{"id":"https://openalex.org/W2751900519","doi":"https://doi.org/10.1145/3102304.3109814","title":"Steganalysis Using LSB-Focused Statistical Features","display_name":"Steganalysis Using LSB-Focused Statistical Features","publication_year":2017,"publication_date":"2017-07-19","ids":{"openalex":"https://openalex.org/W2751900519","doi":"https://doi.org/10.1145/3102304.3109814","mag":"2751900519"},"language":"en","primary_location":{"id":"doi:10.1145/3102304.3109814","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3102304.3109814","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference on Future Networks and Distributed Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026159693","display_name":"Mudhafar M. Al-Jarrah","orcid":null},"institutions":[{"id":"https://openalex.org/I91633459","display_name":"Middle East University","ror":"https://ror.org/059bgad73","country_code":"JO","type":"education","lineage":["https://openalex.org/I91633459"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"Mudhafar M. Al-Jarrah","raw_affiliation_strings":["Middle East University, Jordan"],"affiliations":[{"raw_affiliation_string":"Middle East University, Jordan","institution_ids":["https://openalex.org/I91633459"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091706862","display_name":"Zaid H. Al-Taie","orcid":null},"institutions":[{"id":"https://openalex.org/I91633459","display_name":"Middle East University","ror":"https://ror.org/059bgad73","country_code":"JO","type":"education","lineage":["https://openalex.org/I91633459"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Zaid H. Al-Taie","raw_affiliation_strings":["Middle East University, Jordan"],"affiliations":[{"raw_affiliation_string":"Middle East University, Jordan","institution_ids":["https://openalex.org/I91633459"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064962134","display_name":"Abdelrahman Abuarqoub","orcid":"https://orcid.org/0000-0001-6576-8932"},"institutions":[{"id":"https://openalex.org/I91633459","display_name":"Middle East University","ror":"https://ror.org/059bgad73","country_code":"JO","type":"education","lineage":["https://openalex.org/I91633459"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Abdelrahman Abuarqoub","raw_affiliation_strings":["Middle East University, Jordan"],"affiliations":[{"raw_affiliation_string":"Middle East University, Jordan","institution_ids":["https://openalex.org/I91633459"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5026159693"],"corresponding_institution_ids":["https://openalex.org/I91633459"],"apc_list":null,"apc_paid":null,"fwci":0.2731,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.63827235,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.921912670135498},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.7270776629447937},{"id":"https://openalex.org/keywords/least-significant-bit","display_name":"Least significant bit","score":0.7245432138442993},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.7100869417190552},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6491254568099976},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.5957911610603333},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.5288817882537842},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.47876325249671936},{"id":"https://openalex.org/keywords/feature-vector","display_name":"Feature vector","score":0.4447844922542572},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.42277947068214417},{"id":"https://openalex.org/keywords/byte","display_name":"Byte","score":0.4219667315483093},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.3706815838813782}],"concepts":[{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.921912670135498},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7270776629447937},{"id":"https://openalex.org/C4305246","wikidata":"https://www.wikidata.org/wiki/Q3885225","display_name":"Least significant bit","level":2,"score":0.7245432138442993},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.7100869417190552},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6491254568099976},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.5957911610603333},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.5288817882537842},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.47876325249671936},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.4447844922542572},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.42277947068214417},{"id":"https://openalex.org/C43364308","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Byte","level":2,"score":0.4219667315483093},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.3706815838813782},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3102304.3109814","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3102304.3109814","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference on Future Networks and Distributed Systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10","score":0.6100000143051147}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1549083695","https://openalex.org/W2009490298","https://openalex.org/W2010301034","https://openalex.org/W2044465660","https://openalex.org/W2059049081","https://openalex.org/W2088023168","https://openalex.org/W2161969291","https://openalex.org/W2163352848","https://openalex.org/W2166143274","https://openalex.org/W2177274842","https://openalex.org/W2323230008","https://openalex.org/W2492776042","https://openalex.org/W2616672994","https://openalex.org/W2751900519","https://openalex.org/W2891791183"],"related_works":["https://openalex.org/W2205085860","https://openalex.org/W2134958869","https://openalex.org/W2059133021","https://openalex.org/W2977151837","https://openalex.org/W2771684231","https://openalex.org/W2158736088","https://openalex.org/W4297776738","https://openalex.org/W2144721898","https://openalex.org/W4387195702","https://openalex.org/W2054351791"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3,142],"present":[4],"an":[5,84],"image":[6,53,121,134],"steganalysis":[7],"model":[8,237],"with":[9,229,244],"a":[10,28,119],"new":[11],"texture":[12,39],"feature":[13,33,69,184],"set":[14,34,70],"that":[15,55,73,96],"is":[16,72],"designed":[17],"to":[18,91,111,238],"take":[19],"into":[20],"consideration":[21],"the":[22,68,80,87,102,106,125,128,131,144,158,171,205,211,220,235],"pattern":[23],"of":[24,41,83,118,150,168,186,204],"embedding":[25,100],"locations":[26],"in":[27,35,66,79,101,165,170],"cover":[29,120,139,172],"image.":[30],"The":[31,63,154,183,200,226],"chosen":[32,137],"based":[36,175],"on":[37,176],"statistical":[38,52],"features":[40,54,108],"images":[42,173,191],"including":[43],"gray":[44],"level":[45],"co-occurrence":[46],"matrix":[47],"(GLCM),":[48],"Entropy,":[49],"and":[50,60,114,141,178,192,214,217,222,231,241],"additional":[51],"can":[56,97],"discriminate":[57],"between":[58],"clean":[59,187,213,221],"stego":[61,190,194,224],"images.":[62,153,225],"guiding":[64],"principle":[65],"choosing":[67],"elements":[71],"steganography":[74,246],"techniques":[75],"embed":[76],"secret":[77],"data":[78,169],"right":[81],"half-byte":[82],"image's":[85],"bytes,":[86],"least":[88],"significant":[89],"bits,":[90],"avoid":[92],"perceptible":[93],"visual":[94],"distortion":[95],"result":[98],"from":[99],"left":[103],"half-bytes.":[104],"Therefore,":[105],"proposed":[107,236],"are":[109],"applied":[110],"2-LSB,":[112],"3-LSB":[113],"4-LSB":[115],"bit":[116],"planes":[117],"as":[122,124,163],"well":[123],"full-bytes.":[126],"For":[127],"experimental":[129],"work,":[130],"grayscale":[132],"single-channel":[133],"format":[135],"was":[136,157,174,208],"for":[138,210,219,233,242],"images,":[140,188,195,216,240],"used":[143],"public":[145],"BossBase1.01":[146],"dataset":[147],"which":[148],"consists":[149],"10,000":[151,196],"PGM":[152],"selected":[155],"classifier":[156],"Support":[159],"Vector":[160],"Machine":[161],"algorithm":[162],"implemented":[164],"MATLAB.":[166],"Embedding":[167],"2LSB":[177,189,223],"4LSB":[179,193,215],"spatial":[180],"domain":[181],"schemes.":[182,247],"vectors":[185],"each,":[197],"were":[198],"analyzed.":[199],"detection":[201],"accuracy":[202],"results":[203],"validation":[206],"phase":[207],"99.41%":[209],"combined":[212],"99.02%":[218],"paper":[227],"ends":[228],"conclusion":[230],"suggestions":[232],"applying":[234],"multi-channel":[239],"dealing":[243],"alternative":[245]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
