{"id":"https://openalex.org/W2902164648","doi":"https://doi.org/10.1109/icacci.2018.8554540","title":"Analysis of Data Hiding Methods in Image Steganography","display_name":"Analysis of Data Hiding Methods in Image Steganography","publication_year":2018,"publication_date":"2018-09-01","ids":{"openalex":"https://openalex.org/W2902164648","doi":"https://doi.org/10.1109/icacci.2018.8554540","mag":"2902164648"},"language":"en","primary_location":{"id":"doi:10.1109/icacci.2018.8554540","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2018.8554540","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032558276","display_name":"Akshay KC","orcid":"https://orcid.org/0000-0002-7961-0252"},"institutions":[{"id":"https://openalex.org/I164861460","display_name":"Manipal Academy of Higher Education","ror":"https://ror.org/02xzytt36","country_code":"IN","type":"education","lineage":["https://openalex.org/I164861460"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"K.C. Akshay","raw_affiliation_strings":["Dept. of Information and Communication Technology, Manipal Academy of Higher Education, Manipal, India"],"affiliations":[{"raw_affiliation_string":"Dept. of Information and Communication Technology, Manipal Academy of Higher Education, Manipal, India","institution_ids":["https://openalex.org/I164861460"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030599123","display_name":"Balachandra Muniyal","orcid":null},"institutions":[{"id":"https://openalex.org/I164861460","display_name":"Manipal Academy of Higher Education","ror":"https://ror.org/02xzytt36","country_code":"IN","type":"education","lineage":["https://openalex.org/I164861460"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Balachandra Muniyal","raw_affiliation_strings":["Dept. of Information and Communication Technology, Manipal Academy of Higher Education, Manipal, India"],"affiliations":[{"raw_affiliation_string":"Dept. of Information and Communication Technology, Manipal Academy of Higher Education, Manipal, India","institution_ids":["https://openalex.org/I164861460"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5032558276"],"corresponding_institution_ids":["https://openalex.org/I164861460"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.13946013,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"7","issue":null,"first_page":"2023","last_page":"2027"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9829000234603882,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7865170240402222},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.7732439637184143},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.7218552231788635},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6865130662918091},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.623522162437439},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5806188583374023},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.5466358065605164},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5459297299385071},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.5043672323226929},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.4812993109226227},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.4801768362522125},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.47472700476646423},{"id":"https://openalex.org/keywords/image-sharing","display_name":"Image sharing","score":0.46961385011672974},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.45702171325683594},{"id":"https://openalex.org/keywords/steganography-tools","display_name":"Steganography tools","score":0.4332853853702545},{"id":"https://openalex.org/keywords/least-significant-bit","display_name":"Least significant bit","score":0.4113011360168457},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.33157867193222046},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1570805311203003},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09802737832069397}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7865170240402222},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.7732439637184143},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.7218552231788635},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6865130662918091},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.623522162437439},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5806188583374023},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.5466358065605164},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5459297299385071},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.5043672323226929},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.4812993109226227},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.4801768362522125},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.47472700476646423},{"id":"https://openalex.org/C2780639701","wikidata":"https://www.wikidata.org/wiki/Q354869","display_name":"Image sharing","level":3,"score":0.46961385011672974},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.45702171325683594},{"id":"https://openalex.org/C13179402","wikidata":"https://www.wikidata.org/wiki/Q7606662","display_name":"Steganography tools","level":4,"score":0.4332853853702545},{"id":"https://openalex.org/C4305246","wikidata":"https://www.wikidata.org/wiki/Q3885225","display_name":"Least significant bit","level":2,"score":0.4113011360168457},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.33157867193222046},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1570805311203003},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09802737832069397},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icacci.2018.8554540","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2018.8554540","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.4399999976158142,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1975996547","https://openalex.org/W2008049606","https://openalex.org/W2010065947","https://openalex.org/W2013157192","https://openalex.org/W2019720311","https://openalex.org/W2029197379","https://openalex.org/W2049558423","https://openalex.org/W2104096778","https://openalex.org/W2217819622","https://openalex.org/W2275530856","https://openalex.org/W4231540666","https://openalex.org/W6675785900"],"related_works":["https://openalex.org/W2049703184","https://openalex.org/W2977151837","https://openalex.org/W2409080236","https://openalex.org/W2796470635","https://openalex.org/W2158736088","https://openalex.org/W4225353254","https://openalex.org/W2181427603","https://openalex.org/W2789350730","https://openalex.org/W2347929411","https://openalex.org/W2605878003"],"abstract_inverted_index":{"Cloud":[0],"Computing":[1],"has":[2],"evolved":[3],"into":[4],"a":[5,77,96,103],"major":[6],"technology":[7],"in":[8,15,32,44,108,125],"recent":[9],"days":[10],"to":[11,55,83,105],"serve":[12],"its":[13],"customers":[14],"many":[16],"ways.":[17],"The":[18],"shared":[19],"pool":[20],"of":[21,40,65,122],"resources":[22],"with":[23],"configuration":[24],"requirement":[25],"needed":[26],"by":[27,87],"the":[28,41,60,66,89,116,120,126],"customer":[29],"is":[30,38,70,76,95,113],"provided":[31],"an":[33,109],"elegant":[34],"manner.":[35],"Data":[36],"sharing":[37],"one":[39],"important":[42],"activities":[43],"cloud":[45],"environment":[46],"which":[47],"requires":[48],"confidentiality,":[49],"integrity,":[50],"authentication":[51],"and":[52,62,119],"nonrepudiation":[53],"principles":[54],"provide":[56],"data":[57,67,90,107],"security.":[58],"Providing":[59],"security":[61],"maintaining":[63],"integrity":[64],"while":[68],"it":[69],"being":[71],"transferred":[72],"through":[73,91],"public":[74],"channels":[75],"challenging":[78],"task.":[79],"This":[80],"paper":[81],"attempts":[82],"answer":[84],"that":[85],"challenge":[86],"securing":[88],"image":[92,99],"steganography.":[93],"It":[94],"modified":[97],"LSB":[98],"steganographic":[100],"technique":[101],"using":[102],"password":[104],"hide":[106],"image.":[110,127],"An":[111],"analysis":[112],"performed":[114],"for":[115],"techniques":[117],"used":[118],"number":[121],"characters":[123],"hidden":[124]},"counts_by_year":[{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
