{"id":"https://openalex.org/W1612080935","doi":"https://doi.org/10.1109/icacci.2015.7275906","title":"Saliency based image steganography with varying base SDS and multi-objective genetic algorithm","display_name":"Saliency based image steganography with varying base SDS and multi-objective genetic algorithm","publication_year":2015,"publication_date":"2015-08-01","ids":{"openalex":"https://openalex.org/W1612080935","doi":"https://doi.org/10.1109/icacci.2015.7275906","mag":"1612080935"},"language":"en","primary_location":{"id":"doi:10.1109/icacci.2015.7275906","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2015.7275906","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013440537","display_name":"Ram Prakash Sharma","orcid":"https://orcid.org/0000-0002-1851-2325"},"institutions":[{"id":"https://openalex.org/I150312865","display_name":"Institute for Development and Research in Banking Technology","ror":"https://ror.org/00ta0g865","country_code":"IN","type":"government","lineage":["https://openalex.org/I150312865"]},{"id":"https://openalex.org/I36893310","display_name":"University of Hyderabad","ror":"https://ror.org/04a7rxb17","country_code":"IN","type":"education","lineage":["https://openalex.org/I36893310"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Ram Prakash Sharma","raw_affiliation_strings":["University of Hyderabad, Institute for Development and Research in Banking Technology (IDRBT), Hyderabad, India","University of Hyderabad, Institute for Development and Research in Banking Technology (IDRBT), India"],"affiliations":[{"raw_affiliation_string":"University of Hyderabad, Institute for Development and Research in Banking Technology (IDRBT), Hyderabad, India","institution_ids":["https://openalex.org/I150312865","https://openalex.org/I36893310"]},{"raw_affiliation_string":"University of Hyderabad, Institute for Development and Research in Banking Technology (IDRBT), India","institution_ids":["https://openalex.org/I36893310"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101446368","display_name":"Rajarshi Pal","orcid":"https://orcid.org/0000-0002-5608-7024"},"institutions":[{"id":"https://openalex.org/I150312865","display_name":"Institute for Development and Research in Banking Technology","ror":"https://ror.org/00ta0g865","country_code":"IN","type":"government","lineage":["https://openalex.org/I150312865"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Rajarshi Pal","raw_affiliation_strings":["Institute for Development and Research in Banking Technology (IDRBT), Hyderabad, India","Institute for Development and Research in Banking Technology (IDRBT)  Hyderabad India"],"affiliations":[{"raw_affiliation_string":"Institute for Development and Research in Banking Technology (IDRBT), Hyderabad, India","institution_ids":["https://openalex.org/I150312865"]},{"raw_affiliation_string":"Institute for Development and Research in Banking Technology (IDRBT)  Hyderabad India","institution_ids":["https://openalex.org/I150312865"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5013440537"],"corresponding_institution_ids":["https://openalex.org/I150312865","https://openalex.org/I36893310"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.03810593,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"37","issue":null,"first_page":"1966","last_page":"1974"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11605","display_name":"Visual Attention and Saliency Detection","score":0.989300012588501,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9879999756813049,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8931505680084229},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.7743896842002869},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.676077127456665},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6717519760131836},{"id":"https://openalex.org/keywords/relation","display_name":"Relation (database)","score":0.6548289656639099},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.6274058222770691},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5561766624450684},{"id":"https://openalex.org/keywords/base","display_name":"Base (topology)","score":0.5148417353630066},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4861306846141815},{"id":"https://openalex.org/keywords/degradation","display_name":"Degradation (telecommunications)","score":0.46783626079559326},{"id":"https://openalex.org/keywords/genetic-algorithm","display_name":"Genetic algorithm","score":0.4556174874305725},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.4245338439941406},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3527566194534302},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2560275197029114},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.09889930486679077},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.07587802410125732}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8931505680084229},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.7743896842002869},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.676077127456665},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6717519760131836},{"id":"https://openalex.org/C25343380","wikidata":"https://www.wikidata.org/wiki/Q277521","display_name":"Relation (database)","level":2,"score":0.6548289656639099},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.6274058222770691},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5561766624450684},{"id":"https://openalex.org/C42058472","wikidata":"https://www.wikidata.org/wiki/Q810214","display_name":"Base (topology)","level":2,"score":0.5148417353630066},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4861306846141815},{"id":"https://openalex.org/C2779679103","wikidata":"https://www.wikidata.org/wiki/Q5251805","display_name":"Degradation (telecommunications)","level":2,"score":0.46783626079559326},{"id":"https://openalex.org/C8880873","wikidata":"https://www.wikidata.org/wiki/Q187787","display_name":"Genetic algorithm","level":2,"score":0.4556174874305725},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4245338439941406},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3527566194534302},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2560275197029114},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.09889930486679077},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.07587802410125732},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icacci.2015.7275906","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2015.7275906","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W93971839","https://openalex.org/W1529311611","https://openalex.org/W1966917092","https://openalex.org/W1987470300","https://openalex.org/W2015658917","https://openalex.org/W2026906687","https://openalex.org/W2028197392","https://openalex.org/W2036013050","https://openalex.org/W2041316488","https://openalex.org/W2041560266","https://openalex.org/W2069314928","https://openalex.org/W2090289871","https://openalex.org/W2097113259","https://openalex.org/W2109868644","https://openalex.org/W2127913350","https://openalex.org/W2128272608","https://openalex.org/W2168502427","https://openalex.org/W2547062856"],"related_works":["https://openalex.org/W2521839693","https://openalex.org/W2969135852","https://openalex.org/W2188948172","https://openalex.org/W38533693","https://openalex.org/W2892069487","https://openalex.org/W2741842698","https://openalex.org/W2887979804","https://openalex.org/W1760333999","https://openalex.org/W2265739152","https://openalex.org/W2119567889"],"abstract_inverted_index":{"Hiding":[0],"secret":[1,105],"message":[2,106],"into":[3],"images":[4],"is":[5,29,58,114],"known":[6],"as":[7],"image":[8,12],"steganography.":[9],"A":[10,66,89],"good":[11,138],"steganography":[13,97],"method":[14],"aims":[15],"to":[16,31,102],"minimize":[17],"visual":[18,27,144],"degradation":[19,145],"while":[20,141],"maximizing":[21],"embedding":[22,139],"capacity.":[23],"In":[24],"this":[25],"paper,":[26],"saliency":[28,48,78],"used":[30,101],"determine":[32],"the":[33,47,53,74,81,87,104,109,118,131,143],"number":[34,54,82,119],"of":[35,49,55,83,91,111,120,136,146],"bits":[36,57,85,107,121],"which":[37,72],"can":[38,134],"be":[39],"embedded":[40,56,84,123],"in":[41,86,124],"a":[42,50,62,125,137],"pixel.":[43,126],"The":[44],"relation":[45,76],"between":[46,77],"pixel":[51],"and":[52,80],"obtained":[59],"by":[60],"solving":[61],"multi-objective":[63],"optimization":[64],"problem.":[65],"genetic":[67],"algorithm":[68],"has":[69,99],"been":[70,100],"developed":[71],"gives":[73],"optimum":[75],"values":[79],"pixels.":[88],"variation":[90],"Single":[92],"Digit":[93],"Sum":[94],"(SDS)":[95],"based":[96,116],"scheme":[98],"embed":[103],"where":[108],"base":[110],"computing":[112],"SDS":[113],"estimated":[115],"on":[117],"being":[122],"Experimental":[127],"results":[128],"reveal":[129],"that":[130],"proposed":[132],"technique":[133],"boast":[135],"capacity":[140],"controlling":[142],"stego":[147],"image.":[148]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
