{"id":"https://openalex.org/W2951126653","doi":"https://doi.org/10.1109/commnet.2019.8742345","title":"Triple-Layer Image Security Using a Zigzag Embedding Pattern","display_name":"Triple-Layer Image Security Using a Zigzag Embedding Pattern","publication_year":2019,"publication_date":"2019-04-01","ids":{"openalex":"https://openalex.org/W2951126653","doi":"https://doi.org/10.1109/commnet.2019.8742345","mag":"2951126653"},"language":"en","primary_location":{"id":"doi:10.1109/commnet.2019.8742345","is_oa":false,"landing_page_url":"https://doi.org/10.1109/commnet.2019.8742345","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058856346","display_name":"Sara Farrag","orcid":null},"institutions":[{"id":"https://openalex.org/I96823368","display_name":"German University in Cairo","ror":"https://ror.org/03rjt0z37","country_code":"EG","type":"education","lineage":["https://openalex.org/I96823368"]}],"countries":["EG"],"is_corresponding":true,"raw_author_name":"Sara Farrag","raw_affiliation_strings":["Faculty of IET, The German University in Cairo, Cairo, Egypt"],"affiliations":[{"raw_affiliation_string":"Faculty of IET, The German University in Cairo, Cairo, Egypt","institution_ids":["https://openalex.org/I96823368"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009508128","display_name":"Wassim Alexan","orcid":"https://orcid.org/0000-0001-6159-4971"},"institutions":[{"id":"https://openalex.org/I96823368","display_name":"German University in Cairo","ror":"https://ror.org/03rjt0z37","country_code":"EG","type":"education","lineage":["https://openalex.org/I96823368"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Wassim Alexan","raw_affiliation_strings":["Faculty of IET, The German University in Cairo, Cairo, Egypt"],"affiliations":[{"raw_affiliation_string":"Faculty of IET, The German University in Cairo, Cairo, Egypt","institution_ids":["https://openalex.org/I96823368"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5066595368","display_name":"Hisham H. Hussein","orcid":null},"institutions":[{"id":"https://openalex.org/I96823368","display_name":"German University in Cairo","ror":"https://ror.org/03rjt0z37","country_code":"EG","type":"education","lineage":["https://openalex.org/I96823368"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Hisham H. Hussein","raw_affiliation_strings":["Mathematics Department, The German University in Cairo, Cairo, Egypt"],"affiliations":[{"raw_affiliation_string":"Mathematics Department, The German University in Cairo, Cairo, Egypt","institution_ids":["https://openalex.org/I96823368"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5058856346"],"corresponding_institution_ids":["https://openalex.org/I96823368"],"apc_list":null,"apc_paid":null,"fwci":1.5183,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.86251677,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.7812344431877136},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6320114135742188},{"id":"https://openalex.org/keywords/histogram","display_name":"Histogram","score":0.5587756633758545},{"id":"https://openalex.org/keywords/peak-signal-to-noise-ratio","display_name":"Peak signal-to-noise ratio","score":0.5217755436897278},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5191532969474792},{"id":"https://openalex.org/keywords/zigzag","display_name":"Zigzag","score":0.5018353462219238},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.4748140573501587},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4522193372249603},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.43940433859825134},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.4313362240791321},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.39324644207954407},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.3848157525062561},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3349802494049072},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.32550883293151855},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.31053265929222107},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.14161401987075806},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.06718066334724426}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.7812344431877136},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6320114135742188},{"id":"https://openalex.org/C53533937","wikidata":"https://www.wikidata.org/wiki/Q185020","display_name":"Histogram","level":3,"score":0.5587756633758545},{"id":"https://openalex.org/C154579607","wikidata":"https://www.wikidata.org/wiki/Q3373850","display_name":"Peak signal-to-noise