{"id":"https://openalex.org/W3003921256","doi":"https://doi.org/10.1109/indin41052.2019.8972175","title":"Pixel Value Difference Based Image Steganography with One Time Pad Encryption","display_name":"Pixel Value Difference Based Image Steganography with One Time Pad Encryption","publication_year":2019,"publication_date":"2019-07-01","ids":{"openalex":"https://openalex.org/W3003921256","doi":"https://doi.org/10.1109/indin41052.2019.8972175","mag":"3003921256"},"language":"en","primary_location":{"id":"doi:10.1109/indin41052.2019.8972175","is_oa":false,"landing_page_url":"https://doi.org/10.1109/indin41052.2019.8972175","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 17th International Conference on Industrial Informatics (INDIN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026954553","display_name":"Giridhar Maji","orcid":"https://orcid.org/0000-0003-4751-3471"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Giridhar Maji","raw_affiliation_strings":["Asansol Polytechnic,Department of Electrical Engineering,Asansol,India","Department of Electrical Engineering, Asansol Polytechnic, Asansol, India"],"affiliations":[{"raw_affiliation_string":"Asansol Polytechnic,Department of Electrical Engineering,Asansol,India","institution_ids":[]},{"raw_affiliation_string":"Department of Electrical Engineering, Asansol Polytechnic, Asansol, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049202864","display_name":"Sharmistha Mandal","orcid":"https://orcid.org/0000-0002-8653-565X"},"institutions":[{"id":"https://openalex.org/I94234084","display_name":"Indian Institute of Technology Kanpur","ror":"https://ror.org/05pjsgx75","country_code":"IN","type":"education","lineage":["https://openalex.org/I94234084"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sharmistha Mandal","raw_affiliation_strings":["Kanyapur Polytechnic,Department of Computer Science and Technology,Asansol,India","Department of Computer Science and Technology, Kanyapur Polytechnic, Asansol, India"],"affiliations":[{"raw_affiliation_string":"Kanyapur Polytechnic,Department of Computer Science and Technology,Asansol,India","institution_ids":["https://openalex.org/I94234084"]},{"raw_affiliation_string":"Department of Computer Science and Technology, Kanyapur Polytechnic, Asansol, India","institution_ids":["https://openalex.org/I94234084"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111936306","display_name":"Narayan C. Debnath","orcid":null},"institutions":[{"id":"https://openalex.org/I4210142079","display_name":"Eastern International University","ror":"https://ror.org/03gvjya19","country_code":"VN","type":"education","lineage":["https://openalex.org/I4210142079"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Narayan C. Debnath","raw_affiliation_strings":["Eastern International University,School of Computing and Information Technology,Vietnam","School of Computing and Information Technology, Eastern International University, Vietnam"],"affiliations":[{"raw_affiliation_string":"Eastern International University,School of Computing and Information Technology,Vietnam","institution_ids":["https://openalex.org/I4210142079"]},{"raw_affiliation_string":"School of Computing and Information Technology, Eastern International University, Vietnam","institution_ids":["https://openalex.org/I4210142079"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080702284","display_name":"Soumya Sen","orcid":"https://orcid.org/0000-0002-9178-6410"},"institutions":[{"id":"https://openalex.org/I106542073","display_name":"University of Calcutta","ror":"https://ror.org/01e7v7w47","country_code":"IN","type":"education","lineage":["https://openalex.org/I106542073"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Soumya Sen","raw_affiliation_strings":["University of Calcutta,A. K. Choudhury School of Information Technology,Kolkata,India","A. K. Choudhury School of Information Technology, University of Calcutta, Kolkata, India"],"affiliations":[{"raw_affiliation_string":"University of Calcutta,A. K. Choudhury School of Information Technology,Kolkata,India","institution_ids":["https://openalex.org/I106542073"]},{"raw_affiliation_string":"A. K. Choudhury School of Information Technology, University of Calcutta, Kolkata, India","institution_ids":["https://openalex.org/I106542073"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5026954553"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.6073,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.734526,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1358","last_page":"1363"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.7755521535873413},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7293680310249329},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.7102975249290466},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5968673825263977},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5581708550453186},{"id":"https://openalex.org/keywords/value","display_name":"Value (mathematics)","score":0.517231285572052},{"id":"https://openalex.org/keywords/steganography-tools","display_name":"Steganography tools","score":0.4833333194255829},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.45363670587539673},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.43537092208862305},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3157922327518463},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.05437415838241577}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.7755521535873413},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7293680310249329},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.7102975249290466},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5968673825263977},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5581708550453186},{"id":"https://openalex.org/C2776291640","wikidata":"https://www.wikidata.org/wiki/Q2912517","display_name":"Value (mathematics)","level":2,"score":0.517231285572052},{"id":"https://openalex.org/C13179402","wikidata":"https://www.wikidata.org/wiki/Q7606662","display_name":"Steganography tools","level":4,"score":0.4833333194255829},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.45363670587539673},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.43537092208862305},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3157922327518463},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.05437415838241577}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/indin41052.2019.8972175","is_oa":false,"landing_page_url":"https://doi.org/10.1109/indin41052.2019.8972175","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 17th International Conference on Industrial Informatics (INDIN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1486829028","https://openalex.org/W1503556315","https://openalex.org/W1930150098","https://openalex.org/W2021035517","https://openalex.org/W2041560266","https://openalex.org/W2046423394","https://openalex.org/W2121970116","https://openalex.org/W2122942551","https://openalex.org/W2129547628","https://openalex.org/W2140648454","https://openalex.org/W2146621575","https://openalex.org/W2153531593","https://openalex.org/W2247558465","https://openalex.org/W2385966854","https://openalex.org/W2405296432","https://openalex.org/W2467397955","https://openalex.org/W2546761989","https://openalex.org/W2610196140","https://openalex.org/W2765680357","https://openalex.org/W2783640645","https://openalex.org/W2794500818","https://openalex.org/W2922386834","https://openalex.org/W6713598220"],"related_works":["https://openalex.org/W4200536956","https://openalex.org/W2987450641","https://openalex.org/W2912476846","https://openalex.org/W2109850579","https://openalex.org/W2992834705","https://openalex.org/W1542750176","https://openalex.org/W4287557466","https://openalex.org/W3111975322","https://openalex.org/W3186053739","https://openalex.org/W1612080935"],"abstract_inverted_index":{"Pixel":[0],"value":[1],"differencing":[2],"(PVD)":[3],"and":[4,102,129],"Least":[5],"Significant":[6],"Bit":[7],"(LSB)":[8],"embedding":[9],"are":[10,64,87,99],"well":[11],"known":[12,47],"spatial":[13],"domain":[14],"steganographic":[15],"techniques.":[16],"PVD":[17],"utilizes":[18],"the":[19,52,61,68,82,107],"sharp":[20],"changes":[21],"of":[22,31,60,81,126],"intensities":[23],"among":[24],"adjacent":[25],"pixels":[26,63,74],"where":[27],"a":[28],"large":[29],"number":[30],"secret":[32],"bits":[33,59,86,98],"could":[34],"be":[35],"embedded":[36],"without":[37],"any":[38],"perceptible":[39],"change.":[40],"one-time":[41],"pad":[42],"(OTP)":[43],"symmetric":[44],"cryptography":[45],"is":[46],"for":[48],"its":[49],"security.":[50],"In":[51],"proposed":[53],"scheme":[54,108],"one":[55],"or":[56],"more":[57],"LSB":[58],"selected":[62],"used":[65],"depending":[66],"on":[67],"pixel":[69],"intensity":[70],"difference":[71],"with":[72,91,116],"neighboring":[73],"in":[75,124],"2":[76,78],"\u00d7":[77],"image":[79],"blocks":[80],"cover":[83],"image.":[84],"Secret":[85],"encrypted":[88,97],"using":[89],"OTP":[90],"randomly":[92],"generated":[93],"pre-shared":[94],"key.":[95],"Such":[96],"completely":[100],"random":[101],"resemble":[103],"noise":[104],"hence":[105],"make":[106],"robust":[109],"against":[110],"different":[111,130],"statistical":[112],"attacks.":[113],"Comparative":[114],"simulations":[115],"some":[117],"well-known":[118],"PVD-based":[119],"techniques":[120],"show":[121],"good":[122],"results":[123],"terms":[125],"visual":[127],"imperceptibility":[128],"quality":[131],"metrics":[132],"such":[133],"as":[134],"MSE,":[135],"PSNR,":[136],"SSIM":[137],"etc.":[138]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
