{"id":"https://openalex.org/W4391249492","doi":"https://doi.org/10.1109/ic3i59117.2023.10398132","title":"A Comparative Analysis of LSB &amp; DCT Based Steganographic Techniques: Confidentiality, Contemporary State, and Future Challenges","display_name":"A Comparative Analysis of LSB &amp; DCT Based Steganographic Techniques: Confidentiality, Contemporary State, and Future Challenges","publication_year":2023,"publication_date":"2023-09-14","ids":{"openalex":"https://openalex.org/W4391249492","doi":"https://doi.org/10.1109/ic3i59117.2023.10398132"},"language":"en","primary_location":{"id":"doi:10.1109/ic3i59117.2023.10398132","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3i59117.2023.10398132","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 6th International Conference on Contemporary Computing and Informatics (IC3I)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007945353","display_name":"Kamal Upreti","orcid":"https://orcid.org/0000-0003-0665-530X"},"institutions":[{"id":"https://openalex.org/I48018076","display_name":"Christ University","ror":"https://ror.org/022tv9y30","country_code":"IN","type":"education","lineage":["https://openalex.org/I48018076"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Kamal Upreti","raw_affiliation_strings":["CHRIST (Deemed to be University) Delhi NCR,Department of Computer Science,Ghaziabad,India","Department of Computer Science, CHRIST (Deemed to be University) Delhi NCR, Ghaziabad, India"],"affiliations":[{"raw_affiliation_string":"CHRIST (Deemed to be University) Delhi NCR,Department of Computer Science,Ghaziabad,India","institution_ids":["https://openalex.org/I48018076"]},{"raw_affiliation_string":"Department of Computer Science, CHRIST (Deemed to be University) Delhi NCR, Ghaziabad, India","institution_ids":["https://openalex.org/I48018076"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006570988","display_name":"Ankit Verma","orcid":"https://orcid.org/0000-0003-3715-8613"},"institutions":[{"id":"https://openalex.org/I4210094618","display_name":"CT Group Of Institutions","ror":"https://ror.org/00m02ap37","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210094618"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ankit Verma","raw_affiliation_strings":["Department of Computer Science &#x0026; Engineering ADGITM,New Delhi,India","KIET Group of Institutions Delhi -NCR,Department of Computer Applications,Ghaziabad,India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science &#x0026; Engineering ADGITM,New Delhi,India","institution_ids":[]},{"raw_affiliation_string":"KIET Group of Institutions Delhi -NCR,Department of Computer Applications,Ghaziabad,India","institution_ids":["https://openalex.org/I4210094618"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025753327","display_name":"Jyoti Parashar","orcid":"https://orcid.org/0000-0002-6573-4270"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jyoti Parashar","raw_affiliation_strings":["Department of Computer Science &#x0026; Engineering ADGITM,New Delhi,India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science &#x0026; Engineering ADGITM,New Delhi,India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5107913149","display_name":"Prashant Vats","orcid":null},"institutions":[{"id":"https://openalex.org/I99552915","display_name":"University of Rajasthan","ror":"https://ror.org/05arfhc56","country_code":"IN","type":"education","lineage":["https://openalex.org/I99552915"]},{"id":"https://openalex.org/I73779912","display_name":"Manipal University Jaipur","ror":"https://ror.org/040h76494","country_code":null,"type":"education","lineage":["https://openalex.org/I73779912"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Prashant Vats","raw_affiliation_strings":["SCSE Manipal University Jaipur Jaipur,Department of CSE,Rajasthan,India","Department of CSE, SCSE Manipal University Jaipur Jaipur, Rajasthan, India"],"affiliations":[{"raw_affiliation_string":"SCSE Manipal University Jaipur Jaipur,Department of CSE,Rajasthan,India","institution_ids":["https://openalex.org/I99552915"]},{"raw_affiliation_string":"Department of CSE, SCSE Manipal University Jaipur Jaipur, Rajasthan, India","institution_ids":["https://openalex.org/I73779912"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006570988","display_name":"Ankit Verma","orcid":"https://orcid.org/0000-0003-3715-8613"},"institutions":[{"id":"https://openalex.org/I4210094618","display_name":"CT Group Of Institutions","ror":"https://ror.org/00m02ap37","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210094618"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ankit Verma","raw_affiliation_strings":["Department of Computer Science &#x0026; Engineering ADGITM,New Delhi,India","KIET Group of Institutions Delhi -NCR,Department of Computer Applications,Ghaziabad,India","Department of Computer Applications, KIET Group of Institutions Delhi -NCR, Ghaziabad, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science &#x0026; Engineering ADGITM,New Delhi,India","institution_ids":[]},{"raw_affiliation_string":"KIET Group of Institutions Delhi -NCR,Department of Computer Applications,Ghaziabad,India","institution_ids":["https://openalex.org/I4210094618"]},{"raw_affiliation_string":"Department of Computer Applications, KIET Group of Institutions Delhi -NCR, Ghaziabad, India","institution_ids":["https://openalex.org/I4210094618"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036115882","display_name":"Jagendra Singh","orcid":"https://orcid.org/0000-0002-6871-2050"},"institutions":[{"id":"https://openalex.org/I3129773123","display_name":"Bennett University","ror":"https://ror.org/00an5hx75","country_code":"IN","type":"education","lineage":["https://openalex.org/I3129773123"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Jagendra Singh","raw_affiliation_strings":["School of CSE and Technology Bennett University Greater,Noida,India","School of CSE and Technology Bennett University Greater, Noida, India"],"affiliations":[{"raw_affiliation_string":"School of CSE and Technology Bennett University Greater,Noida,India","institution_ids":["https://openalex.org/I3129773123"]},{"raw_affiliation_string":"School of CSE and Technology Bennett University