{"id":"https://openalex.org/W2063979605","doi":"https://doi.org/10.1109/isias.2010.5604078","title":"Novel technique for steganography in fingerprints images: Design and implementation","display_name":"Novel technique for steganography in fingerprints images: Design and implementation","publication_year":2010,"publication_date":"2010-08-01","ids":{"openalex":"https://openalex.org/W2063979605","doi":"https://doi.org/10.1109/isias.2010.5604078","mag":"2063979605"},"language":"en","primary_location":{"id":"doi:10.1109/isias.2010.5604078","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isias.2010.5604078","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 Sixth International Conference on Information Assurance and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113689841","display_name":"Hanan Mahmoud","orcid":null},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Hanan Mahmoud","raw_affiliation_strings":["College of Computer and Information Sciences Centre of Excellence in Information Assurance Department of Information Technology, King Saud University, Saudi Arabia","Department of Information Technology, College of Computer and Information Sciences, Centre of Excellence in Information Assurance, King Saud University, Kingdom of Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"College of Computer and Information Sciences Centre of Excellence in Information Assurance Department of Information Technology, King Saud University, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]},{"raw_affiliation_string":"Department of Information Technology, College of Computer and Information Sciences, Centre of Excellence in Information Assurance, King Saud University, Kingdom of Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028354828","display_name":"Hanan Saad Al-Hulaibah","orcid":null},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Hanan Saad Al-Hulaibah","raw_affiliation_strings":["College of Computer and Information Sciences Centre of Excellence in Information Assurance Department of Information Technology, King Saud University, Saudi Arabia","Department of Information Technology, College of Computer and Information Sciences, Centre of Excellence in Information Assurance, King Saud University, Kingdom of Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"College of Computer and Information Sciences Centre of Excellence in Information Assurance Department of Information Technology, King Saud University, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]},{"raw_affiliation_string":"Department of Information Technology, College of Computer and Information Sciences, Centre of Excellence in Information Assurance, King Saud University, Kingdom of Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044669751","display_name":"Sarah Ahmad Al-Naeem","orcid":null},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Sarah Ahmad Al-Naeem","raw_affiliation_strings":["College of Computer and Information Sciences Centre of Excellence in Information Assurance Department of Information Technology, King Saud University, Saudi Arabia","Department of Information Technology, College of Computer and Information Sciences, Centre of Excellence in Information Assurance, King Saud University, Kingdom of Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"College of Computer and Information Sciences Centre of Excellence in Information Assurance Department of Information Technology, King Saud University, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]},{"raw_affiliation_string":"Department of Information Technology, College of Computer and Information Sciences, Centre of Excellence in Information Assurance, King Saud University, Kingdom of Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069568575","display_name":"Suha Ali Al-Qhatani","orcid":null},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Suha Ali Al-Qhatani","raw_affiliation_strings":["College of Computer and Information Sciences Centre of Excellence in Information Assurance Department of Information Technology, King Saud University, Saudi Arabia","Department of Information Technology, College of Computer and Information Sciences, Centre of Excellence in Information Assurance, King Saud University, Kingdom of Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"College of Computer and Information Sciences Centre of Excellence in Information Assurance Department of Information Technology, King Saud University, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]},{"raw_affiliation_string":"Department of Information Technology, College of Computer and Information Sciences, Centre of Excellence in Information Assurance, King Saud University, Kingdom of Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050823952","display_name":"Aljoharah Al-Dawood","orcid":null},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Aljoharah Al-Dawood","raw_affiliation_strings":["College of Computer and Information Sciences Centre of Excellence in Information Assurance Department of Information Technology, King Saud University, Saudi Arabia","Department of Information Technology, College of Computer and Information Sciences, Centre of Excellence in Information Assurance, King Saud University, Kingdom of Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"College of Computer and Information Sciences Centre of Excellence in Information Assurance Department of Information Technology, King Saud University, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]},{"raw_affiliation_string":"Department of Information Technology, College of Computer and Information Sciences, Centre of Excellence in Information Assurance, King Saud University, Kingdom of Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065718906","display_name":"Buthaina Saleh Al-Nassar","orcid":null},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Buthaina Saleh Al-Nassar","raw_affiliation_strings":["College of Computer and Information Sciences Centre of Excellence in Information Assurance Department of Information Technology, King Saud University, Saudi Arabia","Department of Information Technology, College of Computer and Information Sciences, Centre of Excellence in Information Assurance, King Saud University, Kingdom of Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"College of Computer and Information