{"id":"https://openalex.org/W4390189217","doi":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361384","title":"A Comparative Analysis of Image Steganography Techniques in Spatial and Transform Domains","display_name":"A Comparative Analysis of Image Steganography Techniques in Spatial and Transform Domains","publication_year":2023,"publication_date":"2023-11-14","ids":{"openalex":"https://openalex.org/W4390189217","doi":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361384"},"language":"en","primary_location":{"id":"doi:10.1109/dasc/picom/cbdcom/cy59711.2023.10361384","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361384","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050289622","display_name":"Dina Shehada","orcid":"https://orcid.org/0000-0002-7711-5389"},"institutions":[{"id":"https://openalex.org/I29891158","display_name":"University of Sharjah","ror":"https://ror.org/00engpz63","country_code":"AE","type":"education","lineage":["https://openalex.org/I29891158"]},{"id":"https://openalex.org/I132806614","display_name":"University of Dubai","ror":"https://ror.org/05h0z7c09","country_code":"AE","type":"education","lineage":["https://openalex.org/I132806614"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Dina Shehada","raw_affiliation_strings":["University of Sharjah,Department of Electrical,Sharjah,UAE","Department of Electrical, University of Sharjah, Sharjah, UAE","College of Engineering and IT, University of Dubai, Dubai, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"University of Sharjah,Department of Electrical,Sharjah,UAE","institution_ids":["https://openalex.org/I29891158"]},{"raw_affiliation_string":"Department of Electrical, University of Sharjah, Sharjah, UAE","institution_ids":["https://openalex.org/I29891158"]},{"raw_affiliation_string":"College of Engineering and IT, University of Dubai, Dubai, United Arab Emirates","institution_ids":["https://openalex.org/I132806614"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033623398","display_name":"Ahmed Bouridane","orcid":"https://orcid.org/0000-0002-1474-2772"},"institutions":[{"id":"https://openalex.org/I29891158","display_name":"University of Sharjah","ror":"https://ror.org/00engpz63","country_code":"AE","type":"education","lineage":["https://openalex.org/I29891158"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Ahmed Bouridane","raw_affiliation_strings":["University of Sharjah,Department of Electrical,Sharjah,UAE","Department of Electrical, University of Sharjah, Sharjah, UAE"],"affiliations":[{"raw_affiliation_string":"University of Sharjah,Department of Electrical,Sharjah,UAE","institution_ids":["https://openalex.org/I29891158"]},{"raw_affiliation_string":"Department of Electrical, University of Sharjah, Sharjah, UAE","institution_ids":["https://openalex.org/I29891158"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5050289622"],"corresponding_institution_ids":["https://openalex.org/I132806614","https://openalex.org/I29891158"],"apc_list":null,"apc_paid":null,"fwci":0.4913,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.66858855,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"0155","last_page":"0160"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.8976452350616455},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8859978914260864},{"id":"https://openalex.org/keywords/least-significant-bit","display_name":"Least significant bit","score":0.8593998551368713},{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.8036267757415771},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6616513729095459},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6227705478668213},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6094953417778015},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.5086873173713684},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.4972260296344757},{"id":"https://openalex.org/keywords/steganography-tools","display_name":"Steganography tools","score":0.4510115087032318},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.3635616898536682},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.35820508003234863}],"concepts":[{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.8976452350616455},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8859978914260864},{"id":"https://openalex.org/C4305246","wikidata":"https://www.wikidata.org/wiki/Q3885225","display_name":"Least significant bit","level":2,"score":0.8593998551368713},{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.8036267757415771},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6616513729095459},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6227705478668213},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6094953417778015},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.5086873173713684},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4972260296344757},{"id":"https://openalex.org/C13179402","wikidata":"https://www.wikidata.org/wiki/Q7606662","display_name":"Steganography tools","level":4,"score":0.4510115087032318},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.3635616898536682},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.35820508003234863},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dasc/picom/cbdcom/cy59711.2023.10361384","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361384","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W22271197","https://openalex.org/W1965145204","https://openalex.org/W2028197392","https://openalex.org/W2093118104","https://openalex.org/W2108598243","https://openalex.org/W2111282197","https://openalex.org/W2752821911","https://openalex.org/W2908542906","https://openalex.org/W2914062350","https://openalex.org/W2930314782","https://openalex.org/W2960934316","https://openalex.org/W2962793481","https://openalex.org/W2990934991","https://openalex.org/W2995293933","https://openalex.org/W3013821122","https://openalex.org/W3095141076","https://openalex.org/W4247870114","https://openalex.org/W6703703100"],"related_works":["https://openalex.org/W2205085860","https://openalex.org/W2134958869","https://openalex.org/W2059133021","https://openalex.org/W2154118756","https://openalex.org/W2771684231","https://openalex.org/W129330134","https://openalex.org/W1965991389","https://openalex.org/W2166431153","https://openalex.org/W2158736088","https://openalex.org/W2977151837"],"abstract_inverted_index":{"Image":[0],"steganography":[1,53,89,152],"is":[2,22,40,153],"the":[3,13,17,27,30,34,42,56,63,82,94,97,121,127],"study":[4],"and":[5,58,68,86,101,109,138],"practice":[6],"of":[7,15,51,84,96],"concealing":[8],"information":[9,24,32],"within":[10,26],"images":[11,100,134],"with":[12,91,135],"purpose":[14],"deceiving":[16],"viewer":[18],"as":[19,130],"if":[20],"there":[21],"no":[23],"hidden":[25],"images.":[28],"Transferring":[29],"embedded":[31],"to":[33,80,93,141],"destination":[35],"securely":[36],"without":[37],"being":[38],"detected":[39],"considered":[41],"biggest":[43],"challenge.":[44],"In":[45],"this":[46,115],"paper,":[47],"a":[48,59],"comparative":[49],"analysis":[50],"image":[52],"in":[54,114],"both":[55],"spatial":[57],"transform":[60],"domains,":[61],"particularly":[62],"Least":[64],"Significant":[65],"Bit":[66],"(LSB)":[67],"Discrete":[69],"Cosine":[70],"Transform":[71],"(DCT)":[72],"was":[73,147],"conducted.":[74],"Two":[75],"experiments":[76],"were":[77,112],"carried":[78],"out":[79],"evaluate":[81],"performance":[83],"LSB":[85,128],"DCT":[87,122,151],"based":[88,123],"techniques":[90],"respect":[92],"quality":[95,137],"generated":[98],"stego":[99,133],"their":[102],"robustness":[103],"against":[104,156],"some":[105],"known":[106],"attacks.":[107],"ALASKA2":[108],"BOSSBase":[110],"datasets":[111],"utilized":[113],"study.":[116],"The":[117],"results":[118],"show":[119],"that":[120,150],"stenography":[124],"technique":[125],"outperforms":[126],"counterpart":[129],"it":[131],"generates":[132],"higher":[136,139],"(Peak":[140],"Signal":[142],"Ratio)":[143],"PSNR":[144],"values.":[145],"It":[146],"also":[148],"shown":[149],"more":[154],"robust":[155],"steganalysis.":[157]},"counts_by_year":[{"year":2025,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
