{"id":"https://openalex.org/W2138574626","doi":"https://doi.org/10.1109/itcc.2004.1286660","title":"Significance of steganography on data security","display_name":"Significance of steganography on data security","publication_year":2004,"publication_date":"2004-01-01","ids":{"openalex":"https://openalex.org/W2138574626","doi":"https://doi.org/10.1109/itcc.2004.1286660","mag":"2138574626"},"language":"en","primary_location":{"id":"doi:10.1109/itcc.2004.1286660","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itcc.2004.1286660","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5098258057","display_name":"VenkatramanS","orcid":null},"institutions":[{"id":"https://openalex.org/I215927","display_name":"University of Madras","ror":"https://ror.org/04jmt9361","country_code":"IN","type":"education","lineage":["https://openalex.org/I215927"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"VenkatramanS","raw_affiliation_strings":["Dept. of Comput. Sci. & Eng., Madras Univ., India","[Dept. of Comput. Sci. & Eng., Madras Univ., India]"],"affiliations":[{"raw_affiliation_string":"Dept. of Comput. Sci. & Eng., Madras Univ., India","institution_ids":["https://openalex.org/I215927"]},{"raw_affiliation_string":"[Dept. of Comput. Sci. & Eng., Madras Univ., India]","institution_ids":["https://openalex.org/I215927"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087542455","display_name":"Ajith Abraham","orcid":"https://orcid.org/0000-0002-0169-6738"},"institutions":[{"id":"https://openalex.org/I115475287","display_name":"Oklahoma State University","ror":"https://ror.org/01g9vbr38","country_code":"US","type":"education","lineage":["https://openalex.org/I115475287"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ajith Abraham","raw_affiliation_strings":["Dept. of Computer Science, Oklahoma State University, USA","Department of Computer Science, Oklahoma State University, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science, Oklahoma State University, USA","institution_ids":["https://openalex.org/I115475287"]},{"raw_affiliation_string":"Department of Computer Science, Oklahoma State University, USA#TAB#","institution_ids":["https://openalex.org/I115475287"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5053781299","display_name":"Marcin Paprzycki","orcid":"https://orcid.org/0000-0002-8069-2152"},"institutions":[{"id":"https://openalex.org/I115475287","display_name":"Oklahoma State University","ror":"https://ror.org/01g9vbr38","country_code":"US","type":"education","lineage":["https://openalex.org/I115475287"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"M. Paprzycki","raw_affiliation_strings":["Dept. of Computer Science, Oklahoma State University, USA","Department of Computer Science, Oklahoma State University, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science, Oklahoma State University, USA","institution_ids":["https://openalex.org/I115475287"]},{"raw_affiliation_string":"Department of Computer Science, Oklahoma State University, USA#TAB#","institution_ids":["https://openalex.org/I115475287"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5098258057"],"corresponding_institution_ids":["https://openalex.org/I215927"],"apc_list":null,"apc_paid":null,"fwci":1.913,"has_fulltext":false,"cited_by_count":110,"citation_normalized_percentile":{"value":0.87438184,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"347","last_page":"351 Vol.2"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9731000065803528,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.9023354649543762},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7957485914230347},{"id":"https://openalex.org/keywords/least-significant-bit","display_name":"Least significant bit","score":0.641029417514801},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.5884914994239807},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.575417697429657},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.5685105323791504},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5283936858177185},{"id":"https://openalex.org/keywords/masking","display_name":"Masking (illustration)","score":0.5048564076423645},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.5046113729476929},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5005404949188232},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.49469873309135437},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.3517865538597107},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.2822166681289673},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2327243983745575}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.9023354649543762},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7957485914230347},{"id":"https://openalex.org/C4305246","wikidata":"https://www.wikidata.org/wiki/Q3885225","display_name":"Least significant bit","level":2,"score":0.641029417514801},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.5884914994239807},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.575417697429657},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.5685105323791504},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5283936858177185},{"id":"https://openalex.org/C2777402240","wikidata":"https://www.wikidata.org/wiki/Q6783436","display_name":"Masking (illustration)","level":2,"score":0.5048564076423645},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.5046113729476929},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5005404949188232},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.49469873309135437},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.3517865538597107},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2822166681289673},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2327243983745575},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/itcc.2004.1286660","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itcc.2004.1286660","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004.","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.77.160","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.77.160","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.softcomputing.net/steg.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6100000143051147}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W36323238","https://openalex.org/W1878907771","https://openalex.org/W2062821417","https://openalex.org/W2104808305","https://openalex.org/W2106069707","https://openalex.org/W2118625829","https://openalex.org/W2141852054","https://openalex.org/W2159390040","https://openalex.org/W3142067920","https://openalex.org/W3214524701","https://openalex.org/W6639237725"],"related_works":["https://openalex.org/W3127945325","https://openalex.org/W2205085860","https://openalex.org/W2885826910","https://openalex.org/W2134958869","https://openalex.org/W2181427603","https://openalex.org/W2409080236","https://openalex.org/W2977151837","https://openalex.org/W2074995973","https://openalex.org/W2796470635","https://openalex.org/W2771684231"],"abstract_inverted_index":{"With":[0],"the":[1,17,33,54,74,88,102,105,121,134,140,148,154],"ever":[2],"increasing":[3],"amount":[4],"and":[5,12,32,38,48,130,137,159],"variety":[6],"of":[7,19,29,36,70,104,123,150],"data":[8,56,116,124],"to":[9,23,59,66,99,132],"be":[10,24],"stored":[11],"transmitted":[13],"in":[14,57,111,153,160],"various":[15,27,135],"mediums,":[16],"specification":[18],"security":[20],"which":[21],"has":[22,40],"established":[25],"at":[26],"levels":[28],"medium":[30],"access":[31,71],"accompanying":[34],"issues":[35],"authentication":[37],"authorization":[39],"become":[41],"a":[42],"critical":[43],"factor.":[44],"Various":[45],"steganographic,":[46],"watermarking":[47],"data-embedding":[49],"algorithms":[50,114,142,158],"have":[51],"usually":[52,79,92],"manipulated":[53],"actual":[55],"order":[58],"either":[60],"hide":[61],"any":[62],"coveted":[63],"information":[64,112],"or":[65,87],"provide":[67],"some":[68],"level":[69],"control":[72],"over":[73],"medium.":[75],"The":[76],"mediums":[77],"are":[78,109],"images,":[80,129],"video,":[81],"audio":[82],"etc.,":[83],"wherein":[84],"specific":[85],"portions":[86],"overall":[89],"space":[90],"is":[91],"'corrupted'":[93],"with":[94,120],"'significant'":[95],"data.":[96],"We":[97,145],"attempt":[98],"bring":[100],"out":[101],"significance":[103],"steganographic":[106,141,156],"techniques":[107],"that":[108,139],"employed":[110],"processing":[113],"for":[115],"security.":[117],"It":[118],"deals":[119],"problem":[122],"security,":[125],"focusing":[126],"mainly":[127],"on":[128],"tries":[131],"state":[133],"properties":[136],"characteristics":[138],"should":[143],"possess.":[144],"also":[146],"highlight":[147],"technique":[149],"masking":[151],"used":[152],"conventional":[155],"LSB":[157],"its":[161],"variants.":[162]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":7},{"year":2016,"cited_by_count":5},{"year":2015,"cited_by_count":7},{"year":2014,"cited_by_count":9},{"year":2013,"cited_by_count":9},{"year":2012,"cited_by_count":7}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
