{"id":"https://openalex.org/W4282583570","doi":"https://doi.org/10.1142/s0129054122420011","title":"A Steganography Embedding Method Based on CDF-DWT Technique for Reversible Data Hiding Application Using Elgamal Algorithm","display_name":"A Steganography Embedding Method Based on CDF-DWT Technique for Reversible Data Hiding Application Using Elgamal Algorithm","publication_year":2022,"publication_date":"2022-06-10","ids":{"openalex":"https://openalex.org/W4282583570","doi":"https://doi.org/10.1142/s0129054122420011"},"language":"en","primary_location":{"id":"doi:10.1142/s0129054122420011","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0129054122420011","pdf_url":null,"source":{"id":"https://openalex.org/S68047077","display_name":"International Journal of Foundations of Computer Science","issn_l":"0129-0541","issn":["0129-0541","1793-6373"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Foundations of Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046608938","display_name":"Konduru Upendra Raju","orcid":"https://orcid.org/0000-0001-7834-3503"},"institutions":[{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Konduru Upendra Raju","raw_affiliation_strings":["SENSE, VIT, Vellore, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"SENSE, VIT, Vellore, India","institution_ids":["https://openalex.org/I876193797"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090912554","display_name":"Amutha Prabha Nagarajan","orcid":"https://orcid.org/0000-0002-3427-8620"},"institutions":[{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Amutha Prabha Nagarajan","raw_affiliation_strings":["School of Electrical Engineering, VIT University, Vellore, India"],"raw_orcid":"https://orcid.org/0000-0002-3427-8620","affiliations":[{"raw_affiliation_string":"School of Electrical Engineering, VIT University, Vellore, India","institution_ids":["https://openalex.org/I876193797"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5090912554"],"corresponding_institution_ids":["https://openalex.org/I876193797"],"apc_list":null,"apc_paid":null,"fwci":0.6122,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.66787241,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"33","issue":"06n07","first_page":"489","last_page":"512"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8714339733123779},{"id":"https://openalex.org/keywords/elgamal-encryption","display_name":"ElGamal encryption","score":0.6371842622756958},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6055036187171936},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.5806288719177246},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.573788046836853},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5147902965545654},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.507675290107727},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.43049174547195435},{"id":"https://openalex.org/keywords/discrete-wavelet-transform","display_name":"Discrete wavelet transform","score":0.4234238266944885},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4123436510562897},{"id":"https://openalex.org/keywords/least-significant-bit","display_name":"Least significant bit","score":0.4121236801147461},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.34343957901000977},{"id":"https://openalex.org/keywords/wavelet","display_name":"Wavelet","score":0.27248427271842957},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.24943047761917114},{"id":"https://openalex.org/keywords/wavelet-transform","display_name":"Wavelet transform","score":0.24137359857559204},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.13946089148521423},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10278108716011047}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8714339733123779},{"id":"https://openalex.org/C11045955","wikidata":"https://www.wikidata.org/wiki/Q1162410","display_name":"ElGamal encryption","level":4,"score":0.6371842622756958},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6055036187171936},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.5806288719177246},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.573788046836853},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5147902965545654},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.507675290107727},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.43049174547195435},{"id":"https://openalex.org/C46286280","wikidata":"https://www.wikidata.org/wiki/Q2414958","display_name":"Discrete wavelet transform","level":4,"score":0.4234238266944885},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4123436510562897},{"id":"https://openalex.org/C4305246","wikidata":"https://www.wikidata.org/wiki/Q3885225","display_name":"Least significant bit","level":2,"score":0.4121236801147461},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.34343957901000977},{"id":"https://openalex.org/C47432892","wikidata":"https://www.wikidata.org/wiki/Q831390","display_name":"Wavelet","level":2,"score":0.27248427271842957},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.24943047761917114},{"id":"https://openalex.org/C196216189","wikidata":"https://www.wikidata.org/wiki/Q2867","display_name":"Wavelet