{"id":"https://openalex.org/W2885119436","doi":"https://doi.org/10.1109/mce.2017.2716412","title":"Securing Data Through Steganography and Secret Sharing Schemes: Trapping and Misleading Potential Attackers","display_name":"Securing Data Through Steganography and Secret Sharing Schemes: Trapping and Misleading Potential Attackers","publication_year":2018,"publication_date":"2018-08-08","ids":{"openalex":"https://openalex.org/W2885119436","doi":"https://doi.org/10.1109/mce.2017.2716412","mag":"2885119436"},"language":"en","primary_location":{"id":"doi:10.1109/mce.2017.2716412","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mce.2017.2716412","pdf_url":null,"source":{"id":"https://openalex.org/S2483040032","display_name":"IEEE Consumer Electronics Magazine","issn_l":"2162-2248","issn":["2162-2248","2162-2256"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Consumer Electronics Magazine","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047671653","display_name":"Mohit Rajput","orcid":null},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mohit Rajput","raw_affiliation_strings":["Georgia Institute of Technology, Atlanta"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology, Atlanta","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085351888","display_name":"Maroti Deshmukh","orcid":"https://orcid.org/0000-0002-1125-5987"},"institutions":[{"id":"https://openalex.org/I4400573290","display_name":"National Institute of Technology Uttarakhand","ror":"https://ror.org/05pet6f20","country_code":null,"type":"education","lineage":["https://openalex.org/I4400573290"]},{"id":"https://openalex.org/I8778637","display_name":"National Institute of Technology Srinagar","ror":"https://ror.org/03sfwvw54","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210152752","https://openalex.org/I8778637"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Maroti Deshmukh","raw_affiliation_strings":["National Institute of Technology, Uttarakhand, India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology, Uttarakhand, India","institution_ids":["https://openalex.org/I8778637","https://openalex.org/I4400573290"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050462733","display_name":"Neeta Nain","orcid":"https://orcid.org/0000-0002-0550-0376"},"institutions":[{"id":"https://openalex.org/I83205935","display_name":"Malaviya National Institute of Technology Jaipur","ror":"https://ror.org/0077k1j32","country_code":"IN","type":"education","lineage":["https://openalex.org/I83205935"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Neeta Nain","raw_affiliation_strings":["Malaviya National Institute of Technology Jaipur, India"],"affiliations":[{"raw_affiliation_string":"Malaviya National Institute of Technology Jaipur, India","institution_ids":["https://openalex.org/I83205935"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002897338","display_name":"Mushtaq Ahmed","orcid":"https://orcid.org/0000-0002-7576-2531"},"institutions":[{"id":"https://openalex.org/I83205935","display_name":"Malaviya National Institute of Technology Jaipur","ror":"https://ror.org/0077k1j32","country_code":"IN","type":"education","lineage":["https://openalex.org/I83205935"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Mushtaq Ahmed","raw_affiliation_strings":["Department of Computer Science and Engineering, Malaviya National Institute of Technology Jaipur, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Malaviya National Institute of Technology Jaipur, India","institution_ids":["https://openalex.org/I83205935"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5047671653"],"corresponding_institution_ids":["https://openalex.org/I130701444"],"apc_list":null,"apc_paid":null,"fwci":0.5223,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.7066204,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"7","issue":"5","first_page":"40","last_page":"45"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7788706421852112},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7469704747200012},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.7405622005462646},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.6176202893257141},{"id":"https://openalex.org/keywords/image-sharing","display_name":"Image sharing","score":0.5934311747550964},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.5629673600196838},{"id":"https://openalex.org/keywords/homomorphic-secret-sharing","display_name":"Homomorphic secret sharing","score":0.5250192284584045},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.506011426448822},{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.48135048151016235},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4811757504940033},{"id":"https://openalex.org/keywords/steganography-tools","display_name":"Steganography tools","score":0.462168425321579},{"id":"https://openalex.org/keywords/grayscale","display_name":"Grayscale","score":0.4437098801136017},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.41188016533851624},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3843257427215576},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.36062294244766235},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.35411763191223145},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.35118961334228516},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1489580273628235}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7788706421852112},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7469704747200012},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.7405622005462646},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.6176202893257141},{"id":"https://openalex.org/C2780639701","wikidata":"https://www.wikidata.org/wiki/Q354869","display_name":"Image