{"id":"https://openalex.org/W2911244255","doi":"https://doi.org/10.1109/nsyss.2018.8631377","title":"A Technique to Enrich the Secrecy Level of High Capacity Data Hiding Steganography Technique in JPEG Compressed Image","display_name":"A Technique to Enrich the Secrecy Level of High Capacity Data Hiding Steganography Technique in JPEG Compressed Image","publication_year":2018,"publication_date":"2018-12-01","ids":{"openalex":"https://openalex.org/W2911244255","doi":"https://doi.org/10.1109/nsyss.2018.8631377","mag":"2911244255"},"language":"en","primary_location":{"id":"doi:10.1109/nsyss.2018.8631377","is_oa":false,"landing_page_url":"https://doi.org/10.1109/nsyss.2018.8631377","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 5th International Conference on Networking, Systems and Security (NSysS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064108106","display_name":"Nur Imtiazul Haque","orcid":"https://orcid.org/0000-0003-2865-632X"},"institutions":[{"id":"https://openalex.org/I1307585291","display_name":"Khulna University of Engineering and Technology","ror":"https://ror.org/04y58d606","country_code":"BD","type":"education","lineage":["https://openalex.org/I1307585291"]}],"countries":["BD"],"is_corresponding":true,"raw_author_name":"Nur Imtiazul Haque","raw_affiliation_strings":["Department of Computer Science and Engineering, Khulna University of Engineering & Technology, Khulna-9203, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Khulna University of Engineering & Technology, Khulna-9203, Bangladesh","institution_ids":["https://openalex.org/I1307585291"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014285597","display_name":"Kazi Md. Rokibul Alam","orcid":"https://orcid.org/0000-0003-4895-7234"},"institutions":[{"id":"https://openalex.org/I1307585291","display_name":"Khulna University of Engineering and Technology","ror":"https://ror.org/04y58d606","country_code":"BD","type":"education","lineage":["https://openalex.org/I1307585291"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Kazi Md. Rokibul Alam","raw_affiliation_strings":["Department of Computer Science and Engineering, Khulna University of Engineering & Technology, Khulna-9203, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Khulna University of Engineering & Technology, Khulna-9203, Bangladesh","institution_ids":["https://openalex.org/I1307585291"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034225885","display_name":"Tasfia Mashiat","orcid":"https://orcid.org/0000-0002-3015-2641"},"institutions":[{"id":"https://openalex.org/I1307585291","display_name":"Khulna University of Engineering and Technology","ror":"https://ror.org/04y58d606","country_code":"BD","type":"education","lineage":["https://openalex.org/I1307585291"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Tasfia Mashiat","raw_affiliation_strings":["Department of Computer Science and Engineering, Khulna University of Engineering & Technology, Khulna-9203, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Khulna University of Engineering & Technology, Khulna-9203, Bangladesh","institution_ids":["https://openalex.org/I1307585291"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078425375","display_name":"Yasuhiko Morimoto","orcid":"https://orcid.org/0000-0001-7130-2864"},"institutions":[{"id":"https://openalex.org/I113306721","display_name":"Hiroshima University","ror":"https://ror.org/03t78wx29","country_code":"JP","type":"education","lineage":["https://openalex.org/I113306721"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yasuhiko Morimoto","raw_affiliation_strings":["Graduate School of Information Engineering, Hiroshima University, Higashi-Hiroshima 739-8521, Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Information Engineering, Hiroshima University, Higashi-Hiroshima 739-8521, Japan","institution_ids":["https://openalex.org/I113306721"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5064108106"],"corresponding_institution_ids":["https://openalex.org/I1307585291"],"apc_list":null,"apc_paid":null,"fwci":0.1045,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.4863389,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10901","display_name":"Advanced Data Compression Techniques","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6887064576148987},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6505739092826843},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.6245518326759338},{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.5928891897201538},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.5822495818138123},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.5504742860794067},{"id":"https://openalex.org/keywords/quantization","display_name":"Quantization (signal processing)","score":0.49537336826324463},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.4863198697566986},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.46153151988983154},{"id":"https://openalex.org/keywords/jpeg-2000","display_name":"JPEG 2000","score":0.4412158727645874},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4238629937171936},{"id":"https://openalex.org/keywords/image-quality","display_name":"Image