{"id":"https://openalex.org/W2899722428","doi":"https://doi.org/10.1142/s0219467818500201","title":"Crypto-stego System for Securing Text and Image Data","display_name":"Crypto-stego System for Securing Text and Image Data","publication_year":2018,"publication_date":"2018-10-01","ids":{"openalex":"https://openalex.org/W2899722428","doi":"https://doi.org/10.1142/s0219467818500201","mag":"2899722428"},"language":"en","primary_location":{"id":"doi:10.1142/s0219467818500201","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0219467818500201","pdf_url":null,"source":{"id":"https://openalex.org/S60080701","display_name":"International Journal of Image and Graphics","issn_l":"0219-4678","issn":["0219-4678","1793-6756"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Image and Graphics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002223088","display_name":"Himani Sharma","orcid":"https://orcid.org/0000-0003-3796-8501"},"institutions":[{"id":"https://openalex.org/I110166357","display_name":"University of Delhi","ror":"https://ror.org/04gzb2213","country_code":"IN","type":"education","lineage":["https://openalex.org/I110166357"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Himani Sharma","raw_affiliation_strings":["Department of Computer Science, University of Delhi, Delhi 110007, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Delhi, Delhi 110007, India","institution_ids":["https://openalex.org/I110166357"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110042181","display_name":"D. C. Mishra","orcid":null},"institutions":[{"id":"https://openalex.org/I68891433","display_name":"Indian Institute of Technology Delhi","ror":"https://ror.org/049tgcd06","country_code":"IN","type":"education","lineage":["https://openalex.org/I68891433"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"D. C. Mishra","raw_affiliation_strings":["Department of Mathematics, Govt. P. G. College Jaiharikhal, Lansdowne, Uttarakhand, India","Department of Mathematics, Indian Institute of Technology Delhi, Delhi 110016, India"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics, Govt. P. G. College Jaiharikhal, Lansdowne, Uttarakhand, India","institution_ids":[]},{"raw_affiliation_string":"Department of Mathematics, Indian Institute of Technology Delhi, Delhi 110016, India","institution_ids":["https://openalex.org/I68891433"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050620780","display_name":"R. K. Sharma","orcid":"https://orcid.org/0000-0001-5666-4103"},"institutions":[{"id":"https://openalex.org/I68891433","display_name":"Indian Institute of Technology Delhi","ror":"https://ror.org/049tgcd06","country_code":"IN","type":"education","lineage":["https://openalex.org/I68891433"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"R. K. Sharma","raw_affiliation_strings":["Department of Mathematics, Indian Institute of Technology Delhi, Delhi 110016, India"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics, Indian Institute of Technology Delhi, Delhi 110016, India","institution_ids":["https://openalex.org/I68891433"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076053477","display_name":"Naveen Kumar","orcid":"https://orcid.org/0000-0003-3401-6927"},"institutions":[{"id":"https://openalex.org/I110166357","display_name":"University of Delhi","ror":"https://ror.org/04gzb2213","country_code":"IN","type":"education","lineage":["https://openalex.org/I110166357"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Naveen Kumar","raw_affiliation_strings":["Department of Computer Science, University of Delhi, Delhi 110007, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Delhi, Delhi 110007, India","institution_ids":["https://openalex.org/I110166357"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5002223088"],"corresponding_institution_ids":["https://openalex.org/I110166357"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.12775089,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"18","issue":"04","first_page":"1850020","last_page":"1850020"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7607969641685486},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6948040127754211},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.6357495188713074},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.5504190325737},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5467069745063782},{"id":"https://openalex.org/keywords/grayscale","display_name":"Grayscale","score":0.44416236877441406},{"id":"https://openalex.org/keywords/data-transmission","display_name":"Data transmission","score":0.4377390146255493},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.43225225806236267},{"id":"https://openalex.org/keywords/key-space","display_name":"Key