sharing","level":3,"score":0.5934311747550964},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.5629673600196838},{"id":"https://openalex.org/C132161212","wikidata":"https://www.wikidata.org/wiki/Q5891458","display_name":"Homomorphic secret sharing","level":4,"score":0.5250192284584045},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.506011426448822},{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.48135048151016235},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4811757504940033},{"id":"https://openalex.org/C13179402","wikidata":"https://www.wikidata.org/wiki/Q7606662","display_name":"Steganography tools","level":4,"score":0.462168425321579},{"id":"https://openalex.org/C78201319","wikidata":"https://www.wikidata.org/wiki/Q685727","display_name":"Grayscale","level":3,"score":0.4437098801136017},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.41188016533851624},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3843257427215576},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.36062294244766235},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35411763191223145},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.35118961334228516},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1489580273628235},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mce.2017.2716412","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mce.2017.2716412","pdf_url":null,"source":{"id":"https://openalex.org/S2483040032","display_name":"IEEE Consumer Electronics Magazine","issn_l":"2162-2248","issn":["2162-2248","2162-2256"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Consumer Electronics Magazine","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6600000262260437,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1760480417","https://openalex.org/W1986408604","https://openalex.org/W2042460306","https://openalex.org/W2073783310","https://openalex.org/W2108898568","https://openalex.org/W2131686606","https://openalex.org/W2518043470","https://openalex.org/W2625944916","https://openalex.org/W2913419753","https://openalex.org/W3046793313","https://openalex.org/W6758417790","https://openalex.org/W6781617422"],"related_works":["https://openalex.org/W2350486768","https://openalex.org/W1680673927","https://openalex.org/W3138619437","https://openalex.org/W2164344703","https://openalex.org/W2384158193","https://openalex.org/W2736079351","https://openalex.org/W3130643437","https://openalex.org/W3022124400","https://openalex.org/W2168248827","https://openalex.org/W2026753506"],"abstract_inverted_index":{"Data":[0],"hiding":[1],"is":[2,57,70,75,89,154,212],"the":[3,22,45,64,67,83,90,93,102,108,112,132,163,173,184,188,209,221,235,238],"process":[4,69,88],"of":[5,47,92,220,230,237],"concealing":[6],"recognizable":[7],"digital":[8],"data":[9],"by":[10,78,165,186],"converting":[11],"it":[12,26,74,161,177],"into":[13],"indiscernible":[14],"forms,":[15],"i.e.,":[16],"those":[17],"that":[18,43,208],"are":[19,120],"imperceptible":[20],"to":[21,30,156,171,183,196],"human":[23],"eye,":[24],"and":[25,49,55,105,126,147,199,217,246,253],"uses":[27,44],"numerous":[28],"techniques":[29,258],"accomplish":[31],"this":[32,35],"task.":[33],"In":[34,111,169],"article,":[36],"we":[37,97,142],"propose":[38],"a":[39,79,127,157,174,228],"new":[40],"data-hiding":[41],"technique":[42],"concept":[46],"steganography":[48,106],"secret":[50,99,128,231],"image-sharing":[51],"schemes.":[52],"The":[53,86,151,190,204],"encryption":[54,68,94,113],"decryption":[56,87,133],"carried":[58],"out":[59],"at":[60,63,82,101,214],"two":[61],"levels:":[62],"first":[65,103],"level,":[66],"done":[71],"using":[72,122],"steganography;":[73],"then":[76],"followed":[77],"secret-sharing":[80,158],"scheme":[81,153,159,211],"second":[84,109],"level.":[85,110],"opposite":[91],"process;":[95],"accordingly,":[96],"use":[98],"sharing":[100],"level":[104],"in":[107],"process,":[114],"n":[115,123,137,144,193,222],"+":[116,138],"1":[117,139],"shared":[118,140],"images":[119,125,146,195],"generated":[121],"cover":[124],"image.":[129,150],"By":[130],"performing":[131],"algorithm":[134],"on":[135],"these":[136],"images,":[141,248],"get":[143],"recovered":[145,194],"one":[148],"stego":[149],"proposed":[152,210,239],"similar":[155],"because":[160],"deceives":[162],"attacker":[164,191],"producing":[166],"pseudo":[167],"images.":[168],"addition":[170],"deceiving":[172],"t":[175],"tacker,":[176],"also":[178],"provides":[179],"an":[180],"additional":[181],"advantage":[182],"user":[185],"capturing":[187],"attacker.":[189],"considers":[192],"be":[197],"output":[198],"follows":[200],"his/her":[201],"wrong":[202],"intuition.":[203],"experimental":[205],"results":[206],"demonstrate":[207],"secure":[213],"both":[215],"levels":[216],"altering":[218],"any":[219],"shares":[223],"will":[224],"not":[225],"reveal":[226],"even":[227],"portion":[229],"information.":[232],"To":[233],"check":[234],"effectiveness":[236],"scheme,":[240],"which":[241],"works":[242],"efficiently":[243],"for":[244],"grayscale":[245],"color":[247],"correlation,":[249],"mean-square":[250],"error":[251],"(MSE),":[252],"peak":[254],"signal-to-noise":[255],"ratio":[256],"(PSNR)":[257],"were":[259],"used.":[260]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
