{"id":"https://openalex.org/W2888657771","doi":"https://doi.org/10.1109/saci.2018.8440965","title":"Information Hiding into OBJ Format File Using Vector Steganography Techniques","display_name":"Information Hiding into OBJ Format File Using Vector Steganography Techniques","publication_year":2018,"publication_date":"2018-05-01","ids":{"openalex":"https://openalex.org/W2888657771","doi":"https://doi.org/10.1109/saci.2018.8440965","mag":"2888657771"},"language":"en","primary_location":{"id":"doi:10.1109/saci.2018.8440965","is_oa":false,"landing_page_url":"https://doi.org/10.1109/saci.2018.8440965","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078652692","display_name":"Branislav Mado\u0161","orcid":"https://orcid.org/0000-0002-6701-6504"},"institutions":[{"id":"https://openalex.org/I183764125","display_name":"Technical University of Ko\u0161ice","ror":"https://ror.org/05xm08015","country_code":"SK","type":"education","lineage":["https://openalex.org/I183764125"]}],"countries":["SK"],"is_corresponding":true,"raw_author_name":"Branislav Mados","raw_affiliation_strings":["Department of Computers and Informatics, Faculty of Electrical Engineering and Informatics Technical University of Ko\u0161ice, Ko\u0161ice, Slovakia"],"affiliations":[{"raw_affiliation_string":"Department of Computers and Informatics, Faculty of Electrical Engineering and Informatics Technical University of Ko\u0161ice, Ko\u0161ice, Slovakia","institution_ids":["https://openalex.org/I183764125"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091372149","display_name":"Anton Bal\u00e1\u017e","orcid":"https://orcid.org/0000-0002-9857-0559"},"institutions":[{"id":"https://openalex.org/I183764125","display_name":"Technical University of Ko\u0161ice","ror":"https://ror.org/05xm08015","country_code":"SK","type":"education","lineage":["https://openalex.org/I183764125"]}],"countries":["SK"],"is_corresponding":false,"raw_author_name":"Anton Balaz","raw_affiliation_strings":["Department of Computers and Informatics, Faculty of Electrical Engineering and Informatics Technical University of Ko\u0161ice, Ko\u0161ice, Slovakia"],"affiliations":[{"raw_affiliation_string":"Department of Computers and Informatics, Faculty of Electrical Engineering and Informatics Technical University of Ko\u0161ice, Ko\u0161ice, Slovakia","institution_ids":["https://openalex.org/I183764125"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089093830","display_name":"Norbert \u00c1d\u00e1m","orcid":"https://orcid.org/0000-0003-1355-4988"},"institutions":[{"id":"https://openalex.org/I183764125","display_name":"Technical University of Ko\u0161ice","ror":"https://ror.org/05xm08015","country_code":"SK","type":"education","lineage":["https://openalex.org/I183764125"]}],"countries":["SK"],"is_corresponding":false,"raw_author_name":"Norbert Adam","raw_affiliation_strings":["Department of Computers and Informatics, Faculty of Electrical Engineering and Informatics Technical University of Ko\u0161ice, Ko\u0161ice, Slovakia"],"affiliations":[{"raw_affiliation_string":"Department of Computers and Informatics, Faculty of Electrical Engineering and Informatics Technical University of Ko\u0161ice, Ko\u0161ice, Slovakia","institution_ids":["https://openalex.org/I183764125"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038264845","display_name":"J\u00e1n Hurtuk","orcid":"https://orcid.org/0000-0002-1091-9008"},"institutions":[{"id":"https://openalex.org/I183764125","display_name":"Technical University of Ko\u0161ice","ror":"https://ror.org/05xm08015","country_code":"SK","type":"education","lineage":["https://openalex.org/I183764125"]}],"countries":["SK"],"is_corresponding":false,"raw_author_name":"Jan Hurtuk","raw_affiliation_strings":["Department of Computers and Informatics, Faculty of Electrical Engineering and Informatics Technical University of Ko\u0161ice, Ko\u0161ice, Slovakia"],"affiliations":[{"raw_affiliation_string":"Department of Computers and Informatics, Faculty of Electrical Engineering and Informatics Technical University of Ko\u0161ice, Ko\u0161ice, Slovakia","institution_ids":["https://openalex.org/I183764125"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5078652692"],"corresponding_institution_ids":["https://openalex.org/I183764125"],"apc_list":null,"apc_paid":null,"fwci":0.1045,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.44265259,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"191","issue":null,"first_page":"00091","last_page":"00096"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10481","display_name":"Computer Graphics and Visualization Techniques","score":0.9757000207901001,"subfield":{"id":"https://openalex.org/subfields/1704","display_name":"Computer Graphics and Computer-Aided Design"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.9335777163505554},{"id":"https://openalex.org/keywords/steganography-tools","display_name":"Steganography