{"id":"https://openalex.org/W2337043225","doi":"https://doi.org/10.1145/2896387.2896408","title":"Detection Of URL In Image Steganography","display_name":"Detection Of URL In Image Steganography","publication_year":2016,"publication_date":"2016-03-22","ids":{"openalex":"https://openalex.org/W2337043225","doi":"https://doi.org/10.1145/2896387.2896408","mag":"2337043225"},"language":"en","primary_location":{"id":"doi:10.1145/2896387.2896408","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2896387.2896408","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference on Internet of things and Cloud Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020594985","display_name":"Moudhi Aljamea","orcid":null},"institutions":[{"id":"https://openalex.org/I164213776","display_name":"King's College - North Carolina","ror":"https://ror.org/022f44628","country_code":"US","type":"education","lineage":["https://openalex.org/I164213776"]},{"id":"https://openalex.org/I183935753","display_name":"King's College London","ror":"https://ror.org/0220mzb33","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I183935753"]}],"countries":["GB","US"],"is_corresponding":true,"raw_author_name":"Moudhi M. Aljamea","raw_affiliation_strings":["Department of Informatics, Kings College London, WC2R 2LS, London"],"affiliations":[{"raw_affiliation_string":"Department of Informatics, Kings College London, WC2R 2LS, London","institution_ids":["https://openalex.org/I164213776","https://openalex.org/I183935753"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058155947","display_name":"Costas S. Iliopoulos","orcid":"https://orcid.org/0000-0003-3909-0077"},"institutions":[{"id":"https://openalex.org/I164213776","display_name":"King's College - North Carolina","ror":"https://ror.org/022f44628","country_code":"US","type":"education","lineage":["https://openalex.org/I164213776"]},{"id":"https://openalex.org/I183935753","display_name":"King's College London","ror":"https://ror.org/0220mzb33","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I183935753"]}],"countries":["GB","US"],"is_corresponding":false,"raw_author_name":"Costas S. Iliopoulos","raw_affiliation_strings":["Department of Informatics, Kings College London, WC2R 2LS, London"],"affiliations":[{"raw_affiliation_string":"Department of Informatics, Kings College London, WC2R 2LS, London","institution_ids":["https://openalex.org/I164213776","https://openalex.org/I183935753"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022523195","display_name":"M. Samiruzzaman","orcid":null},"institutions":[{"id":"https://openalex.org/I164213776","display_name":"King's College - North Carolina","ror":"https://ror.org/022f44628","country_code":"US","type":"education","lineage":["https://openalex.org/I164213776"]},{"id":"https://openalex.org/I183935753","display_name":"King's College London","ror":"https://ror.org/0220mzb33","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I183935753"]}],"countries":["GB","US"],"is_corresponding":false,"raw_author_name":"M. Samiruzzaman","raw_affiliation_strings":["Department of Informatics, Kings College London, WC2R 2LS, London"],"affiliations":[{"raw_affiliation_string":"Department of Informatics, Kings College London, WC2R 2LS, London","institution_ids":["https://openalex.org/I164213776","https://openalex.org/I183935753"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5020594985"],"corresponding_institution_ids":["https://openalex.org/I164213776","https://openalex.org/I183935753"],"apc_list":null,"apc_paid":null,"fwci":0.6758,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.76392437,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8816128969192505},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8100409507751465},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.6976186037063599},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.6072936058044434},{"id":"https://openalex.org/keywords/steganography-tools","display_name":"Steganography tools","score":0.6030023097991943},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5902578234672546},{"id":"https://openalex.org/keywords/least-significant-bit","display_name":"Least significant bit","score":0.5842987298965454},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5402997732162476},{"id":"https://openalex.org/keywords/image-file-formats","display_name":"Image file formats","score":0.5056116580963135},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.42847275733947754},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.41548609733581543},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3571428656578064},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.27031487226486206}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8816128969192505},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8100409507751465},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.6976186037063599},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.6072936058044434},{"id":"https://openalex.org/C13179402","wikidata":"https://www.wikidata.org/wiki/Q7606662","display_name":"Steganography