space","score":0.4199557304382324},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.33711445331573486},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.32873839139938354},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2964065968990326},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2560480833053589},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21899935603141785},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.17136308550834656}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7607969641685486},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6948040127754211},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.6357495188713074},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.5504190325737},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5467069745063782},{"id":"https://openalex.org/C78201319","wikidata":"https://www.wikidata.org/wiki/Q685727","display_name":"Grayscale","level":3,"score":0.44416236877441406},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.4377390146255493},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.43225225806236267},{"id":"https://openalex.org/C105322999","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key space","level":3,"score":0.4199557304382324},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33711445331573486},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.32873839139938354},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2964065968990326},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2560480833053589},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21899935603141785},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.17136308550834656}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s0219467818500201","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0219467818500201","pdf_url":null,"source":{"id":"https://openalex.org/S60080701","display_name":"International Journal of Image and Graphics","issn_l":"0219-4678","issn":["0219-4678","1793-6756"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Image and Graphics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1963620252","https://openalex.org/W1967061303","https://openalex.org/W1985045293","https://openalex.org/W1991413689","https://openalex.org/W1991910122","https://openalex.org/W1992496874","https://openalex.org/W2001464006","https://openalex.org/W2002271489","https://openalex.org/W2002332886","https://openalex.org/W2013085926","https://openalex.org/W2028023382","https://openalex.org/W2031225785","https://openalex.org/W2040103419","https://openalex.org/W2049153637","https://openalex.org/W2051034288","https://openalex.org/W2067341309","https://openalex.org/W2068852290","https://openalex.org/W2075987396","https://openalex.org/W2077851805","https://openalex.org/W2083122891","https://openalex.org/W2086090507","https://openalex.org/W2088129869","https://openalex.org/W2139083115","https://openalex.org/W2142534906","https://openalex.org/W2148593155","https://openalex.org/W2210028997","https://openalex.org/W2325253045","https://openalex.org/W4252813286"],"related_works":["https://openalex.org/W2969135852","https://openalex.org/W3203504906","https://openalex.org/W2497446005","https://openalex.org/W2171676767","https://openalex.org/W4312890355","https://openalex.org/W2189589914","https://openalex.org/W1716757876","https://openalex.org/W83713408","https://openalex.org/W4293373802","https://openalex.org/W4318577714"],"abstract_inverted_index":{"Conventional":[0],"techniques":[1],"for":[2,20,36,176,196],"security":[3,13,171,206],"of":[4,11,39,42,57,89,191,199],"data,":[5],"designed":[6],"by":[7,59,64,149],"using":[8,67],"only":[9],"one":[10],"the":[12,45,94,99,102,106,150,153,156,165,192,200,214],"mechanisms,":[14],"cryptography":[15],"or":[16,121,124,130],"steganography,":[17],"are":[18,161],"suitable":[19],"limited":[21],"applications":[22],"only.":[23],"In":[24,44],"this":[25,78],"paper,":[26],"we":[27,49],"propose":[28],"a":[29,51,87,114,119,125],"crypto-stego":[30,47,194],"system":[31,195],"that":[32,213],"would":[33],"be":[34,111,118],"appropriate":[35],"secure":[37,55,197],"transmission":[38,56,198],"different":[40],"forms":[41],"data.":[43],"proposed":[46,193,215],"system,":[48],"present":[50],"mechanism":[52],"to":[53,98,110,147,163],"provide":[54],"data":[58,80,109,201],"multiple":[60],"safety":[61],"measures,":[62],"firstly":[63],"applying":[65],"encryption":[66],"Affine":[68],"Transform":[69,73],"and":[70,75,92,137,173,189,208],"Discrete":[71],"Cosine":[72],"(DCT)":[74],"then":[76],"merging":[77],"encrypted":[79,136],"with":[81],"an":[82,141],"image,":[83,123,142],"randomly":[84],"chosen":[85],"from":[86,219],"set":[88],"available":[90],"images,":[91,178,180],"sending":[93],"image":[95],"so":[96],"obtained":[97],"receiver":[100],"at":[101],"other":[103],"end":[104],"through":[105,202],"network.":[107,154,204],"The":[108,168,205],"sent":[112,138],"over":[113],"communication":[115],"channel":[116],"may":[117],"gray-scale":[120,177],"colored":[122],"text":[126,181],"document":[127],"(doc,":[128],".txt,":[129,184],".pdf":[131,185],"file).":[132],"As":[133],"it":[134,143],"is":[135,217],"hidden":[139],"in":[140,152],"avoids":[144],"any":[145],"attention":[146],"itself":[148],"observers":[151],"At":[155],"receiver\u2019s":[157],"side,":[158],"reverse":[159],"transformations":[160],"applied":[162],"obtain":[164],"original":[166],"information.":[167],"experimental":[169],"results,":[170],"analysis":[172,175,207,211],"statistical":[174],"RGB":[179],"documents":[182],"(.doc,":[183],"files),":[186],"show":[187],"robustness":[188],"appropriateness":[190],"unsecured":[203],"key":[209],"space":[210],"demonstrate":[212],"technique":[216],"immune":[218],"cryptanalysis.":[220]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