Greater, Noida, India","institution_ids":["https://openalex.org/I3129773123"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5007945353"],"corresponding_institution_ids":["https://openalex.org/I48018076"],"apc_list":null,"apc_paid":null,"fwci":0.8643,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.76602288,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1581","last_page":"1588"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/least-significant-bit","display_name":"Least significant bit","score":0.8250192403793335},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.7775998115539551},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.6773912906646729},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5598186254501343},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.47468802332878113},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4670730233192444},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.42281556129455566},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3071250319480896},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.27993500232696533},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2216285765171051},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.21203327178955078},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.09675243496894836}],"concepts":[{"id":"https://openalex.org/C4305246","wikidata":"https://www.wikidata.org/wiki/Q3885225","display_name":"Least significant bit","level":2,"score":0.8250192403793335},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.7775998115539551},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.6773912906646729},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5598186254501343},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.47468802332878113},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4670730233192444},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.42281556129455566},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3071250319480896},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27993500232696533},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2216285765171051},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.21203327178955078},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.09675243496894836},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ic3i59117.2023.10398132","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3i59117.2023.10398132","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 6th International Conference on Contemporary Computing and Informatics (IC3I)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W2735389800","https://openalex.org/W2783089062","https://openalex.org/W2895736286","https://openalex.org/W2898914582","https://openalex.org/W2914615226","https://openalex.org/W2997133669","https://openalex.org/W3004412629","https://openalex.org/W3006188987","https://openalex.org/W3006597729","https://openalex.org/W3009842621","https://openalex.org/W3033306615","https://openalex.org/W3041197786","https://openalex.org/W3126341416","https://openalex.org/W3135390507","https://openalex.org/W4205254295","https://openalex.org/W4243802206","https://openalex.org/W4253602988","https://openalex.org/W4283820923","https://openalex.org/W4293525370","https://openalex.org/W4298145539","https://openalex.org/W4307918123","https://openalex.org/W4313400702","https://openalex.org/W4362501043","https://openalex.org/W4362579110","https://openalex.org/W4368617567","https://openalex.org/W4379781080","https://openalex.org/W4380789230"],"related_works":["https://openalex.org/W3127945325","https://openalex.org/W2205085860","https://openalex.org/W2885826910","https://openalex.org/W2134958869","https://openalex.org/W2181427603","https://openalex.org/W2409080236","https://openalex.org/W2977151837","https://openalex.org/W2074995973","https://openalex.org/W2796470635","https://openalex.org/W2771684231"],"abstract_inverted_index":{"In":[0,52],"order":[1],"to":[2,99],"maintain":[3],"anonymity":[4],"and":[5,41,61,78,122,141,167,179,191],"security,":[6],"the":[7,10,36,42,49,67,72,83,88,92,106,125,138,177],"steganography":[8],"is":[9],"technique":[11],"of":[12,96,124,133,156,163,181],"cloaking":[13],"confidential":[14],"data":[15,127],"within":[16],"what":[17],"seems":[18],"like":[19,186],"harmless":[20],"digital":[21],"material.":[22],"Several":[23],"steganographic":[24,57],"methods":[25,58],"have":[26,47],"been":[27],"established":[28],"devised":[29],"over":[30],"time,":[31],"but":[32],"those":[33],"centered":[34],"around":[35],"discrete":[37],"cosine":[38],"transformation":[39],"(DCT)":[40],"least":[43],"significant":[44],"bit":[45],"(LSB)":[46],"drawn":[48],"most":[50],"consideration.":[51],"this":[53],"study,":[54],"two":[55],"common":[56],"are":[59,75,128],"compared":[60],"contrasted":[62],"with":[63],"an":[64,86],"emphasis":[65],"on":[66],"secrecy":[68],"they":[69,74,171],"can":[70],"keep,":[71],"usage":[73],"now":[76],"receiving,":[77],"any":[79],"potential":[80],"difficulties":[81],"in":[82,148,161,169],"future.":[84],"As":[85],"alternative,":[87],"DCT-based":[89,134],"method":[90],"uses":[91],"frequency":[93,111],"domain":[94],"properties":[95],"cover":[97],"media":[98],"obfuscate":[100],"hidden":[101],"information.":[102],"Since":[103],"it":[104,113],"spreads":[105],"concealed":[107,126],"information":[108],"across":[109],"several":[110],"coefficients,":[112],"provides":[114],"greater":[115],"security":[116],"than":[117],"LSB-based":[118],"techniques.":[119],"The":[120],"resilience":[121],"imperceptibility":[123],"improved":[129],"by":[130],"a":[131,153],"variety":[132],"algorithms,":[135],"such":[136],"as":[137],"modified":[139],"quantization":[140],"matrix":[142],"encoding":[143],"approaches,":[144],"which":[145,170],"we":[146],"explore":[147],"detail.":[149],"We":[150,175],"also":[151],"give":[152],"general":[154],"summary":[155],"both":[157],"approaches'":[158],"current":[159],"state":[160],"terms":[162],"their":[164],"application,":[165],"constraints,":[166],"areas":[168],"may":[172],"be":[173],"used.":[174],"evaluate":[176],"benefits":[178],"drawbacks":[180],"each":[182],"approach,":[183],"considering":[184],"elements":[185],"payload":[187],"size,":[188],"computing":[189],"difficulty,":[190],"detection":[192],"resistance.":[193]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