Sciences Centre of Excellence in Information Assurance Department of Information Technology, King Saud University, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]},{"raw_affiliation_string":"Department of Information Technology, College of Computer and Information Sciences, Centre of Excellence in Information Assurance, King Saud University, Kingdom of Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047121087","display_name":"Dhay Yousef AL-Salman","orcid":null},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Dhay Yousef AL-Salman","raw_affiliation_strings":["College of Computer and Information Sciences Centre of Excellence in Information Assurance Department of Information Technology, King Saud University, Saudi Arabia","Department of Information Technology, College of Computer and Information Sciences, Centre of Excellence in Information Assurance, King Saud University, Kingdom of Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"College of Computer and Information Sciences Centre of Excellence in Information Assurance Department of Information Technology, King Saud University, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]},{"raw_affiliation_string":"Department of Information Technology, College of Computer and Information Sciences, Centre of Excellence in Information Assurance, King Saud University, Kingdom of Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5113689841"],"corresponding_institution_ids":["https://openalex.org/I28022161"],"apc_list":null,"apc_paid":null,"fwci":1.2749,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.81536087,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"48","last_page":"51"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.8817234039306641},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.8146722316741943},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8006945848464966},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.7336481213569641},{"id":"https://openalex.org/keywords/fingerprint-recognition","display_name":"Fingerprint recognition","score":0.5729885697364807},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5145341753959656},{"id":"https://openalex.org/keywords/reading","display_name":"Reading (process)","score":0.4160059094429016},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3824085295200348},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.2281275987625122},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.128702312707901}],"concepts":[{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.8817234039306641},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.8146722316741943},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8006945848464966},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.7336481213569641},{"id":"https://openalex.org/C168406668","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Fingerprint recognition","level":3,"score":0.5729885697364807},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5145341753959656},{"id":"https://openalex.org/C554936623","wikidata":"https://www.wikidata.org/wiki/Q199657","display_name":"Reading (process)","level":2,"score":0.4160059094429016},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3824085295200348},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.2281275987625122},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.128702312707901},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isias.2010.5604078","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isias.2010.5604078","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 Sixth International Conference on Information Assurance and Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5400000214576721,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W1945082295","https://openalex.org/W2548970312","https://openalex.org/W3142067920"],"related_works":["https://openalex.org/W3049118997","https://openalex.org/W3014822659","https://openalex.org/W2117826006","https://openalex.org/W4362496757","https://openalex.org/W2051501574","https://openalex.org/W2124627279","https://openalex.org/W2050967184","https://openalex.org/W2566091814","https://openalex.org/W2114937328","https://openalex.org/W2148654711"],"abstract_inverted_index":{"This":[0,129],"paper":[1],"describes":[2],"the":[3,11,46,58,63,66,70,75,80,92,103,120,142,149,152,155,161,169,178,187,190,193,199,201,205,209,212,215],"design":[4],"and":[5,26,38,101,118,127,139,154,164,195,207],"implementation":[6],"of":[7,13,48,52,65,74,141,151,211],"a":[8,115,133],"project":[9,54,130],"concerning":[10],"hiding":[12],"messages":[14,60],"in":[15,72,125,180,192],"images":[16],"specifically":[17],"fingerprint":[18,76,191],"images.":[19],"Fingerprints":[20],"differentiate":[21],"one":[22,27],"person":[23],"from":[24,29],"another,":[25],"finger":[28],"another.":[30],"Every":[31],"human":[32],"being":[33],"has":[34,123],"twenty":[35],"different":[36,116],"fingerprints,":[37],"they":[39],"do":[40],"not":[41,119],"have":[42],"any":[43,181],"similarity":[44],"throughout":[45],"history":[47],"mankind.":[49],"The":[50,145],"policy":[51],"this":[53],"is":[55,78,89],"to":[56,69,99,108,114,135,168,177,214],"keep":[57],"confidential":[59],"hidden":[61,81],"inside":[62,91,160],"drawing":[64],"fingerprints.":[67],"Due":[68],"variations":[71],"shapes":[73],"that":[77,122,172],"carrying":[79],"message,":[82,153,200],"it":[83,105,112,159,167,176],"would":[84,97,203],"appear":[85,107],"as":[86,110],"if":[87,111],"there":[88],"nothing":[90],"message.":[93,144],"So,":[94,171],"anyone":[95],"who":[96],"try":[98],"concentrate":[100],"analyze":[102,204],"fingerprint,":[104,163,206],"will":[106,131,147,157],"him":[109],"belongs":[113],"person,":[117],"picture":[121],"changed":[124],"looks":[126],"colors.":[128],"provide":[132],"system":[134,156,202],"serve":[136],"both":[137],"sender":[138,146],"receiver":[140,179,188],"secret":[143],"write":[148],"content":[150,210],"hide":[158],"new":[162],"then":[165],"return":[166],"sender.":[170],"he":[173,183],"could":[174],"send":[175],"way":[182],"deems":[184],"necessary.":[185],"When":[186],"loads":[189],"system,":[194],"asks":[196],"for":[197],"reading":[198],"display":[208],"message":[213],"receiver.":[216]},"counts_by_year":[{"year":2016,"cited_by_count":1},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
