{"id":"https://openalex.org/W4406417905","doi":"https://doi.org/10.1109/ic3i61595.2024.10829039","title":"Secured Steganography: Leveraging Cryptography in a Cloud-Based Toolbox","display_name":"Secured Steganography: Leveraging Cryptography in a Cloud-Based Toolbox","publication_year":2024,"publication_date":"2024-09-18","ids":{"openalex":"https://openalex.org/W4406417905","doi":"https://doi.org/10.1109/ic3i61595.2024.10829039"},"language":"en","primary_location":{"id":"doi:10.1109/ic3i61595.2024.10829039","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3i61595.2024.10829039","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 7th International Conference on Contemporary Computing and Informatics (IC3I)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101333270","display_name":"Karukonda Nithin Reddy","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Karukonda Nithin Reddy","raw_affiliation_strings":["Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department of Computer Science and Engineering,Bengaluru,Karnataka,India"],"affiliations":[{"raw_affiliation_string":"Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department of Computer Science and Engineering,Bengaluru,Karnataka,India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076075518","display_name":"Munaga Sai Snehitha","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Munaga Sai Snehitha","raw_affiliation_strings":["Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department of Computer Science and Engineering,Bengaluru,Karnataka,India"],"affiliations":[{"raw_affiliation_string":"Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department of Computer Science and Engineering,Bengaluru,Karnataka,India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056495761","display_name":"Kadapa Sreenivasa Reddy","orcid":"https://orcid.org/0000-0002-9667-2391"},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Kamidi Sai Chandana Reddy","raw_affiliation_strings":["Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department of Computer Science and Engineering,Bengaluru,Karnataka,India"],"affiliations":[{"raw_affiliation_string":"Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department of Computer Science and Engineering,Bengaluru,Karnataka,India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108845566","display_name":"K Dheeraj Reddy","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"K Dheeraj Reddy","raw_affiliation_strings":["Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department of Computer Science and Engineering,Bengaluru,Karnataka,India"],"affiliations":[{"raw_affiliation_string":"Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department of Computer Science and Engineering,Bengaluru,Karnataka,India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065268065","display_name":"Shinu M. Rajagopal","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Shinu M Rajagopal","raw_affiliation_strings":["Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department of Computer Science and Engineering,Bengaluru,Karnataka,India"],"affiliations":[{"raw_affiliation_string":"Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department of Computer Science and Engineering,Bengaluru,Karnataka,India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039551418","display_name":"Niharika Panda","orcid":"https://orcid.org/0009-0002-4829-5189"},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Niharika Panda","raw_affiliation_strings":["Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department of Computer Science and Engineering,Bengaluru,Karnataka,India"],"affiliations":[{"raw_affiliation_string":"Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department of Computer Science and Engineering,Bengaluru,Karnataka,India","institution_ids":["https://openalex.org/I81556334"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101333270"],"corresponding_institution_ids":["https://openalex.org/I81556334"],"apc_list":null,"apc_paid":null,"fwci":0.2622,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.58762824,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"144","last_page":"150"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.977400004863739,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8097279071807861},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7948195338249207},{"id":"https://openalex.org/keywords/toolbox","display_name":"Toolbox","score":0.7942276000976562},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7163668870925903},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.681230366230011},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5537067651748657},{"id":"https://openalex.org/keywords/steganography-tools","display_name":"Steganography tools","score":0.5189132690429688},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3760087192058563},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.2109716534614563},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.17260000109672546},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.12942445278167725},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12794017791748047}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8097279071807861},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7948195338249207},{"id":"https://openalex.org/C2777655017","wikidata":"https://www.wikidata.org/wiki/Q1501161","display_name":"Toolbox","level":2,"score":0.7942276000976562},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7163668870925903},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.681230366230011},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5537067651748657},{"id":"https://openalex.org/C13179402","wikidata":"https://www.wikidata.org/wiki/Q7606662","display_name":"Steganography tools","level":4,"score":0.5189132690429688},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3760087192058563},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.2109716534614563},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17260000109672546},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.12942445278167725},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12794017791748047}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ic3i61595.2024.10829039","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3i61595.2024.10829039","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 7th International Conference on Contemporary Computing and Informatics (IC3I)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.5,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2746728526","https://openalex.org/W2971507555","https://openalex.org/W3004166041","https://openalex.org/W3164145347","https://openalex.org/W3166275255","https://openalex.org/W3189419149","https://openalex.org/W3200139726","https://openalex.org/W4293221876","https://openalex.org/W4366492293","https://openalex.org/W4387951039","https://openalex.org/W4390362912","https://openalex.org/W4392262202","https://openalex.org/W4393066116","https://openalex.org/W4393079353","https://openalex.org/W6742639443"],"related_works":["https://openalex.org/W2560172240","https://openalex.org/W3146660591","https://openalex.org/W1995538220","https://openalex.org/W3020816551","https://openalex.org/W2338095724","https://openalex.org/W2804412098","https://openalex.org/W2891774131","https://openalex.org/W3133799264","https://openalex.org/W2588780717","https://openalex.org/W1852022489"],"abstract_inverted_index":{"Cloud":[0,9],"technology":[1,128],"has":[2,44,55],"the":[3,21,32,75,78,107,111,120,123,136,144,147],"power":[4],"to":[5,17,25,31,46,90,105,116],"manage":[6],"computational":[7,152],"efficiency.":[8],"provides":[10],"easy":[11],"access":[12],"but":[13,141],"is":[14,23,66,97,114],"also":[15,142],"vulnerable":[16],"security":[18,140],"measures":[19],"as":[20],"internet":[22],"open":[24],"everyone.":[26],"Adding":[27],"cryptography":[28,82],"and":[29,60,110,118],"steganography":[30,56,85],"cloud":[33,79,127,148],"makes":[34],"it":[35],"more":[36],"secure.":[37],"Steganography,":[38],"a":[39,103],"method":[40],"for":[41,138],"hiding":[42],"communication":[43],"emerged":[45],"put":[47],"data":[48,96,139],"secretly":[49],"into":[50],"digital":[51],"media.":[52],"The":[53,99],"study":[54],"tools,":[57],"text,":[58],"audio,":[59],"video":[61],"steganography.":[62],"User-friendly":[63],"web":[64],"application":[65],"hosted":[67],"on":[68],"an":[69],"AWS":[70],"server.":[71],"This":[72],"platform":[73],"integrates":[74],"efficiency":[76,145],"of":[77,146],"with":[80,84,129],"hybrid":[81],"along":[83],"tools":[86],"that":[87],"allow":[88],"users":[89],"use":[91],"this":[92,131],"in":[93,149],"sectors":[94],"where":[95],"sensitive.":[98],"Diffie-Hellman":[100],"algorithm":[101,113],"generates":[102],"key":[104],"keep":[106],"information":[108],"safe,":[109],"AES":[112],"used":[115],"encrypt":[117],"decrypt":[119],"data.":[121],"In":[122],"project":[124,132],"by":[125],"combining":[126],"security,":[130],"not":[133],"only":[134],"addresses":[135],"need":[137],"displays":[143],"handling":[150],"high":[151],"work.":[153]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-06T13:50:29.536080","created_date":"2025-10-10T00:00:00"}
