{"id":"https://openalex.org/W2945365354","doi":"https://doi.org/10.1109/iccspa.2019.8713731","title":"High Payload Steganography: Surface-Fitting The Transform Domain","display_name":"High Payload Steganography: Surface-Fitting The Transform Domain","publication_year":2019,"publication_date":"2019-03-01","ids":{"openalex":"https://openalex.org/W2945365354","doi":"https://doi.org/10.1109/iccspa.2019.8713731","mag":"2945365354"},"language":"en","primary_location":{"id":"doi:10.1109/iccspa.2019.8713731","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccspa.2019.8713731","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Conference on Communications, Signal Processing, and their Applications (ICCSPA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056039287","display_name":"Tamer Rabie","orcid":"https://orcid.org/0000-0003-4003-1592"},"institutions":[{"id":"https://openalex.org/I29891158","display_name":"University of Sharjah","ror":"https://ror.org/00engpz63","country_code":"AE","type":"education","lineage":["https://openalex.org/I29891158"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Tamer Rabie","raw_affiliation_strings":["Associate Professor, Dept. of Elec. & Comp. Eng., University of Sharjah, Sharjah, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Associate Professor, Dept. of Elec. & Comp. Eng., University of Sharjah, Sharjah, United Arab Emirates","institution_ids":["https://openalex.org/I29891158"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027125268","display_name":"Mohammed Baziyad","orcid":"https://orcid.org/0000-0003-0272-2659"},"institutions":[{"id":"https://openalex.org/I29891158","display_name":"University of Sharjah","ror":"https://ror.org/00engpz63","country_code":"AE","type":"education","lineage":["https://openalex.org/I29891158"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Mohammed Baziyad","raw_affiliation_strings":["Research Assistant, Research Institute of Science & Eng., University of Sharjah, Sharjah, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Research Assistant, Research Institute of Science & Eng., University of Sharjah, Sharjah, United Arab Emirates","institution_ids":["https://openalex.org/I29891158"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049545076","display_name":"Ibrahim Kamel","orcid":"https://orcid.org/0000-0001-5546-939X"},"institutions":[{"id":"https://openalex.org/I29891158","display_name":"University of Sharjah","ror":"https://ror.org/00engpz63","country_code":"AE","type":"education","lineage":["https://openalex.org/I29891158"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Ibrahim Kamel","raw_affiliation_strings":["Professor, Dept. of Elec. & Comp. Eng., University of Sharjah, Sharjah, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Professor, Dept. of Elec. & Comp. Eng., University of Sharjah, Sharjah, United Arab Emirates","institution_ids":["https://openalex.org/I29891158"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5056039287"],"corresponding_institution_ids":["https://openalex.org/I29891158"],"apc_list":null,"apc_paid":null,"fwci":0.7086,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.74396614,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":93,"max":97},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8177045583724976},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.7167592644691467},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6462599039077759},{"id":"https://openalex.org/keywords/signal","display_name":"SIGNAL (programming language)","score":0.6132132411003113},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.5446904897689819},{"id":"https://openalex.org/keywords/frequency-domain","display_name":"Frequency domain","score":0.5420419573783875},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4772374629974365},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4519394040107727},{"id":"https://openalex.org/keywords/signal-processing","display_name":"Signal processing","score":0.43640342354774475},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.28659588098526},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.2791494131088257},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.22839558124542236},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.16663900017738342},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09578752517700195}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8177045583724976},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.7167592644691467},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6462599039077759},{"id":"https://openalex.org/C2779843651","wikidata":"https://www.wikidata.org/wiki/Q7390335","display_name":"SIGNAL (programming language)","level":2,"score":0.6132132411003113},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.5446904897689819},{"id":"https://openalex.org/C19118579","wikidata":"https://www.wikidata.org/wiki/Q786423","display_name":"Frequency domain","level":2,"score":0.5420419573783875},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4772374629974365},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4519394040107727},{"id":"https://openalex.org/C104267543","wikidata":"https://www.wikidata.org/wiki/Q208163","display_name":"Signal processing","level":3,"score":0.43640342354774475},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.28659588098526},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.2791494131088257},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.22839558124542236},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.16663900017738342},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09578752517700195},{"id":"https://openalex.org/C554190296","wikidata":"https://www.wikidata.org/wiki/Q47528","display_name":"Radar","level":2,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccspa.2019.8713731","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccspa.2019.8713731","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Conference on Communications, Signal Processing, and their Applications (ICCSPA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","score":0.6700000166893005,"display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W62043733","https://openalex.org/W1989479391","https://openalex.org/W2131602743","https://openalex.org/W2269124040","https://openalex.org/W2326298076","https://openalex.org/W2339370745","https://openalex.org/W2610892808","https://openalex.org/W2765178146","https://openalex.org/W2784453069","https://openalex.org/W2789947530","https://openalex.org/W2910434184"],"related_works":["https://openalex.org/W3217722139","https://openalex.org/W4377927309","https://openalex.org/W3155443874","https://openalex.org/W3203504906","https://openalex.org/W2497446005","https://openalex.org/W2167554674","https://openalex.org/W2171676767","https://openalex.org/W4312890355","https://openalex.org/W2189589914","https://openalex.org/W83713408"],"abstract_inverted_index":{"Recent":[0],"steganography":[1],"schemes":[2],"have":[3],"shown":[4],"that":[5],"transform-based":[6],"techniques":[7,21,34,64],"can":[8,132],"hide":[9,24],"with":[10,69,114,137],"relatively":[11],"high":[12,139],"capacity":[13],"ratios":[14],"while":[15,135],"achieving":[16],"acceptable":[17],"stego":[18,130],"quality.":[19],"These":[20],"tend":[22],"to":[23,83,100],"in":[25,48,58],"high-frequency":[26,60,75,106],"areas":[27],"exploiting":[28],"some":[29],"features":[30],"provided":[31],"by":[32],"transform":[33],"such":[35],"as":[36,104],"the":[37,43,59,70,85,97,101,105,122,125],"strong":[38],"compaction":[39],"property":[40],"which":[41,95],"concentrates":[42],"energy":[44],"of":[45,55,77,124],"a":[46,52,78,92],"signal":[47,79],"low-frequency":[49],"coefficients,":[50],"leaving":[51],"large":[53],"area":[54],"insignificant":[56,67],"coefficients":[57,68],"area.":[61],"Thus,":[62,88],"conventional":[63],"replace":[65],"these":[66,74,112],"secret":[71,98,115],"data.":[72,116],"However,":[73],"components":[76,107,113],"do":[80],"still":[81],"contribute":[82],"obtain":[84],"composite":[86],"signal.":[87],"this":[89],"paper":[90],"proposes":[91],"hiding":[93,136,140],"strategy":[94],"re-shapes":[96],"data":[99],"same":[102],"shape":[103],"rather":[108],"than":[109],"simply":[110],"replacing":[111],"This":[117],"reshaping":[118],"process":[119],"should":[120],"preserve":[121],"structure":[123],"signal,":[126],"and":[127],"thus":[128],"outstanding":[129],"quality":[131],"be":[133],"obtained":[134],"very":[138],"capacities.":[141]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
