography","publication_year":2010,"publication_date":"2010-07-01","ids":{"openalex":"https://openalex.org/W2066085064","doi":"https://doi.org/10.1109/coginf.2010.5599777","mag":"2066085064"},"language":"en","primary_location":{"id":"doi:10.1109/coginf.2010.5599777","is_oa":false,"landing_page_url":"https://doi.org/10.1109/coginf.2010.5599777","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"9th IEEE International Conference on Cognitive Informatics (ICCI'10)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058970043","display_name":"Mengyu Qiao","orcid":null},"institutions":[{"id":"https://openalex.org/I207123951","display_name":"New Mexico Institute of Mining and Technology","ror":"https://ror.org/005p9kw61","country_code":"US","type":"education","lineage":["https://openalex.org/I207123951"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mengyu Qiao","raw_affiliation_strings":["Department of Computer Science and Engineering, Institute of Complex Additive Systems Analysis, New Mexico Institute of Mining and Technology, USA","Department of Computer Science and Engineering, Institute for Complex Additive Systems Analysis, New Mexico Institute of Mining and Technology"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Institute of Complex Additive Systems Analysis, New Mexico Institute of Mining and Technology, USA","institution_ids":["https://openalex.org/I207123951"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Institute for Complex Additive Systems Analysis, New Mexico Institute of Mining and Technology","institution_ids":["https://openalex.org/I207123951"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027821975","display_name":"Andrew H. Sung","orcid":"https://orcid.org/0009-0005-0815-3102"},"institutions":[{"id":"https://openalex.org/I207123951","display_name":"New Mexico Institute of Mining and Technology","ror":"https://ror.org/005p9kw61","country_code":"US","type":"education","lineage":["https://openalex.org/I207123951"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Andrew H. Sung","raw_affiliation_strings":["Department of Computer Science and Engineering, Institute of Complex Additive Systems Analysis, New Mexico Institute of Mining and Technology, USA","Department of Computer Science and Engineering, Institute for Complex Additive Systems Analysis, New Mexico Institute of Mining and Technology"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Institute of Complex Additive Systems Analysis, New Mexico Institute of Mining and Technology, USA","institution_ids":["https://openalex.org/I207123951"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Institute for Complex Additive Systems Analysis, New Mexico Institute of Mining and Technology","institution_ids":["https://openalex.org/I207123951"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100746642","display_name":"Qingzhong Liu","orcid":"https://orcid.org/0000-0002-2006-5413"},"institutions":[{"id":"https://openalex.org/I207123951","display_name":"New Mexico Institute of Mining and Technology","ror":"https://ror.org/005p9kw61","country_code":"US","type":"education","lineage":["https://openalex.org/I207123951"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Qingzhong Liu","raw_affiliation_strings":["Department of Computer Science and Engineering, Institute of Complex Additive Systems Analysis, New Mexico Institute of Mining and Technology, USA","Department of Computer Science and Engineering, Institute for Complex Additive Systems Analysis, New Mexico Institute of Mining and Technology"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Institute of Complex Additive Systems Analysis, New Mexico Institute of Mining and Technology, USA","institution_ids":["https://openalex.org/I207123951"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Institute for Complex Additive Systems Analysis, New Mexico Institute of Mining and Technology","institution_ids":["https://openalex.org/I207123951"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5058970043"],"corresponding_institution_ids":["https://openalex.org/I207123951"],"apc_list":null,"apc_paid":null,"fwci":1.2749,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.81573624,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"5681","issue":null,"first_page":"925","last_page":"930"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11309","display_name":"Music and Audio Processing","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8760157823562622},{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.8483773469924927},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.7836209535598755},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7438487410545349},{"id":"https://openalex.org/keywords/audio-signal","display_name":"Audio signal","score":0.6254251003265381},{"id":"https://openalex.org/keywords/steganography-tools","display_name":"Steganography