{"id":"https://openalex.org/W2511772940","doi":"https://doi.org/10.1145/2905055.2905196","title":"Performance Improvement","display_name":"Performance Improvement","publication_year":2016,"publication_date":"2016-03-04","ids":{"openalex":"https://openalex.org/W2511772940","doi":"https://doi.org/10.1145/2905055.2905196","mag":"2511772940"},"language":"en","primary_location":{"id":"doi:10.1145/2905055.2905196","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2905055.2905196","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037138519","display_name":"Prutha Bhalde","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Prutha Bhalde","raw_affiliation_strings":["Student ME, Jawaharlal Neheru Engineering College, Aurangabad, Maharashtra"],"affiliations":[{"raw_affiliation_string":"Student ME, Jawaharlal Neheru Engineering College, Aurangabad, Maharashtra","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5037138519"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.1733,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.56828714,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9853000044822693,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8917272090911865},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8262296915054321},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.6621770262718201},{"id":"https://openalex.org/keywords/steganography-tools","display_name":"Steganography tools","score":0.6443804502487183},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6226269602775574},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6217008233070374},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5254708528518677},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5238661170005798},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5231860280036926},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.47380155324935913},{"id":"https://openalex.org/keywords/file-sharing","display_name":"File sharing","score":0.4523114860057831},{"id":"https://openalex.org/keywords/information-sharing","display_name":"Information sharing","score":0.41067272424697876},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3532876670360565},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3321587145328522},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.23146778345108032},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.17594778537750244},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1381654441356659}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8917272090911865},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8262296915054321},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.6621770262718201},{"id":"https://openalex.org/C13179402","wikidata":"https://www.wikidata.org/wiki/Q7606662","display_name":"Steganography tools","level":4,"score":0.6443804502487183},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6226269602775574},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6217008233070374},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5254708528518677},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5238661170005798},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5231860280036926},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.47380155324935913},{"id":"https://openalex.org/C551386961","wikidata":"https://www.wikidata.org/wiki/Q22666","display_name":"File sharing","level":3,"score":0.4523114860057831},{"id":"https://openalex.org/C2776854237","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information sharing","level":2,"score":0.41067272424697876},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3532876670360565},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3321587145328522},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.23146778345108032},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.17594778537750244},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1381654441356659},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2905055.2905196","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2905055.2905196","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1570996778","https://openalex.org/W2125871284","https://openalex.org/W2140118868","https://openalex.org/W2205996827","https://openalex.org/W2314596409","https://openalex.org/W2336565933","https://openalex.org/W3106484618","https://openalex.org/W4244508735","https://openalex.org/W4285719527","https://openalex.org/W4399176852"],"related_works":["https://openalex.org/W2560172240","https://openalex.org/W3146660591","https://openalex.org/W1995538220","https://openalex.org/W3020816551","https://openalex.org/W2338095724","https://openalex.org/W2804412098","https://openalex.org/W2186632617","https://openalex.org/W83713408","https://openalex.org/W2497446005","https://openalex.org/W2171676767"],"abstract_inverted_index":{"Data":[0],"communication":[1],"over":[2],"internet":[3,30],"is":[4,18,58,72,94,109,139,185],"very":[5],"insecure":[6],"due":[7],"to":[8,43,124,134,143,152,165,173,188],"attacks":[9],"made":[10],"on":[11,142],"data":[12,22,31],"transfer":[13],"and":[14,35,137,181],"information":[15,45,68,99,136],"sharing.":[16],"This":[17],"the":[19,56,70,145,161,167,176,183,189],"reason":[20],"why":[21],"hiding":[23],"has":[24],"become":[25],"so":[26,85,113],"important":[27],"for":[28,66],"such":[29],"communication.":[32],"Conventionally,":[33],"Cryptography":[34],"steganography":[36],"are":[37,41,128],"two":[38],"methods":[39,132],"which":[40,160],"used":[42,133],"share":[44],"in":[46,59,74,98,105,159],"a":[47,119],"secured":[48],"manner.":[49],"In":[50,150],"Cryptography,":[51],"intermediate":[52,88],"person":[53,89,117],"knows":[54,91],"that":[55,86],"message":[57,71,97,104,120,177,184],"encrypted":[60],"form,":[61],"whereas,":[62],"when":[63],"you":[64],"go":[65],"steganographic":[67,131,191],"sharing,":[69],"hidden":[73,96,168],"covered":[75],"image,":[76],"audio":[77,130],"file":[78,108],"or":[79],"any":[80,87,95],"other":[81,116],"type":[82],"of":[83,147],"file,":[84],"never":[90],"whether":[92],"there":[93],"being":[100,186],"shared.":[101],"Hiding":[102],"secrete":[103],"an":[106],"Audio":[107,111],"called":[110],"steganography,":[112],"that,":[114],"no":[115],"than":[118],"receiver,":[121],"be":[122],"able":[123],"read":[125],"it.":[126],"There":[127],"various":[129],"hide":[135],"research":[138],"still":[140],"going":[141],"improve":[144],"robustness":[146,155],"these":[148],"techniques.":[149],"order":[151],"achieve":[153],"this":[154],"against":[156],"intentional":[157],"attacks,":[158],"hackers":[162],"always":[163],"try":[164],"reveal":[166],"message,":[169],"we":[170],"have":[171],"proposed":[172],"first":[174],"encode":[175],"using":[178],"robust":[179],"algorithm":[180],"then":[182],"fed":[187],"traditional":[190],"technique":[192],"like":[193],"(Parity":[194],"coding).":[195]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
