{"id":"https://openalex.org/W4405270865","doi":"https://doi.org/10.1109/cvmi61877.2024.10782459","title":"Video Based Steganography for Audio using LSB Approach","display_name":"Video Based Steganography for Audio using LSB Approach","publication_year":2024,"publication_date":"2024-10-19","ids":{"openalex":"https://openalex.org/W4405270865","doi":"https://doi.org/10.1109/cvmi61877.2024.10782459"},"language":"en","primary_location":{"id":"doi:10.1109/cvmi61877.2024.10782459","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cvmi61877.2024.10782459","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Computer Vision and Machine Intelligence (CVMI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073620673","display_name":"S Srinidhi","orcid":"https://orcid.org/0000-0001-8187-5818"},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Srivageesh K Srinidhi","raw_affiliation_strings":["Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department of Computer Science and Engineering,Bengaluru,India"],"affiliations":[{"raw_affiliation_string":"Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department of Computer Science and Engineering,Bengaluru,India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109395327","display_name":"K S Vishal","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"K S Vishal","raw_affiliation_strings":["Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department of Computer Science and Engineering,Bengaluru,India"],"affiliations":[{"raw_affiliation_string":"Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department of Computer Science and Engineering,Bengaluru,India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106529638","display_name":"U Someswara Shashank","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"U Someswara Shashank","raw_affiliation_strings":["Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department of Computer Science and Engineering,Bengaluru,India"],"affiliations":[{"raw_affiliation_string":"Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department of Computer Science and Engineering,Bengaluru,India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034179107","display_name":"Telagarapu Prabhakar","orcid":"https://orcid.org/0000-0003-3287-6325"},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"T V Nidhin Prabhakar","raw_affiliation_strings":["Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department of Computer Science and Engineering,Bengaluru,India"],"affiliations":[{"raw_affiliation_string":"Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department of Computer Science and Engineering,Bengaluru,India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102785498","display_name":"Rimjhim Padam Singh","orcid":"https://orcid.org/0000-0003-3287-5090"},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Rimjhim Singh","raw_affiliation_strings":["Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department of Computer Science and Engineering,Bengaluru,India"],"affiliations":[{"raw_affiliation_string":"Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department of Computer Science and Engineering,Bengaluru,India","institution_ids":["https://openalex.org/I81556334"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5073620673"],"corresponding_institution_ids":["https://openalex.org/I81556334"],"apc_list":null,"apc_paid":null,"fwci":0.2624,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.57429479,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/least-significant-bit","display_name":"Least significant bit","score":0.8526493310928345},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7616912126541138},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.7497978210449219},{"id":"https://openalex.org/keywords/steganography-tools","display_name":"Steganography tools","score":0.5268601179122925},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.406547874212265},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.35482507944107056},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.32156944274902344},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.1693296730518341}],"concepts":[{"id":"https://openalex.org/C4305246","wikidata":"https://www.wikidata.org/wiki/Q3885225","display_name":"Least significant bit","level":2,"score":0.8526493310928345},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7616912126541138},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.7497978210449219},{"id":"https://openalex.org/C13179402","wikidata":"https://www.wikidata.org/wiki/Q7606662","display_name":"Steganography tools","level":4,"score":0.5268601179122925},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.406547874212265},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35482507944107056},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.32156944274902344},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.1693296730518341},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cvmi61877.2024.10782459","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cvmi61877.2024.10782459","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Computer Vision and Machine Intelligence (CVMI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1033304288","https://openalex.org/W1576337284","https://openalex.org/W2214532295","https://openalex.org/W2322218136","https://openalex.org/W2541505803","https://openalex.org/W2548843498","https://openalex.org/W2742507942","https://openalex.org/W2765731347","https://openalex.org/W2980253147","https://openalex.org/W3036102152","https://openalex.org/W3047216531","https://openalex.org/W3126604885","https://openalex.org/W3210273905","https://openalex.org/W4213014578","https://openalex.org/W4214586249","https://openalex.org/W4309491069","https://openalex.org/W4312979118","https://openalex.org/W6759058465"],"related_works":["https://openalex.org/W2049703184","https://openalex.org/W2977151837","https://openalex.org/W2158736088","https://openalex.org/W2181427603","https://openalex.org/W2409080236","https://openalex.org/W2796470635","https://openalex.org/W2347929411","https://openalex.org/W2238140690","https://openalex.org/W2047695298","https://openalex.org/W4214583425"],"abstract_inverted_index":{"In":[0],"the":[1],"rapidly":[2],"evolving":[3],"field":[4],"of":[5],"information":[6,42,123,132],"security,":[7],"video":[8,30,51,69,89],"steganography":[9,64],"offers":[10,116],"a":[11,25,47,117,141],"promising":[12],"solution":[13,119],"for":[14,120,140],"concealing":[15],"sensitive":[16],"data":[17,67],"within":[18,68],"multimedia":[19],"content.":[20],"The":[21,44],"proposed":[22],"approach":[23,27,146],"introduces":[24],"novel":[26],"that":[28,84],"integrates":[29],"compression,":[31,137],"audio":[32,57,97],"embedding,":[33],"and":[34,39,71,102,111,138,144],"encryption":[35,75,104,139],"to":[36,53,65,76],"enhance":[37],"security":[38,133],"efficiency":[40],"in":[41,125,130],"transmission.":[43],"method":[45,115],"follows":[46],"three-stage":[48],"process,":[49],"H.264":[50,85],"compression":[52,86],"reduce":[54],"file":[55],"size,":[56],"embedding":[58,95],"using":[59],"Least":[60],"Significant":[61],"Bit":[62],"(LSB)":[63],"conceal":[66],"frames,":[70],"Galois/Counter":[72],"Mode":[73],"(GCM)":[74],"ensure":[77],"robust":[78,106,143],"cryptographic":[79],"protection.":[80],"Key":[81],"findings":[82],"demonstrate":[83],"effectively":[87],"reduces":[88],"size":[90],"while":[91],"maintaining":[92],"quality,":[93],"LSB":[94],"conceals":[96],"with":[98],"minimal":[99],"visual":[100],"impact,":[101],"GCM":[103],"provides":[105],"protection":[107],"against":[108],"unauthorized":[109],"access":[110],"tampering.":[112],"This":[113],"comprehensive":[114],"viable":[118],"secure,":[121],"covert":[122],"transmission":[124],"multimedia,":[126],"addressing":[127],"critical":[128],"needs":[129],"modern":[131],"by":[134],"combining":[135],"steganography,":[136],"more":[142],"efficient":[145],"than":[147],"traditional":[148],"methods.":[149]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
