{"id":"https://openalex.org/W2036347516","doi":"https://doi.org/10.1145/2600918.2600942","title":"Predictable rain?","display_name":"Predictable rain?","publication_year":2014,"publication_date":"2014-06-10","ids":{"openalex":"https://openalex.org/W2036347516","doi":"https://doi.org/10.1145/2600918.2600942","mag":"2036347516"},"language":"en","primary_location":{"id":"doi:10.1145/2600918.2600942","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2600918.2600942","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd ACM workshop on Information hiding and multimedia security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022046774","display_name":"Matthias Carnein","orcid":"https://orcid.org/0000-0001-6117-626X"},"institutions":[{"id":"https://openalex.org/I22465464","display_name":"University of M\u00fcnster","ror":"https://ror.org/00pd74e08","country_code":"DE","type":"education","lineage":["https://openalex.org/I22465464"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Matthias Carnein","raw_affiliation_strings":["University of M\u00fcnster, M\u00fcnster, Germany"],"affiliations":[{"raw_affiliation_string":"University of M\u00fcnster, M\u00fcnster, Germany","institution_ids":["https://openalex.org/I22465464"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039542868","display_name":"Pascal Sch\u00f6ttle","orcid":"https://orcid.org/0000-0001-8710-9188"},"institutions":[{"id":"https://openalex.org/I22465464","display_name":"University of M\u00fcnster","ror":"https://ror.org/00pd74e08","country_code":"DE","type":"education","lineage":["https://openalex.org/I22465464"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Pascal Sch\u00f6ttle","raw_affiliation_strings":["University of M\u00fcnster, M\u00fcnster, Germany"],"affiliations":[{"raw_affiliation_string":"University of M\u00fcnster, M\u00fcnster, Germany","institution_ids":["https://openalex.org/I22465464"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029455813","display_name":"Rainer B\u00f6hme","orcid":"https://orcid.org/0000-0003-4518-6227"},"institutions":[{"id":"https://openalex.org/I22465464","display_name":"University of M\u00fcnster","ror":"https://ror.org/00pd74e08","country_code":"DE","type":"education","lineage":["https://openalex.org/I22465464"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Rainer B\u00f6hme","raw_affiliation_strings":["University of M\u00fcnster, M\u00fcnster, Germany"],"affiliations":[{"raw_affiliation_string":"University of M\u00fcnster, M\u00fcnster, Germany","institution_ids":["https://openalex.org/I22465464"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5022046774"],"corresponding_institution_ids":["https://openalex.org/I22465464"],"apc_list":null,"apc_paid":null,"fwci":0.9755,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.79866982,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"97","last_page":"108"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.886817216873169},{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.8405237793922424},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.6776052713394165},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6761370301246643},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5964666604995728},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.581236720085144},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5251688361167908},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5247650146484375},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5137664079666138},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4688096344470978},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4605933427810669},{"id":"https://openalex.org/keywords/least-significant-bit","display_name":"Least significant bit","score":0.45227107405662537},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.35087913274765015},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.21950963139533997}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.886817216873169},{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.8405237793922424},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.6776052713394165},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6761370301246643},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5964666604995728},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.581236720085144},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5251688361167908},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5247650146484375},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5137664079666138},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4688096344470978},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4605933427810669},{"id":"https://openalex.org/C4305246","wikidata":"https://www.wikidata.org/wiki/Q3885225","display_name":"Least significant bit","level":2,"score":0.45227107405662537},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.35087913274765015},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.21950963139533997},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2600918.2600942","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2600918.2600942","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd ACM workshop on Information hiding and multimedia security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8100000023841858,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W22271197","https://openalex.org/W1482218439","https://openalex.org/W1524144700","https://openalex.org/W1528667995","https://openalex.org/W1583407400","https://openalex.org/W1585665690","https://openalex.org/W1594271205","https://openalex.org/W1596128322","https://openalex.org/W1704793680","https://openalex.org/W1878459630","https://openalex.org/W1969171557","https://openalex.org/W2006711727","https://openalex.org/W2037956730","https://openalex.org/W2039836978","https://openalex.org/W2096050104","https://openalex.org/W2101803085","https://openalex.org/W2106285708","https://openalex.org/W2107689227","https://openalex.org/W2134527668","https://openalex.org/W2169552486","https://openalex.org/W2533733328","https://openalex.org/W3142078075","https://openalex.org/W6631322008","https://openalex.org/W6834116481"],"related_works":["https://openalex.org/W2992834705","https://openalex.org/W2364183665","https://openalex.org/W2554533315","https://openalex.org/W2142223773","https://openalex.org/W155452305","https://openalex.org/W4317560372","https://openalex.org/W2596289203","https://openalex.org/W2937485214","https://openalex.org/W2093190663","https://openalex.org/W2783211325"],"abstract_inverted_index":{"Symmetric":[0],"steganographic":[1,22],"communication":[2],"requires":[3],"a":[4,160,173],"secret":[5,174],"stego-key":[6],"pre-shared":[7],"between":[8],"the":[9,21,28,36,85,89,101,108],"communicating":[10],"parties.":[11],"Public-key":[12],"steganography":[13],"(PKS)":[14],"overcomes":[15],"this":[16,19],"inconvenience.":[17],"In":[18],"case,":[20],"security":[23],"is":[24,98,156,163,168],"based":[25],"solely":[26],"on":[27],"underlying":[29],"asymmetric":[30],"encryption":[31],"function.":[32],"This":[33,96],"implies":[34],"that":[35,61,136],"embedding":[37,87,102,152],"positions":[38,88],"are":[39],"either":[40],"public":[41,56,77],"or":[42],"hidden":[43],"by":[44],"clever":[45],"coding,":[46],"for":[47,94,107,150],"instance":[48],"using":[49,62,131],"Wet":[50],"Paper":[51],"Codes":[52],"(WPC),":[53],"but":[54],"with":[55,64,143],"code":[57],"parameters.":[58],"We":[59,104],"show":[60,135],"WPC":[63],"efficient":[65,132],"encoding":[66],"algorithms":[67],"may":[68],"leak":[69],"information":[70],"which":[71],"can":[72,140],"facilitate":[73],"an":[74,80],"attack.":[75],"The":[76,154],"parameters":[78],"allow":[79],"attacker":[81],"to":[82,128,171],"predict":[83],"among":[84],"possible":[86],"ones":[90],"most":[91],"likely":[92],"used":[93,170],"embedding.":[95],"approach":[97],"independent":[99],"of":[100,110,121],"operation.":[103],"demonstrate":[105],"it":[106],"case":[109],"least":[111],"significant":[112],"bit":[113],"(LSB)":[114],"replacement":[115],"and":[116,165],"present":[117],"two":[118],"new":[119],"variants":[120,139],"Weighted":[122],"Stego-Image":[123],"(WS)":[124],"steganalysis":[125],"specifically":[126],"tailored":[127],"detect":[129,141],"PKS":[130,142],"WPC.":[133],"Experiments":[134],"our":[137],"WS":[138],"higher":[144],"accuracy":[145],"than":[146],"known":[147],"methods,":[148],"especially":[149],"low":[151],"rates.":[153],"attack":[155],"applicable":[157],"even":[158],"if":[159],"hybrid":[161],"stegosystem":[162],"constructed":[164],"public-key":[166],"cryptography":[167],"only":[169],"encapsulate":[172],"stego-key.":[175]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