transform","level":3,"score":0.24137359857559204},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.13946089148521423},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10278108716011047},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s0129054122420011","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0129054122420011","pdf_url":null,"source":{"id":"https://openalex.org/S68047077","display_name":"International Journal of Foundations of Computer Science","issn_l":"0129-0541","issn":["0129-0541","1793-6373"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Foundations of Computer Science","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W2004362160","https://openalex.org/W2744302516","https://openalex.org/W2756356744","https://openalex.org/W2765976091","https://openalex.org/W2787721122","https://openalex.org/W2790502203","https://openalex.org/W2800106282","https://openalex.org/W2803824336","https://openalex.org/W2806860970","https://openalex.org/W2810167250","https://openalex.org/W2884179402","https://openalex.org/W2907454123","https://openalex.org/W2933424612","https://openalex.org/W2942420070","https://openalex.org/W2991143120","https://openalex.org/W2991954941","https://openalex.org/W3016944783","https://openalex.org/W3022995288","https://openalex.org/W3028611907","https://openalex.org/W3038101350","https://openalex.org/W3081291413","https://openalex.org/W3086297266","https://openalex.org/W3086336336","https://openalex.org/W3111585419","https://openalex.org/W3128843451"],"related_works":["https://openalex.org/W2552735223","https://openalex.org/W3193946645","https://openalex.org/W2019376999","https://openalex.org/W2794806384","https://openalex.org/W2570551752","https://openalex.org/W2295181992","https://openalex.org/W2464325323","https://openalex.org/W2176302261","https://openalex.org/W2992834705","https://openalex.org/W2182672842"],"abstract_inverted_index":{"Steganography":[0,36,44,165,249],"is":[1,39,62,69,96,105,137,158,221],"a":[2,35],"data":[3,15,21,56,95,104,125,136],"hiding":[4,13,57,72,258],"method":[5,38,46,157,166,239,250],"mainly":[6],"used":[7],"in":[8,16,126,244,247,278],"the":[9,17,20,66,73,77,92,102,112,127,140,144,162,180,188,232,237,248],"security":[10,29],"purposes.":[11],"While":[12],"more":[14],"embedding":[18,170],"process":[19,116],"may":[22],"be":[23],"lost":[24],"and":[25,83,143,167,174,177,225,231,246],"also":[26],"cause":[27],"some":[28],"problems.":[30],"To":[31,132],"avoid":[32],"this":[33,42,65,124,156],"problem":[34],"Embedding":[37,45,118,172,226,264],"used.":[40],"In":[41,64,123],"manuscript,":[43],"based":[47,274],"on":[48],"Cohen\u2013Daubechies\u2013Feauveau":[49],"Discrete":[50],"Wavelet":[51],"Transform":[52],"(CDF-DWT)":[53],"technique":[54,192],"to":[55,148,159,168,178,202],"application":[58],"using":[59,119,164],"Elgamal":[60,99,194],"algorithm":[61,195],"proposed.":[63],"cover":[67,78,108],"image":[68,79,109,114,142],"taken":[70],"for":[71,110],"secret":[74,94,103,151,163],"data.":[75,152],"Then":[76,91,101],"edges":[80],"are":[81,130,146,228,234],"detected":[82],"filtered":[84],"with":[85,98,193,236,251,266],"Speeded-Up":[86],"Robust":[87],"Features":[88],"(SURF)":[89],"method.":[90],"input":[93],"encrypted":[97],"algorithm.":[100],"hided":[106],"under":[107],"obtaining":[111],"stego":[113,128,141],"by":[115],"of":[117,155,187],"CDF":[120,190],"DWT":[121,191],"technique.":[122],"images":[129,261],"unreadable.":[131],"get":[133,149],"readable":[134],"secured":[135,150],"extracted":[138],"from":[139],"data\u2019s":[145],"decrypted":[147],"The":[153,183],"objective":[154],"safe":[160],"guard":[161],"increase":[169],"efficiency,":[171],"capacity":[173,176],"carrier":[175],"reduce":[179],"execution":[181],"time.":[182],"MATLAB":[184],"simulation":[185],"results":[186],"proposed":[189],"portrays":[196],"better":[197],"outcomes":[198],"such":[199,240],"as":[200,241],"Peak":[201],"Signal":[203],"Noise":[204],"Ratio":[205],"(PSNR),":[206],"Mean":[207],"Square":[208],"Error":[209,213],"(MSE)":[210],"(lower),":[211],"Bit":[212],"Rate":[214],"(BER)":[215],"was":[216],"Lower,":[217],"Execution":[218],"time":[219],"provides":[220],"lower,":[222],"Carrier":[223],"Capacity":[224,227],"much":[229],"higher":[230],"values":[233],"compared":[235],"existing":[238],"Elliptic":[242],"Galois":[243],"cryptography":[245],"Adaptive":[252,263],"Firefly":[253],"Algorithm":[254],"(EGC-AFA),":[255],"Reversible":[256,275],"Data":[257,276],"within":[259],"Encrypted":[260,279],"Via":[262],"Strategy":[265],"block":[267],"selection":[268],"(RDHEI-AES),":[269],"Double":[270],"Linear":[271],"Regression":[272],"Prediction":[273],"Hiding":[277],"Image":[280],"(DLRP-RDHEI)":[281],"respectively.":[282]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
