{"id":"https://openalex.org/W2125474094","doi":"https://doi.org/10.1109/mmsp.2002.1203315","title":"Data masking: a secure-covert channel paradigm","display_name":"Data masking: a secure-covert channel paradigm","publication_year":2004,"publication_date":"2004-01-24","ids":{"openalex":"https://openalex.org/W2125474094","doi":"https://doi.org/10.1109/mmsp.2002.1203315","mag":"2125474094"},"language":"en","primary_location":{"id":"doi:10.1109/mmsp.2002.1203315","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mmsp.2002.1203315","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2002 IEEE Workshop on Multimedia Signal Processing.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080532753","display_name":"R. Radhakrishnan","orcid":"https://orcid.org/0000-0002-9508-5902"},"institutions":[{"id":"https://openalex.org/I90965887","display_name":"SUNY Polytechnic Institute","ror":"https://ror.org/000fxgx19","country_code":"US","type":"education","lineage":["https://openalex.org/I90965887"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"R. Radhakrishnan","raw_affiliation_strings":["Polytechnic University, Brooklyn, NY, USA","Polytech. Univ., Brooklyn, NY, USA"],"affiliations":[{"raw_affiliation_string":"Polytechnic University, Brooklyn, NY, USA","institution_ids":["https://openalex.org/I90965887"]},{"raw_affiliation_string":"Polytech. Univ., Brooklyn, NY, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008294220","display_name":"Kulesh Shanmugasundaram","orcid":null},"institutions":[{"id":"https://openalex.org/I90965887","display_name":"SUNY Polytechnic Institute","ror":"https://ror.org/000fxgx19","country_code":"US","type":"education","lineage":["https://openalex.org/I90965887"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"K. Shanmugasundaram","raw_affiliation_strings":["Polytechnic University, Brooklyn, NY, USA","Polytech. Univ., Brooklyn, NY, USA"],"affiliations":[{"raw_affiliation_string":"Polytechnic University, Brooklyn, NY, USA","institution_ids":["https://openalex.org/I90965887"]},{"raw_affiliation_string":"Polytech. Univ., Brooklyn, NY, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5006172625","display_name":"Nasir Memon","orcid":"https://orcid.org/0000-0002-0103-9762"},"institutions":[{"id":"https://openalex.org/I90965887","display_name":"SUNY Polytechnic Institute","ror":"https://ror.org/000fxgx19","country_code":"US","type":"education","lineage":["https://openalex.org/I90965887"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"N. Memon","raw_affiliation_strings":["Polytechnic University, Brooklyn, NY, USA","Polytech. Univ., Brooklyn, NY, USA"],"affiliations":[{"raw_affiliation_string":"Polytechnic University, Brooklyn, NY, USA","institution_ids":["https://openalex.org/I90965887"]},{"raw_affiliation_string":"Polytech. Univ., Brooklyn, NY, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5080532753"],"corresponding_institution_ids":["https://openalex.org/I90965887"],"apc_list":null,"apc_paid":null,"fwci":1.6397,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.85277053,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"339","last_page":"342"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8140095472335815},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.786436915397644},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.756131112575531},{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.6532735824584961},{"id":"https://openalex.org/keywords/steganography-tools","display_name":"Steganography tools","score":0.5829585194587708},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4984090328216553},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.495580792427063},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.4840330481529236},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.46609559655189514},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.44913968443870544},{"id":"https://openalex.org/keywords/object","display_name":"Object (grammar)","score":0.44289180636405945},{"id":"https://openalex.org/keywords/masking","display_name":"Masking (illustration)","score":0.41034963726997375},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39468297362327576},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.3697299063205719},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3513423800468445},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.28294825553894043},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.15130659937858582},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.13294145464897156},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07353919744491577}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8140095472335815},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.786436915397644},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.756131112575531},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.6532735824584961},{"id":"https://openalex.org/C13179402","wikidata":"https://www.wikidata.org/wiki/Q7606662","display_name":"Steganography tools","level":4,"score":0.5829585194587708},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4984090328216553},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.495580792427063},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.4840330481529236},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.46609559655189514},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.44913968443870544},{"id":"https://openalex.org/C2781238097","wikidata":"https://www.wikidata.org/wiki/Q175026","display_name":"Object (grammar)","level":2,"score":0.44289180636405945},{"id":"https://openalex.org/C2777402240","wikidata":"https://www.wikidata.org/wiki/Q6783436","display_name":"Masking (illustration)","level":2,"score":0.41034963726997375},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39468297362327576},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.3697299063205719},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3513423800468445},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.28294825553894043},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.15130659937858582},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.13294145464897156},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07353919744491577},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mmsp.2002.1203315","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mmsp.2002.1203315","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2002 IEEE Workshop on Multimedia Signal Processing.","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320338279","display_name":"Air Force Office of Scientific Research","ror":"https://ror.org/011e9bt93"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1589812914","https://openalex.org/W1855479288","https://openalex.org/W1878907771","https://openalex.org/W2061397706","https://openalex.org/W2075652908","https://openalex.org/W2119199090","https://openalex.org/W2576355915","https://openalex.org/W6639209693"],"related_works":["https://openalex.org/W2560172240","https://openalex.org/W3146660591","https://openalex.org/W1995538220","https://openalex.org/W3020816551","https://openalex.org/W2338095724","https://openalex.org/W83713408","https://openalex.org/W3203504906","https://openalex.org/W2171676767","https://openalex.org/W2497446005","https://openalex.org/W2054011204"],"abstract_inverted_index":{"It":[0],"is":[1,101,124],"well":[2],"known":[3],"that":[4,113],"encryption":[5],"provides":[6],"secure":[7],"channels":[8],"for":[9,33],"communicating":[10,38],"entities.":[11],"However,":[12],"due":[13],"to":[14,43,86,106],"lack":[15],"of":[16,54,61,127],"covertness":[17],"on":[18],"these":[19],"channels,":[20],"an":[21,82,98,125],"eavesdropper":[22,99],"can":[23,40,116],"identify":[24],"encrypted":[25,108],"streams":[26],"through":[27],"statistical":[28,104],"test":[29],"and":[30],"capture":[31],"them":[32],"further":[34],"cryptanalysis.":[35],"Hence,":[36],"the":[37,77],"entities":[39],"use":[41],"steganography":[42,56],"achieve":[44],"covertness.":[45],"In":[46],"this":[47],"paper,":[48],"we":[49,75,96],"propose":[50],"a":[51,63,67,91,119],"new":[52],"form":[53],"multimedia":[55,68,73,92],"called":[57],"data":[58],"masking.":[59],"Instead":[60],"embedding":[62],"secret":[64,79],"message":[65,80],"into":[66],"object,":[69],"as":[70],"in":[71],"traditional":[72,131],"steganography,":[74],"process":[76],"entire":[78],"using":[81],"inverse":[83],"Wiener":[84],"filter":[85],"make":[87],"it":[88],"look":[89],"like":[90],"object":[93],"itself.":[94],"Thereby":[95],"foil":[97],"who":[100],"primarily":[102],"applying":[103],"tests":[105],"detect":[107],"communication":[109],"channels.":[110],"We":[111],"show":[112],"our":[114],"approach":[115],"potentially":[117],"give":[118],"covert":[120],"channel":[121],"capacity,":[122],"which":[123],"order":[126],"magnitude":[128],"higher":[129],"than":[130],"steganography.":[132]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