tools","level":4,"score":0.6030023097991943},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5902578234672546},{"id":"https://openalex.org/C4305246","wikidata":"https://www.wikidata.org/wiki/Q3885225","display_name":"Least significant bit","level":2,"score":0.5842987298965454},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5402997732162476},{"id":"https://openalex.org/C65377053","wikidata":"https://www.wikidata.org/wiki/Q1572121","display_name":"Image file formats","level":3,"score":0.5056116580963135},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.42847275733947754},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.41548609733581543},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3571428656578064},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27031487226486206},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/2896387.2896408","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2896387.2896408","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference on Internet of things and Cloud Computing","raw_type":"proceedings-article"},{"id":"pmh:oai:kclpure.kcl.ac.uk:publications/a44c4a7e-6af4-47d4-b08f-a623da225e87","is_oa":false,"landing_page_url":"http://www.scopus.com/inward/record.url?scp=84976486335&partnerID=8YFLogxK","pdf_url":null,"source":{"id":"https://openalex.org/S4306400216","display_name":"Research Portal (King's College London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I183935753","host_organization_name":"King's College London","host_organization_lineage":["https://openalex.org/I183935753"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Aljamea , M M , Iliopoulos , C S &amp; Samiruzzaman , M 2016 , Detection of URL in image steganography . in ACM International Conference Proceeding Series . vol. 22-23-March-2016 , 23 , International Conference on Internet of Things and Cloud Computing, ICC 2016 , Cambridge , United Kingdom , 22/03/2016 . https://doi.org/10.1145/2896387.2896408","raw_type":"contributionToPeriodical"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6200000047683716,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W154544624","https://openalex.org/W2028197392","https://openalex.org/W2066996184","https://openalex.org/W2103228545","https://openalex.org/W2138760583","https://openalex.org/W2503107053","https://openalex.org/W2728463821","https://openalex.org/W3142067920","https://openalex.org/W6606318847"],"related_works":["https://openalex.org/W2049703184","https://openalex.org/W2977151837","https://openalex.org/W2158736088","https://openalex.org/W2181427603","https://openalex.org/W2409080236","https://openalex.org/W2796470635","https://openalex.org/W2347929411","https://openalex.org/W2238140690","https://openalex.org/W2047695298","https://openalex.org/W4214583425"],"abstract_inverted_index":{"Steganography":[0],"is":[1,55,63],"the":[2,11,19,50,67,93,96,99,103,146,165,194,198,203],"science":[3],"of":[4,14,22,76,148,152,184,190],"hiding":[5,157,208],"data":[6,26,45,58,105,133],"within":[7,59,80],"data.":[8,167],"Either":[9],"for":[10,18],"good":[12],"purpose":[13],"secret":[15,57],"communication":[16],"or":[17,27,31,160],"bad":[20],"intention":[21],"leaking":[23],"sensitive":[24],"confidential":[25],"embedding":[28,56],"malicious":[29],"code":[30],"URL.":[32],"However,":[33],"many":[34,123],"different":[35,84],"carrier":[36,54,199],"file":[37],"formats":[38,85],"can":[39,106,112],"be":[40,66,107,113],"used":[41,202],"to":[42,65,72,127,171],"hide":[43,73],"these":[44,131],"(network,":[46],"audio,":[47],"image..etc)":[48],"but":[49,134],"most":[51,161],"common":[52],"steganography":[53],"images":[60,111,191],"as":[61],"it":[62],"considered":[64],"best":[68],"and":[69,141,159,192],"easiest":[70],"way":[71],"all":[74,188],"types":[75,189],"files":[77],"(secret":[78],"files)":[79],"an":[81],"image":[82,100,153,200],"using":[83],"(another":[86],"image,":[87],"text,":[88],"video,":[89],"virus,":[90],"URL..etc).":[91],"To":[92],"human":[94],"eye,":[95],"changes":[97],"in":[98,129,187],"appearance":[101],"with":[102,119,155],"hidden":[104,132,166,185,195],"imperceptible.":[108],"In":[109],"fact,":[110],"more":[114],"than":[115],"what":[116],"we":[117],"see":[118],"our":[120],"eyes.":[121],"Therefore,":[122],"solutions":[124],"where":[125],"proposed":[126],"help":[128],"detecting":[130,181],"each":[135],"solution":[136],"have":[137],"their":[138],"own":[139],"strong":[140],"weak":[142],"points":[143],"either":[144],"by":[145],"limitation":[147],"resolving":[149],"one":[150],"type":[151],"along":[154],"specific":[156],"technique":[158],"likely":[162],"without":[163],"extracting":[164],"This":[168],"paper":[169],"intends":[170],"propose":[172],"a":[173],"novel":[174],"detection":[175],"approach":[176],"that":[177,201],"will":[178],"concentrate":[179],"on":[180],"any":[182],"kind":[183],"URL":[186,196],"extract":[193],"from":[197],"LSB":[204],"least":[205],"significant":[206],"bit":[207],"technique.":[209]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
