{"id":"https://openalex.org/W2963828702","doi":"https://doi.org/10.1109/tifs.2019.2929441","title":"Adaptive Batch Size Image Merging Steganography and Quantized Gaussian Image Steganography","display_name":"Adaptive Batch Size Image Merging Steganography and Quantized Gaussian Image Steganography","publication_year":2019,"publication_date":"2019-07-17","ids":{"openalex":"https://openalex.org/W2963828702","doi":"https://doi.org/10.1109/tifs.2019.2929441","mag":"2963828702"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2019.2929441","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2019.2929441","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022466235","display_name":"Mehdi Sharifzadeh","orcid":"https://orcid.org/0000-0001-7786-9909"},"institutions":[{"id":"https://openalex.org/I39422238","display_name":"University of Illinois Chicago","ror":"https://ror.org/02mpq6x41","country_code":"US","type":"education","lineage":["https://openalex.org/I39422238"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mehdi Sharifzadeh","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Illinois at Chicago, Chicago, IL, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Illinois at Chicago, Chicago, IL, USA","institution_ids":["https://openalex.org/I39422238"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009490082","display_name":"Mohammed Aloraini","orcid":"https://orcid.org/0000-0002-1655-8098"},"institutions":[{"id":"https://openalex.org/I39422238","display_name":"University of Illinois Chicago","ror":"https://ror.org/02mpq6x41","country_code":"US","type":"education","lineage":["https://openalex.org/I39422238"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohammed Aloraini","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Illinois at Chicago, Chicago, IL, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Illinois at Chicago, Chicago, IL, USA","institution_ids":["https://openalex.org/I39422238"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081723612","display_name":"Dan Schonfeld","orcid":"https://orcid.org/0000-0002-2772-4821"},"institutions":[{"id":"https://openalex.org/I39422238","display_name":"University of Illinois Chicago","ror":"https://ror.org/02mpq6x41","country_code":"US","type":"education","lineage":["https://openalex.org/I39422238"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dan Schonfeld","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Illinois at Chicago, Chicago, IL, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Illinois at Chicago, Chicago, IL, USA","institution_ids":["https://openalex.org/I39422238"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5022466235"],"corresponding_institution_ids":["https://openalex.org/I39422238"],"apc_list":null,"apc_paid":null,"fwci":4.1502,"has_fulltext":false,"cited_by_count":74,"citation_normalized_percentile":{"value":0.95303889,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"15","issue":null,"first_page":"867","last_page":"879"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.927409291267395},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7282835245132446},{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.7134331464767456},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.6004047989845276},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.5562578439712524},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5051410794258118},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4639747738838196},{"id":"https://openalex.org/keywords/gaussian","display_name":"Gaussian","score":0.45672234892845154},{"id":"https://openalex.org/keywords/statistical-model","display_name":"Statistical model","score":0.455827534198761},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.4334755539894104},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3828582167625427},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.35772308707237244},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.35036975145339966},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3293479084968567}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.927409291267395},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7282835245132446},{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.7134331464767456},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.6004047989845276},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.5562578439712524},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5051410794258118},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4639747738838196},{"id":"https://openalex.org/C163716315","wikidata":"https://www.wikidata.org/wiki/Q901177","display_name":"Gaussian","level":2,"score":0.45672234892845154},{"id":"https://openalex.org/C114289077","wikidata":"https://www.wikidata.org/wiki/Q3284399","display_name":"Statistical