quality","score":0.4137972891330719},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.39728763699531555},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.3825344443321228},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.34547072649002075},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.32255831360816956},{"id":"https://openalex.org/keywords/image-compression","display_name":"Image compression","score":0.3224891424179077},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.23433440923690796},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15754616260528564}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6887064576148987},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6505739092826843},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.6245518326759338},{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.5928891897201538},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.5822495818138123},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.5504742860794067},{"id":"https://openalex.org/C28855332","wikidata":"https://www.wikidata.org/wiki/Q198099","display_name":"Quantization (signal processing)","level":2,"score":0.49537336826324463},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.4863198697566986},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.46153151988983154},{"id":"https://openalex.org/C69216139","wikidata":"https://www.wikidata.org/wiki/Q931783","display_name":"JPEG 2000","level":5,"score":0.4412158727645874},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4238629937171936},{"id":"https://openalex.org/C55020928","wikidata":"https://www.wikidata.org/wiki/Q3813865","display_name":"Image quality","level":3,"score":0.4137972891330719},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.39728763699531555},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.3825344443321228},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.34547072649002075},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.32255831360816956},{"id":"https://openalex.org/C13481523","wikidata":"https://www.wikidata.org/wiki/Q412438","display_name":"Image compression","level":4,"score":0.3224891424179077},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.23433440923690796},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15754616260528564},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/nsyss.2018.8631377","is_oa":false,"landing_page_url":"https://doi.org/10.1109/nsyss.2018.8631377","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 5th International Conference on Networking, Systems and Security (NSysS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W207323941","https://openalex.org/W1817574727","https://openalex.org/W2118053687","https://openalex.org/W2503107053","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W3203504906","https://openalex.org/W2497446005","https://openalex.org/W1529294424","https://openalex.org/W2241212938","https://openalex.org/W2441603424","https://openalex.org/W1597187555","https://openalex.org/W2614249221","https://openalex.org/W2160587766","https://openalex.org/W2357125417","https://openalex.org/W1966340347"],"abstract_inverted_index":{"This":[0,145],"paper":[1],"proposes":[2],"a":[3,24,34,60],"technique":[4,136,142,158],"that":[5,63],"enriches":[6],"the":[7,49,55,68,72,76,86,91,103,127,134,156,174],"secrecy":[8],"level":[9],"of":[10,29,33,110,115,137,165],"high":[11],"capacity":[12,83,87,119,175,188],"data":[13,41,74,81,93,166],"hiding":[14,82,135],"(HCDH)":[15],"steganography":[16],"technique.":[17,154],"The":[18],"main":[19],"concept":[20],"is":[21,57,78,94,143,148,159,182],"to":[22,37,47,126,161,172],"generate":[23],"Quantized":[25],"DCT":[26,153],"coefficient":[27],"(QDCTC)":[28],"each":[30],"8x8":[31],"blocks":[32],"cover":[35,104],"image,":[36],"hide":[38,162],"encrypted":[39,95],"secret":[40,73,92,111],"inside":[42,75,102,167],"those":[43],"coefficients":[44],"and":[45,100,121,176,187,192],"finally":[46],"compress":[48],"image":[50],"by":[51,85,96,150],"entropy":[52],"coding.":[53],"Here,":[54],"QDCTC":[56,77],"generated":[58],"using":[59,80,131],"Quantization":[61],"table":[62],"can":[64],"vary":[65],"based":[66],"on":[67],"quality":[69],"factor.":[70],"Now":[71],"embedded":[79,101],"calculated":[84],"estimation":[88],"equation.":[89],"Then":[90],"chaotic":[97,116],"key":[98,117],"sequence":[99],"image.":[105,170],"At":[106],"last,":[107],"SHA-256":[108],"hash":[109],"data,":[112],"r":[113],"parameter":[114],"sequence,":[118],"factor":[120,123],"uniformity":[122,138],"are":[124],"sent":[125],"receiver":[128],"after":[129],"encrypting":[130],"RSA.":[132],"However,":[133],"flag":[139],"in":[140],"HCDH":[141],"insecure.":[144],"security":[146],"problem":[147],"resolved":[149],"combining":[151],"Swap":[152],"Thereby":[155],"proposed":[157,193],"suitable":[160],"any":[163],"type":[164],"JPEG":[168],"compressed":[169],"Finally,":[171],"evaluate":[173],"accuracy":[177],"requirement,":[178],"an":[179],"experimental":[180],"analysis":[181],"performed":[183],"employing":[184],"MSE,":[185],"PSNR":[186],"comparison":[189],"between":[190],"existing":[191],"techniques.":[194]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