ratio","level":3,"score":0.5217755436897278},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5191532969474792},{"id":"https://openalex.org/C192271897","wikidata":"https://www.wikidata.org/wiki/Q198438","display_name":"Zigzag","level":2,"score":0.5018353462219238},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.4748140573501587},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4522193372249603},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.43940433859825134},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.4313362240791321},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.39324644207954407},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.3848157525062561},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3349802494049072},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.32550883293151855},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.31053265929222107},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.14161401987075806},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.06718066334724426},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/commnet.2019.8742345","is_oa":false,"landing_page_url":"https://doi.org/10.1109/commnet.2019.8742345","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W139376391","https://openalex.org/W1568276820","https://openalex.org/W1587823205","https://openalex.org/W1824772149","https://openalex.org/W2013503531","https://openalex.org/W2046423394","https://openalex.org/W2073486524","https://openalex.org/W2119199090","https://openalex.org/W2120706888","https://openalex.org/W2133665775","https://openalex.org/W2145696965","https://openalex.org/W2291390035","https://openalex.org/W2296583276","https://openalex.org/W2405296432","https://openalex.org/W2503107053","https://openalex.org/W2554114274","https://openalex.org/W2766071886","https://openalex.org/W2769092316","https://openalex.org/W2787253390","https://openalex.org/W2908282224","https://openalex.org/W2917138010","https://openalex.org/W2922386834","https://openalex.org/W3015692940","https://openalex.org/W3121847072","https://openalex.org/W3127303521","https://openalex.org/W4239092273","https://openalex.org/W4255424128","https://openalex.org/W6633907081","https://openalex.org/W6635117317","https://openalex.org/W6638515452","https://openalex.org/W6696876242","https://openalex.org/W6713598220","https://openalex.org/W6776482189"],"related_works":["https://openalex.org/W2808029097","https://openalex.org/W3035794677","https://openalex.org/W2032417936","https://openalex.org/W2588100896","https://openalex.org/W2152067480","https://openalex.org/W2326117044","https://openalex.org/W135216162","https://openalex.org/W4289782736","https://openalex.org/W2806273750","https://openalex.org/W4382702296"],"abstract_inverted_index":{"This":[0],"paper":[1],"proposes":[2],"a":[3,16,25,44,72,90,121,129,172,186],"triple-layer,":[4],"high":[5,179,189],"capacity,":[6],"message":[7],"security":[8,62],"scheme.":[9,65,192],"The":[10,106],"first":[11,30,56],"two":[12],"layers":[13],"are":[14,182],"of":[15,24,54,63,70,95,100,109,138],"cryptographic":[17],"nature,":[18],"whereas":[19],"the":[20,29,37,41,52,55,61,64,67,80,96,101,110,115,149,168,178],"third":[21,68,130],"layer":[22,58,69],"is":[23,34,49,77,86,113,118],"steganographic":[26,191],"nature.":[27],"In":[28,40,66,170],"layer,":[31,43],"AES-128":[32],"encryption":[33,48],"performed":[35],"on":[36,51],"secret":[38,116],"message.":[39],"second":[42],"chaotic":[45],"logistic":[46],"map":[47],"applied":[50],"output":[53],"secure":[57],"to":[59,89,141,164],"increase":[60],"security,":[71],"2D":[73],"image":[74,103,160],"steganography":[75],"technique":[76],"performed,":[78],"where":[79],"least":[81],"significant":[82],"bit":[83],"(LSB)":[84],"-embedding":[85],"done":[87],"according":[88],"zigzag":[91,122],"pattern":[92],"in":[93,120],"each":[94],"three":[97],"color":[98],"planes":[99],"cover":[102],"(i.e.":[104],"RGB).":[105],"distinguishing":[107],"feature":[108],"proposed":[111],"scheme":[112,134],"that":[114,124],"data":[117],"hidden":[119],"manner":[123],"cannot":[125],"be":[126],"predicted":[127],"by":[128],"party.":[131],"Moreover,":[132],"our":[133],"achieves":[135],"higher":[136],"values":[137],"peak":[139],"signal":[140],"noise":[142],"ratio":[143],"(PPSNR),":[144],"mean":[145],"square":[146],"error":[147],"(MSE),":[148],"structural":[150],"similarity":[151],"index":[152],"metric":[153],"(SSIM),":[154],"normal":[155],"cross":[156],"correlation":[157],"(NCC)":[158],"and":[159,188],"fidelity":[161],"(IF)":[162],"compared":[163],"its":[165],"counterparts":[166],"form":[167],"literature.":[169],"addition,":[171],"histogram":[173],"analysis":[174],"as":[175,177],"well":[176],"achieved":[180],"capacity":[181,190],"magnificent":[183],"indicators":[184],"for":[185],"reliable":[187]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
