{"id":"https://openalex.org/W2089757818","doi":"https://doi.org/10.1109/icsipa.2013.6708029","title":"High security image steganography using IWT and graph theory","display_name":"High security image steganography using IWT and graph theory","publication_year":2013,"publication_date":"2013-10-01","ids":{"openalex":"https://openalex.org/W2089757818","doi":"https://doi.org/10.1109/icsipa.2013.6708029","mag":"2089757818"},"language":"en","primary_location":{"id":"doi:10.1109/icsipa.2013.6708029","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsipa.2013.6708029","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE International Conference on Signal and Image Processing Applications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044071205","display_name":"V Thanikaiselvan","orcid":"https://orcid.org/0000-0003-2418-5217"},"institutions":[{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"V Thanikaiselvan","raw_affiliation_strings":["School of Electronics Engineering, VIT University, Vellore, Tamilnadu, India","Sch. of Electron. Eng., VIT Univ., Vellore, , India"],"affiliations":[{"raw_affiliation_string":"School of Electronics Engineering, VIT University, Vellore, Tamilnadu, India","institution_ids":["https://openalex.org/I876193797"]},{"raw_affiliation_string":"Sch. of Electron. Eng., VIT Univ., Vellore, , India","institution_ids":["https://openalex.org/I876193797"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052066154","display_name":"P. Arulmozhivarman","orcid":"https://orcid.org/0000-0001-8586-1739"},"institutions":[{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"P Arulmozhivarman","raw_affiliation_strings":["School of Electronics Engineering, VIT University, Vellore, Tamilnadu, India","Sch. of Electron. Eng., VIT Univ., Vellore, , India"],"affiliations":[{"raw_affiliation_string":"School of Electronics Engineering, VIT University, Vellore, Tamilnadu, India","institution_ids":["https://openalex.org/I876193797"]},{"raw_affiliation_string":"Sch. of Electron. Eng., VIT Univ., Vellore, , India","institution_ids":["https://openalex.org/I876193797"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5044071205"],"corresponding_institution_ids":["https://openalex.org/I876193797"],"apc_list":null,"apc_paid":null,"fwci":2.9938,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.92600881,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"9","issue":null,"first_page":"337","last_page":"342"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8782601952552795},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6283013820648193},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6231451034545898},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.6003949642181396},{"id":"https://openalex.org/keywords/wavelet-transform","display_name":"Wavelet transform","score":0.510323703289032},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4496873915195465},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.44241204857826233},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.42947447299957275},{"id":"https://openalex.org/keywords/least-significant-bit","display_name":"Least significant bit","score":0.4192371368408203},{"id":"https://openalex.org/keywords/wavelet","display_name":"Wavelet","score":0.3993512988090515},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3991818130016327},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.34886541962623596},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3393286466598511},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3302764892578125},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.07496607303619385}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8782601952552795},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6283013820648193},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6231451034545898},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.6003949642181396},{"id":"https://openalex.org/C196216189","wikidata":"https://www.wikidata.org/wiki/Q2867","display_name":"Wavelet transform","level":3,"score":0.510323703289032},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4496873915195465},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.44241204857826233},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.42947447299957275},{"id":"https://openalex.org/C4305246","wikidata":"https://www.wikidata.org/wiki/Q3885225","display_name":"Least significant bit","level":2,"score":0.4192371368408203},{"id":"https://openalex.org/C47432892","wikidata":"https://www.wikidata.org/wiki/Q831390","display_name":"Wavelet","level":2,"score":0.3993512988090515},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3991818130016327},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34886541962623596},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3393286466598511},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3302764892578125},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.07496607303619385},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icsipa.2013.6708029","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsipa.2013.6708029","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE International Conference on Signal and Image Processing Applications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1585665690","https://openalex.org/W1978507229","https://openalex.org/W2018869955","https://openalex.org/W2023742166","https://openalex.org/W2028197392","https://openalex.org/W2033309082","https://openalex.org/W2041560266","https://openalex.org/W2083122891","https://openalex.org/W2090289871","https://openalex.org/W2090757785","https://openalex.org/W2091898999","https://openalex.org/W2103098226","https://openalex.org/W2141137050","https://openalex.org/W2153531593","https://openalex.org/W2159390040","https://openalex.org/W2162208826","https://openalex.org/W2323739102","https://openalex.org/W2395848965","https://openalex.org/W2936028268","https://openalex.org/W4254812591","https://openalex.org/W6675721623","https://openalex.org/W6712241991"],"related_works":["https://openalex.org/W3127945325","https://openalex.org/W2205085860","https://openalex.org/W2885826910","https://openalex.org/W2134958869","https://openalex.org/W2181427603","https://openalex.org/W2409080236","https://openalex.org/W2977151837","https://openalex.org/W2074995973","https://openalex.org/W2796470635","https://openalex.org/W2771684231"],"abstract_inverted_index":{"Steganography":[0],"conceals":[1],"the":[2,6,33,62,70,86,101,113,125,138,146],"secret":[3,102],"information":[4],"inside":[5],"cover":[7],"medium.":[8],"There":[9],"are":[10,19,36],"two":[11],"types":[12],"of":[13,80,100,119,131,140],"steganography":[14,22,34,48],"techniques":[15],"available":[16],"practically.":[17],"They":[18],"spatial":[20],"domain":[21,25,51],"and":[23,40,65,69,98,128,156],"Transform":[24],"steganography.":[26],"The":[27],"objectives":[28],"to":[29,61,111,123,136,142],"be":[30,143],"considered":[31],"in":[32,49,74,145],"methods":[35],"high":[37],"capacity,":[38],"imperceptibility":[39],"robustness.":[41],"In":[42],"this":[43],"paper,":[44],"a":[45,75],"Color":[46],"image":[47],"transform":[50,58],"is":[52,59,72,83,109,121,134],"proposed.":[53],"Reversible":[54],"Integer":[55],"Haar":[56],"wavelet":[57,81],"applied":[60],"R,":[63],"G":[64],"B":[66],"planes":[67],"separately":[68],"data":[71],"embedded":[73,144],"random":[76],"manner.":[77],"Random":[78],"selection":[79],"coefficients":[82],"based":[84],"on":[85],"graph":[87],"theory.":[88],"This":[89,149],"proposed":[90],"system":[91],"uses":[92],"three":[93],"different":[94],"keys":[95],"for":[96,116],"embedding":[97],"extraction":[99],"data,":[103],"where":[104],"key1(Subband":[105],"Selection":[106],"-":[107],"SB)":[108],"used":[110,122,135],"select":[112,124,137],"Wavelet":[114],"subband":[115],"embedding,":[117],"key2(Selection":[118],"Co-effecients-SC)":[120],"co-efficients":[126],"randomly":[127],"key3":[129],"(Selection":[130],"Bit":[132],"length-SB)":[133],"number":[139],"bits":[141],"selected":[147],"co-efficients.":[148],"method":[150],"shows":[151],"good":[152],"imperceptibility,":[153],"High":[154],"capacity":[155],"Robustness.":[157]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
