{"id":"https://openalex.org/W2107081428","doi":"https://doi.org/10.1145/1014052.1014117","title":"Locating secret messages in images","display_name":"Locating secret messages in images","publication_year":2004,"publication_date":"2004-08-22","ids":{"openalex":"https://openalex.org/W2107081428","doi":"https://doi.org/10.1145/1014052.1014117","mag":"2107081428"},"language":"en","primary_location":{"id":"doi:10.1145/1014052.1014117","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1014052.1014117","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030289182","display_name":"Ian Davidson","orcid":"https://orcid.org/0000-0002-1258-4213"},"institutions":[{"id":"https://openalex.org/I392282","display_name":"University at Albany, State University of New York","ror":"https://ror.org/012zs8222","country_code":"US","type":"education","lineage":["https://openalex.org/I392282"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ian Davidson","raw_affiliation_strings":["SUNY Albany, Albany, NY","SUNY-Albany, Albany, NY"],"affiliations":[{"raw_affiliation_string":"SUNY Albany, Albany, NY","institution_ids":["https://openalex.org/I392282"]},{"raw_affiliation_string":"SUNY-Albany, Albany, NY","institution_ids":["https://openalex.org/I392282"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026354959","display_name":"Goutam Paul","orcid":"https://orcid.org/0000-0002-5160-6032"},"institutions":[{"id":"https://openalex.org/I392282","display_name":"University at Albany, State University of New York","ror":"https://ror.org/012zs8222","country_code":"US","type":"education","lineage":["https://openalex.org/I392282"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Goutam Paul","raw_affiliation_strings":["SUNY Albany, Albany, NY","SUNY-Albany, Albany, NY"],"affiliations":[{"raw_affiliation_string":"SUNY Albany, Albany, NY","institution_ids":["https://openalex.org/I392282"]},{"raw_affiliation_string":"SUNY-Albany, Albany, NY","institution_ids":["https://openalex.org/I392282"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5030289182"],"corresponding_institution_ids":["https://openalex.org/I392282"],"apc_list":null,"apc_paid":null,"fwci":0.5517,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.69941979,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"545","last_page":"550"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.9699783325195312},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8397312760353088},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.767289400100708},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.7235555648803711},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.7125451564788818},{"id":"https://openalex.org/keywords/grayscale","display_name":"Grayscale","score":0.5696172118186951},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.5508419275283813},{"id":"https://openalex.org/keywords/outlier","display_name":"Outlier","score":0.4988222122192383},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4947359263896942},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.413519024848938},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.40965479612350464}],"concepts":[{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.9699783325195312},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8397312760353088},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.767289400100708},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.7235555648803711},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7125451564788818},{"id":"https://openalex.org/C78201319","wikidata":"https://www.wikidata.org/wiki/Q685727","display_name":"Grayscale","level":3,"score":0.5696172118186951},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.5508419275283813},{"id":"https://openalex.org/C79337645","wikidata":"https://www.wikidata.org/wiki/Q779824","display_name":"Outlier","level":2,"score":0.4988222122192383},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4947359263896942},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.413519024848938},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.40965479612350464},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/1014052.1014117","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1014052.1014117","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.60.457","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.457","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.albany.edu/~davidson/Publications/kddres2004.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W129330134","https://openalex.org/W171640027","https://openalex.org/W195213822","https://openalex.org/W1515776961","https://openalex.org/W1589812914","https://openalex.org/W1806317803","https://openalex.org/W1998058925","https://openalex.org/W2057117782","https://openalex.org/W2061122559","https://openalex.org/W2075372638","https://openalex.org/W2100115174","https://openalex.org/W2111160323","https://openalex.org/W2117500881","https://openalex.org/W2125543909","https://openalex.org/W2140190241","https://openalex.org/W3201504863","https://openalex.org/W4238976768","https://openalex.org/W4285719527","https://openalex.org/W6635090181"],"related_works":["https://openalex.org/W2148973528","https://openalex.org/W2939392096","https://openalex.org/W4243922849","https://openalex.org/W2106726851","https://openalex.org/W4309385482","https://openalex.org/W3154843532","https://openalex.org/W2068740952","https://openalex.org/W2182496537","https://openalex.org/W2792878404","https://openalex.org/W1965039524"],"abstract_inverted_index":{"Steganography":[0],"involves":[1],"hiding":[2],"messages":[3],"in":[4,146,151],"innocuous":[5],"media":[6],"such":[7],"as":[8,34,58,99],"images,":[9],"while":[10],"steganalysis":[11,24,55],"is":[12,25],"the":[13,41,62,73,90,94,109,115,118,129],"field":[14],"of":[15,23,31,64,105,121,128,132,135,160],"detecting":[16],"these":[17,65],"secret":[18],"messages.":[19],"The":[20],"ultimate":[21],"goal":[22],"two-fold:":[26],"making":[27],"a":[28,32,169],"binary":[29],"classification":[30],"file":[33,83],"stego-bearing":[35,145,164],"or":[36,50],"innocent,":[37],"and":[38,149],"secondly,":[39],"locating":[40],"hidden":[42,95],"message":[43,96],"with":[44],"an":[45,81,122],"aim":[46],"to":[47,117],"extracting,":[48],"sterilizing":[49],"manipulating":[51],"it.":[52],"Almost":[53],"all":[54,155,161],"approaches":[56],"(known":[57],"attacks)":[59],"focus":[60],"on":[61],"first":[63],"two":[66],"issues.":[67],"In":[68,154],"this":[69],"paper,":[70],"we":[71,79,140],"explore":[72],"difficult":[74],"related":[75],"problem:":[76],"given":[77],"that":[78,142],"know":[80],"image":[82,110,123,156],"contains":[84],"steganography,":[85],"locate":[86],"which":[87],"pixels":[88,138,162],"contain":[89],"message.":[91],"We":[92],"treat":[93],"location":[97],"problem":[98],"outlier":[100],"detection":[101],"using":[102],"probability/energy":[103],"measures":[104],"images":[106,148],"motivated":[107],"by":[108],"restoration":[111],"community.":[112],"Pixels":[113],"contributing":[114],"most":[116,136],"energy":[119],"calculations":[120],"are":[124,144,163],"deemed":[125],"outliers.":[126],"Typically,":[127],"top":[130],"third":[131],"one":[133],"percent":[134],"energized":[137],"(outliers),":[139],"find":[141],"87%":[143],"color":[147],"61%":[150],"grayscale":[152],"images.":[153],"types":[157],"only":[158],"1%":[159],"indicating":[165],"our":[166],"techniques":[167],"provides":[168],"substantial":[170],"lift":[171],"over":[172],"random":[173],"guessing.":[174]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
