{"id":"https://openalex.org/W2057590336","doi":"https://doi.org/10.1109/ispacs.2012.6473531","title":"Re-conceptualization of applications achieved by data hiding","display_name":"Re-conceptualization of applications achieved by data hiding","publication_year":2012,"publication_date":"2012-11-01","ids":{"openalex":"https://openalex.org/W2057590336","doi":"https://doi.org/10.1109/ispacs.2012.6473531","mag":"2057590336"},"language":"en","primary_location":{"id":"doi:10.1109/ispacs.2012.6473531","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ispacs.2012.6473531","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 International Symposium on Intelligent Signal Processing and Communications Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005539321","display_name":"Mustafa S. Abdul Karim","orcid":"https://orcid.org/0000-0001-8581-7009"},"institutions":[{"id":"https://openalex.org/I33849332","display_name":"University of Malaya","ror":"https://ror.org/00rzspn62","country_code":"MY","type":"education","lineage":["https://openalex.org/I33849332"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Mustafa S. Abdul Karim","raw_affiliation_strings":["Universiti Malaya, Kuala Lumpur, Wilayah Persekutuan, MY","Faculty of Computer Science and Information Technology University of Malaya Kuala Lumpur Malaysia"],"affiliations":[{"raw_affiliation_string":"Universiti Malaya, Kuala Lumpur, Wilayah Persekutuan, MY","institution_ids":["https://openalex.org/I33849332"]},{"raw_affiliation_string":"Faculty of Computer Science and Information Technology University of Malaya Kuala Lumpur Malaysia","institution_ids":["https://openalex.org/I33849332"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069916756","display_name":"KokSheik Wong","orcid":"https://orcid.org/0000-0002-4893-2291"},"institutions":[{"id":"https://openalex.org/I33849332","display_name":"University of Malaya","ror":"https://ror.org/00rzspn62","country_code":"MY","type":"education","lineage":["https://openalex.org/I33849332"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"KokSheik Wong","raw_affiliation_strings":["Faculty of Computer Science & Information Technology, University of Malaya, Kuala Lumpur, Malaysia","Faculty of Computer Science and Information Technology University of Malaya Kuala Lumpur Malaysia"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science & Information Technology, University of Malaya, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I33849332"]},{"raw_affiliation_string":"Faculty of Computer Science and Information Technology University of Malaya Kuala Lumpur Malaysia","institution_ids":["https://openalex.org/I33849332"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5005539321"],"corresponding_institution_ids":["https://openalex.org/I33849332"],"apc_list":null,"apc_paid":null,"fwci":0.2745,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.57759582,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"2","issue":null,"first_page":"447","last_page":"451"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.989799976348877,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7625511884689331},{"id":"https://openalex.org/keywords/interchangeability","display_name":"Interchangeability","score":0.7551373839378357},{"id":"https://openalex.org/keywords/conceptualization","display_name":"Conceptualization","score":0.7256954908370972},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.5982794165611267},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5316728949546814},{"id":"https://openalex.org/keywords/commercialization","display_name":"Commercialization","score":0.4901736378669739},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.4884463846683502},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.45730167627334595},{"id":"https://openalex.org/keywords/encoding","display_name":"Encoding (memory)","score":0.41956132650375366},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3831557035446167},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.32399287819862366},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.26905882358551025},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2087748646736145},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.17383399605751038}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7625511884689331},{"id":"https://openalex.org/C2779606619","wikidata":"https://www.wikidata.org/wiki/Q17092524","display_name":"Interchangeability","level":2,"score":0.7551373839378357},{"id":"https://openalex.org/C90734943","wikidata":"https://www.wikidata.org/wiki/Q17008777","display_name":"Conceptualization","level":2,"score":0.7256954908370972},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.5982794165611267},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5316728949546814},{"id":"https://openalex.org/C2780625559","wikidata":"https://www.wikidata.org/wiki/Q5152592","display_name":"Commercialization","level":2,"score":0.4901736378669739},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.4884463846683502},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.45730167627334595},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.41956132650375366},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3831557035446167},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.32399287819862366},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.26905882358551025},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2087748646736145},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.17383399605751038},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ispacs.2012.6473531","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ispacs.2012.6473531","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 International Symposium on Intelligent Signal Processing and Communications Systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W1486049999","https://openalex.org/W1501327254","https://openalex.org/W1534898272","https://openalex.org/W1543166215","https://openalex.org/W1933319074","https://openalex.org/W1969007133","https://openalex.org/W1981570639","https://openalex.org/W1991341498","https://openalex.org/W1993351679","https://openalex.org/W2038127276","https://openalex.org/W2053697006","https://openalex.org/W2056324770","https://openalex.org/W2066021566","https://openalex.org/W2089507792","https://openalex.org/W2093323819","https://openalex.org/W2100913369","https://openalex.org/W2110762258","https://openalex.org/W2113046006","https://openalex.org/W2114249920","https://openalex.org/W2116380715","https://openalex.org/W2118375353","https://openalex.org/W2124890704","https://openalex.org/W2127213289","https://openalex.org/W2136078037","https://openalex.org/W2139456307","https://openalex.org/W2144622095","https://openalex.org/W2145419924","https://openalex.org/W2153531593","https://openalex.org/W2162434844","https://openalex.org/W2169131452","https://openalex.org/W2170965893","https://openalex.org/W2949940413","https://openalex.org/W4285719527","https://openalex.org/W6678529076"],"related_works":["https://openalex.org/W2367063746","https://openalex.org/W601292351","https://openalex.org/W1583204413","https://openalex.org/W2335017665","https://openalex.org/W2348347833","https://openalex.org/W1547279692","https://openalex.org/W2086770499","https://openalex.org/W2984198677","https://openalex.org/W2363010783","https://openalex.org/W2464328296"],"abstract_inverted_index":{"Data":[0],"hiding":[1],"(DH)":[2],"is":[3,78],"a":[4],"general":[5],"concept":[6],"that":[7,21,80],"overlaps":[8],"with":[9],"many":[10],"applications":[11],"and":[12,29,63],"it":[13],"re-conceptualizes":[14],"them.":[15],"In":[16],"this":[17],"paper,":[18],"we":[19],"show":[20],"DH":[22,96],"can":[23],"re-conceptualize":[24],"relationaldatabase,":[25],"networking,":[26],"DNA":[27],"manipulation":[28],"digital":[30],"content":[31],"commercialization":[32],"by":[33],"embedding":[34],"some":[35],"attributes":[36],"into":[37],"others":[38],"(to":[39,51,59,67],"reduce":[40,52],"integrity":[41],"problem),":[42],"utilizing":[43],"the":[44,69,88,95],"packets'":[45],"load":[46],"to":[47,56,71,87],"accommodate":[48],"extra":[49],"information":[50,58],"bandwidth),":[53],"utilize":[54],"genes":[55],"store":[57],"achieve":[60],"biological":[61],"memory),":[62],"introducing":[64],"command-interactive":[65],"payloads":[66],"guide":[68],"decoder":[70],"act":[72],"upon":[73],"certain":[74],"conditions),":[75],"respectively.":[76],"It":[77],"shown":[79],"such":[81],"re-conceptualizations":[82],"are":[83],"currently":[84],"restricted":[85],"due":[86],"lack":[89],"of":[90,94],"interchangeability":[91],"in":[92],"most":[93],"methods.":[97]},"counts_by_year":[{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
