{"id":"https://openalex.org/W4378364075","doi":"https://doi.org/10.1109/isdfs58141.2023.10131890","title":"Exploring Advanced Encryption and Steganography Techniques for Image Security","display_name":"Exploring Advanced Encryption and Steganography Techniques for Image Security","publication_year":2023,"publication_date":"2023-05-11","ids":{"openalex":"https://openalex.org/W4378364075","doi":"https://doi.org/10.1109/isdfs58141.2023.10131890"},"language":"en","primary_location":{"id":"doi:10.1109/isdfs58141.2023.10131890","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isdfs58141.2023.10131890","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 11th International Symposium on Digital Forensics and Security (ISDFS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004421138","display_name":"Mohak Kataria","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Mohak Kataria","raw_affiliation_strings":["Amrita Vishwa Vidyapeetham,Center for CyberSecurity Systems and Networks,Amritapuri,India","Center for CyberSecurity Systems and Networks, Amrita Vishwa Vidyapeetham, Amritapuri, India"],"affiliations":[{"raw_affiliation_string":"Amrita Vishwa Vidyapeetham,Center for CyberSecurity Systems and Networks,Amritapuri,India","institution_ids":["https://openalex.org/I81556334"]},{"raw_affiliation_string":"Center for CyberSecurity Systems and Networks, Amrita Vishwa Vidyapeetham, Amritapuri, India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013774176","display_name":"Kurunandan Jain","orcid":"https://orcid.org/0000-0003-2038-1114"},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Kurunandan Jain","raw_affiliation_strings":["Amrita Vishwa Vidyapeetham,Center for CyberSecurity Systems and Networks,Amritapuri,India","Center for CyberSecurity Systems and Networks, Amrita Vishwa Vidyapeetham, Amritapuri, India"],"affiliations":[{"raw_affiliation_string":"Amrita Vishwa Vidyapeetham,Center for CyberSecurity Systems and Networks,Amritapuri,India","institution_ids":["https://openalex.org/I81556334"]},{"raw_affiliation_string":"Center for CyberSecurity Systems and Networks, Amrita Vishwa Vidyapeetham, Amritapuri, India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101966597","display_name":"Narayanan Subramanian","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Narayanan Subramanian","raw_affiliation_strings":["Amrita Vishwa Vidyapeetham,Center for CyberSecurity Systems and Networks,Amritapuri,India","Center for CyberSecurity Systems and Networks, Amrita Vishwa Vidyapeetham, Amritapuri, India"],"affiliations":[{"raw_affiliation_string":"Amrita Vishwa Vidyapeetham,Center for CyberSecurity Systems and Networks,Amritapuri,India","institution_ids":["https://openalex.org/I81556334"]},{"raw_affiliation_string":"Center for CyberSecurity Systems and Networks, Amrita Vishwa Vidyapeetham, Amritapuri, India","institution_ids":["https://openalex.org/I81556334"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5004421138"],"corresponding_institution_ids":["https://openalex.org/I81556334"],"apc_list":null,"apc_paid":null,"fwci":2.2107,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.89759699,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8089489936828613},{"id":"https://openalex.org/keywords/steganography-tools","display_name":"Steganography tools","score":0.785315215587616},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7758289575576782},{"id":"https://openalex.org/keywords/least-significant-bit","display_name":"Least significant bit","score":0.7188801169395447},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.702582061290741},{"id":"https://openalex.org/keywords/histogram","display_name":"Histogram","score":0.5947981476783752},{"id":"https://openalex.org/keywords/advanced-encryption-standard","display_name":"Advanced Encryption Standard","score":0.44943487644195557},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.4223648011684418},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.390893816947937},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.37888407707214355},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3402805030345917},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.27321749925613403}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8089489936828613},{"id":"https://openalex.org/C13179402","wikidata":"https://www.wikidata.org/wiki/Q7606662","display_name":"Steganography tools","level":4,"score":0.785315215587616},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7758289575576782},{"id":"https://openalex.org/C4305246","wikidata":"https://www.wikidata.org/wiki/Q3885225","display_name":"Least significant bit","level":2,"score":0.7188801169395447},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.702582061290741},{"id":"https://openalex.org/C53533937","wikidata":"https://www.wikidata.org/wiki/Q185020","display_name":"Histogram","level":3,"score":0.5947981476783752},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.44943487644195557},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4223648011684418},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.390893816947937},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.37888407707214355},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3402805030345917},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.27321749925613403},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isdfs58141.2023.10131890","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isdfs58141.2023.10131890","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 11th International Symposium on Digital Forensics and Security (ISDFS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.4000000059604645}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1556212265","https://openalex.org/W1629301835","https://openalex.org/W1763079358","https://openalex.org/W2056105196","https://openalex.org/W2102892532","https://openalex.org/W2234523762","https://openalex.org/W2321741788","https://openalex.org/W2472975867","https://openalex.org/W2778373198","https://openalex.org/W3010269666","https://openalex.org/W3216623187","https://openalex.org/W3217568916","https://openalex.org/W4230398518","https://openalex.org/W6638205164"],"related_works":["https://openalex.org/W2049703184","https://openalex.org/W2158736088","https://openalex.org/W2977151837","https://openalex.org/W2181427603","https://openalex.org/W2409080236","https://openalex.org/W2796470635","https://openalex.org/W2347929411","https://openalex.org/W2238140690","https://openalex.org/W2047695298","https://openalex.org/W4214583425"],"abstract_inverted_index":{"This":[0,108],"paper":[1],"investigates":[2],"the":[3,43,95,114],"use":[4,116],"of":[5,42,80,104,117],"modern":[6],"steganography":[7,23,90,118],"techniques":[8,93],"for":[9,71,121],"secure":[10,122],"image":[11,123],"transmission,":[12],"utilizing":[13],"four":[14],"encryption":[15,92,120],"algorithms:":[16],"AES,":[17],"DES,":[18],"RSA,":[19],"and":[20,26,33,56,69,91,106,119,130],"ChaCha20.":[21],"Two":[22],"techniques,":[24],"LSB":[25,77,83],"Spread":[27,74],"Spectrum,":[28],"are":[29],"used":[30],"to":[31,97],"encrypt":[32],"embed":[34],"ciphertext":[35],"into":[36],"five":[37],"different":[38,89],"images.":[39],"The":[40],"security":[41,105],"created":[44],"images":[45],"is":[46,64],"evaluated":[47],"using":[48],"metrics":[49],"such":[50],"as":[51],"PSNR,":[52],"runtime,":[53],"MSE,":[54],"histogram,":[55],"information":[57],"entropy.":[58],"Our":[59],"analysis":[60],"reveals":[61],"that":[62],"DES":[63],"less":[65],"effective":[66,115],"than":[67],"AES":[68],"ChaCha20":[70],"encryption.":[72],"Furthermore,":[73],"Spectrum":[75],"outperforms":[76],"in":[78,125],"terms":[79],"security,":[81],"although":[82],"produces":[84],"better":[85],"stego-image":[86],"quality.":[87],"Combining":[88],"enhances":[94],"capacity":[96],"send":[98],"photos":[99],"with":[100],"a":[101],"high":[102],"level":[103],"robustness.":[107],"study":[109],"provides":[110],"insightful":[111],"knowledge":[112],"on":[113],"transmission":[124],"various":[126],"industries,":[127],"including":[128],"military":[129],"healthcare":[131],"imaging":[132],"applications":[133]},"counts_by_year":[{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":10}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