tools","score":0.600196361541748},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.431723415851593},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.42585986852645874},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.41278788447380066},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3994631767272949},{"id":"https://openalex.org/keywords/speech-coding","display_name":"Speech coding","score":0.19650059938430786}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8760157823562622},{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.8483773469924927},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.7836209535598755},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7438487410545349},{"id":"https://openalex.org/C64922751","wikidata":"https://www.wikidata.org/wiki/Q4650799","display_name":"Audio signal","level":3,"score":0.6254251003265381},{"id":"https://openalex.org/C13179402","wikidata":"https://www.wikidata.org/wiki/Q7606662","display_name":"Steganography tools","level":4,"score":0.600196361541748},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.431723415851593},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.42585986852645874},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.41278788447380066},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3994631767272949},{"id":"https://openalex.org/C13895895","wikidata":"https://www.wikidata.org/wiki/Q3270773","display_name":"Speech coding","level":2,"score":0.19650059938430786}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/coginf.2010.5599777","is_oa":false,"landing_page_url":"https://doi.org/10.1109/coginf.2010.5599777","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"9th IEEE International Conference on Cognitive Informatics (ICCI'10)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7900000214576721}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W30289112","https://openalex.org/W637996580","https://openalex.org/W1812946410","https://openalex.org/W1839388188","https://openalex.org/W1875845630","https://openalex.org/W1985113289","https://openalex.org/W2017418484","https://openalex.org/W2037059691","https://openalex.org/W2076312302","https://openalex.org/W2095948462","https://openalex.org/W2101937946","https://openalex.org/W2107319754","https://openalex.org/W2107510891","https://openalex.org/W2121465628","https://openalex.org/W2139334285","https://openalex.org/W2154390427","https://openalex.org/W2155447586","https://openalex.org/W2156513435","https://openalex.org/W2162635690","https://openalex.org/W2166028458","https://openalex.org/W6601194139","https://openalex.org/W6638976480","https://openalex.org/W6676209009"],"related_works":["https://openalex.org/W2154118756","https://openalex.org/W129330134","https://openalex.org/W1965991389","https://openalex.org/W2166431153","https://openalex.org/W2158736088","https://openalex.org/W1659544335","https://openalex.org/W2370747589","https://openalex.org/W1533972467","https://openalex.org/W1974279004","https://openalex.org/W2382132779"],"abstract_inverted_index":{"As":[0],"a":[1,9,68,109],"serious":[2],"concern":[3],"of":[4,46,59,121,134],"information":[5],"security,":[6],"steganography":[7,31],"provides":[8],"covert":[10],"communication":[11],"channel":[12],"for":[13,29],"cyber-terrorism":[14],"and":[15,49,88,92,105],"cyber-crime.":[16],"The":[17],"widespread":[18],"use":[19],"enables":[20],"MP3":[21,122],"compressed":[22,123],"audio":[23,30],"to":[24,42,70,117],"become":[25],"an":[26,39],"excellent":[27],"carrier":[28],"on":[32,75],"the":[33,44,57,94,100,135,139],"Internet.":[34],"Since":[35],"embedding":[36,50,72,119,136],"capacity":[37],"is":[38,52,115],"important":[40],"measure":[41],"evaluate":[43],"performance":[45],"steganographic":[47],"systems,":[48],"ratio":[51],"commonly":[53],"used":[54],"when":[55],"comparing":[56],"accuracy":[58],"different":[60],"steganalysis":[61],"algorithms.":[62],"In":[63],"this":[64],"paper,":[65],"we":[66],"present":[67],"scheme":[69],"predict":[71,118],"strength":[73,120,137],"based":[74,96],"feature":[76],"mining":[77],"in":[78,138],"MDCT":[79],"transform":[80],"domain.":[81],"We":[82],"generate":[83],"reference":[84,95,106],"signals":[85],"by":[86],"reversing":[87],"repeating":[89],"quantification":[90],"process,":[91],"derive":[93],"accumulative":[97],"features":[98],"from":[99],"difference":[101],"between":[102],"source":[103],"signal":[104],"signal.":[107],"Finally,":[108],"dynamic":[110],"evolving":[111],"neuron-fuzzy":[112],"inference":[113],"system":[114],"applied":[116],"audio.":[124],"Experimental":[125],"results":[126],"show":[127],"that":[128],"our":[129],"approach":[130],"obtains":[131],"good":[132],"prediction":[133],"steganograms.":[140]},"counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