model","level":2,"score":0.455827534198761},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.4334755539894104},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3828582167625427},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.35772308707237244},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.35036975145339966},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3293479084968567},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2019.2929441","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2019.2929441","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W22271197","https://openalex.org/W1531834518","https://openalex.org/W1878907771","https://openalex.org/W1955882805","https://openalex.org/W1968832000","https://openalex.org/W1976570511","https://openalex.org/W2015721798","https://openalex.org/W2026084516","https://openalex.org/W2028197392","https://openalex.org/W2031466562","https://openalex.org/W2036237598","https://openalex.org/W2041195352","https://openalex.org/W2075652908","https://openalex.org/W2106663508","https://openalex.org/W2124664712","https://openalex.org/W2125015779","https://openalex.org/W2128974515","https://openalex.org/W2134527668","https://openalex.org/W2136744314","https://openalex.org/W2152637282","https://openalex.org/W2154026545","https://openalex.org/W2170311913","https://openalex.org/W2170598445","https://openalex.org/W2192227561","https://openalex.org/W2511661528","https://openalex.org/W2538511122","https://openalex.org/W2588827000","https://openalex.org/W2619636077","https://openalex.org/W2665759771","https://openalex.org/W2937851289","https://openalex.org/W3142067920","https://openalex.org/W3142078075","https://openalex.org/W6631848625","https://openalex.org/W6642607108","https://openalex.org/W6654577778","https://openalex.org/W6738669976"],"related_works":["https://openalex.org/W4243922849","https://openalex.org/W2939392096","https://openalex.org/W2148973528","https://openalex.org/W2930153478","https://openalex.org/W4309385482","https://openalex.org/W2040931326","https://openalex.org/W2792878404","https://openalex.org/W1583147569","https://openalex.org/W2068740952","https://openalex.org/W2182496537"],"abstract_inverted_index":{"In":[0],"digital":[1],"image":[2,9,79,97,195],"steganography,":[3,144],"the":[4,28,42,101,104,123,127,133,140,177,184,191,219],"statistical":[5,34,94,135,159],"model":[6,120,193],"of":[7,44,67,86,126,155,170],"an":[8],"is":[10,58,72,188,199],"essential":[11],"for":[12,62,74,96,179,194],"hiding":[13],"data":[14],"in":[15,27,53,99,146],"less":[16],"detectable":[17],"regions":[18],"and":[19,33,48,82,103,158,164,197,214,224],"achieving":[20],"better":[21,76],"security.":[22],"This":[23,162],"has":[24],"been":[25],"addressed":[26],"literature":[29],"where":[30],"different":[31],"cost-based":[32,143,157],"model-based":[35,160],"approaches":[36],"were":[37],"proposed.":[38],"However,":[39],"due":[40],"to":[41,142,201],"usage":[43],"heuristically":[45],"defined":[46],"distortions":[47],"non-constrained":[49],"message":[50],"models,":[51],"resulting":[52,145],"numerically":[54],"solvable":[55],"equations,":[56],"there":[57],"no":[59],"closed-form":[60,70,185],"expression":[61,71],"security":[63],"as":[64,109],"a":[65,75,93,116,147,172],"function":[66],"payload.":[68],"The":[69],"crucial":[73],"insight":[77],"into":[78],"steganography":[80,88,98,196,222],"problem":[81],"also":[83],"improving":[84],"performance":[85],"batch":[87,202,221],"algorithms.":[89],"Here,":[90],"we":[91,138,205],"develop":[92],"framework":[95],"which":[100],"cover":[102],"stego":[105],"messages":[106],"are":[107],"modeled":[108],"multivariate":[110],"Gaussian":[111,118],"random":[112],"variables.":[113],"We":[114],"propose":[115],"novel":[117],"embedding":[119,149,181],"by":[121,168,229],"maximizing":[122],"detection":[124,186],"error":[125,187],"most":[128],"common":[129],"optimal":[130],"detectors":[131],"within":[132,190],"adopted":[134,192],"model.":[136],"Furthermore,":[137],"extend":[139],"formulation":[141],"universal":[148],"scheme":[150],"that":[151],"improves":[152],"empirical":[153],"results":[154],"current":[156],"approaches.":[161],"methodology":[163],"its":[165,227],"presented":[166],"solution,":[167],"reason":[169],"assuming":[171],"continuous":[173],"hidden":[174],"message,":[175],"remains":[176],"same":[178],"any":[180],"scenario.":[182],"Afterward,":[183],"derived":[189],"it":[198,217],"extended":[200],"steganography.":[203],"Thus,":[204],"introduce":[206],"Adaptive":[207],"Batch":[208],"size":[209],"Image":[210],"Merging":[211],"steganographer,":[212],"AdaBIM,":[213],"mathematically":[215],"prove":[216],"outperforms":[218],"state-of-the-art":[220],"method":[223],"further":[225],"verify":[226],"superiority":[228],"experiments.":[230]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":16},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":15},{"year":2021,"cited_by_count":17},{"year":2020,"cited_by_count":9},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