tools","score":0.7539081573486328},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7456399202346802},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.708509087562561},{"id":"https://openalex.org/keywords/file-format","display_name":"File format","score":0.6735914349555969},{"id":"https://openalex.org/keywords/file-size","display_name":"File size","score":0.46955209970474243},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.3743588328361511},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.33253222703933716},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.31653183698654175},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2280515730381012},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.17056626081466675},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08269000053405762}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.9335777163505554},{"id":"https://openalex.org/C13179402","wikidata":"https://www.wikidata.org/wiki/Q7606662","display_name":"Steganography tools","level":4,"score":0.7539081573486328},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7456399202346802},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.708509087562561},{"id":"https://openalex.org/C97250363","wikidata":"https://www.wikidata.org/wiki/Q235557","display_name":"File format","level":2,"score":0.6735914349555969},{"id":"https://openalex.org/C2776029614","wikidata":"https://www.wikidata.org/wiki/Q1146367","display_name":"File size","level":2,"score":0.46955209970474243},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3743588328361511},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33253222703933716},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.31653183698654175},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2280515730381012},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.17056626081466675},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08269000053405762}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/saci.2018.8440965","is_oa":false,"landing_page_url":"https://doi.org/10.1109/saci.2018.8440965","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W8015548","https://openalex.org/W1556326679","https://openalex.org/W1592269970","https://openalex.org/W1971333002","https://openalex.org/W2031029123","https://openalex.org/W2076003763","https://openalex.org/W2124890704","https://openalex.org/W2161454800","https://openalex.org/W2314911178","https://openalex.org/W2320394555","https://openalex.org/W2521839693","https://openalex.org/W2523310259","https://openalex.org/W6600336778"],"related_works":["https://openalex.org/W2560172240","https://openalex.org/W3146660591","https://openalex.org/W1995538220","https://openalex.org/W3020816551","https://openalex.org/W83713408","https://openalex.org/W2497446005","https://openalex.org/W2171676767","https://openalex.org/W2515414762","https://openalex.org/W2294152966","https://openalex.org/W1622142713"],"abstract_inverted_index":{"The":[0,43,75],"paper":[1,76,168],"deals":[2,77],"with":[3,64,78,148],"the":[4,12,16,20,85,99,129,133,137,149,158,167],"problematics":[5],"of":[6,18,23,33,45,80,87,118,132,139,144,154,160,166,173],"steganography,":[7],"which":[8,36],"is":[9,98],"not":[10,69],"only":[11],"science,":[13],"but":[14],"also":[15],"art":[17],"hiding":[19,94],"very":[21],"existence":[22],"communication":[24,48],"from":[25],"third":[26],"party.":[27],"Steganography":[28],"constantly":[29],"searches":[30],"new":[31,51,57],"ways":[32],"information":[34,46,93,124,156],"hiding,":[35,125],"are":[37,60,126],"often":[38],"considered":[39],"as":[40],"extraordinary":[41],"inventive.":[42],"rise":[44],"and":[47,55,83,109,170],"technologies":[49],"brought":[50],"possibilities":[52,82],"to":[53,151],"steganography":[54,146],"many":[56],"steganographic":[58],"techniques":[59,147],"so":[61],"close":[62],"connected":[63],"ICT,":[65],"that":[66,141],"they":[67],"do":[68],"have":[70],"counterparts":[71],"in":[72,128,180],"non-ICT":[73],"world.":[74],"one":[79],"those":[81],"considers":[84],"use":[86],"object":[88],"file":[89,102,120,182],"format":[90],"(OBJ)":[91],"for":[92,123],"using":[95],"steganography.":[96],"OBJ":[97,119,181],"3D":[100,114],"geometry":[101],"format,":[103,121],"originally":[104],"developed":[105],"by":[106,112,136],"Wavefront":[107],"Technologies":[108],"widely":[110],"adopted":[111],"other":[113],"application":[115],"vendors.":[116],"Properties":[117],"suitable":[122],"discussed":[127],"first":[130],"part":[131,165],"paper,":[134],"followed":[135],"design":[138],"algorithm":[140],"uses":[142],"combination":[143],"vector":[145],"aim":[150],"minimize":[152],"change":[153],"original":[155],"within":[157],"process":[159],"hidden":[161],"message":[162],"encoding.":[163],"Last":[164],"summarizes":[169],"discusses":[171],"results":[172],"tests":[174],"performed":[175],"on":[176],"different":[177],"models":[178],"represented":[179],"format.":[183]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
