{"id":"https://openalex.org/W2805747897","doi":"https://doi.org/10.1145/3193077.3193087","title":"A Non-Algorithmic Forensic Approach for Hiding Data in Image Files","display_name":"A Non-Algorithmic Forensic Approach for Hiding Data in Image Files","publication_year":2018,"publication_date":"2018-03-23","ids":{"openalex":"https://openalex.org/W2805747897","doi":"https://doi.org/10.1145/3193077.3193087","mag":"2805747897"},"language":"en","primary_location":{"id":"doi:10.1145/3193077.3193087","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3193077.3193087","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd International Conference on Compute and Data Analysis","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027503804","display_name":"Maha Farouk S. Sabir","orcid":"https://orcid.org/0000-0002-4233-1647"},"institutions":[{"id":"https://openalex.org/I168959743","display_name":"University of America","ror":"https://ror.org/03s0c9350","country_code":"US","type":"education","lineage":["https://openalex.org/I168959743"]},{"id":"https://openalex.org/I84470341","display_name":"Catholic University of America","ror":"https://ror.org/047yk3s18","country_code":"US","type":"education","lineage":["https://openalex.org/I84470341"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Maha F. Sabir","raw_affiliation_strings":["The Catholic University of America, Washington, DC"],"affiliations":[{"raw_affiliation_string":"The Catholic University of America, Washington, DC","institution_ids":["https://openalex.org/I168959743","https://openalex.org/I84470341"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023335669","display_name":"James H. Jones","orcid":"https://orcid.org/0000-0002-2184-9586"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"James H. Jones","raw_affiliation_strings":["George Mason University, Fairfax, VA"],"affiliations":[{"raw_affiliation_string":"George Mason University, Fairfax, VA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100338932","display_name":"Hang Liu","orcid":"https://orcid.org/0000-0002-1379-6314"},"institutions":[{"id":"https://openalex.org/I84470341","display_name":"Catholic University of America","ror":"https://ror.org/047yk3s18","country_code":"US","type":"education","lineage":["https://openalex.org/I84470341"]},{"id":"https://openalex.org/I168959743","display_name":"University of America","ror":"https://ror.org/03s0c9350","country_code":"US","type":"education","lineage":["https://openalex.org/I168959743"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hang Liu","raw_affiliation_strings":["The Catholic University of America, Washington, DC"],"affiliations":[{"raw_affiliation_string":"The Catholic University of America, Washington, DC","institution_ids":["https://openalex.org/I168959743","https://openalex.org/I84470341"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074868524","display_name":"Alex V. Mbaziira","orcid":null},"institutions":[{"id":"https://openalex.org/I53276908","display_name":"Marymount University","ror":"https://ror.org/0008kv292","country_code":"US","type":"education","lineage":["https://openalex.org/I53276908"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alex V. Mbaziira","raw_affiliation_strings":["Marymount University, Arlington, VA"],"affiliations":[{"raw_affiliation_string":"Marymount University, Arlington, VA","institution_ids":["https://openalex.org/I53276908"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5027503804"],"corresponding_institution_ids":["https://openalex.org/I168959743","https://openalex.org/I84470341"],"apc_list":null,"apc_paid":null,"fwci":0.5223,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.70215875,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"60","last_page":"64"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8514203429222107},{"id":"https://openalex.org/keywords/image-file-formats","display_name":"Image file formats","score":0.7008256316184998},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.6490363478660583},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.6485689878463745},{"id":"https://openalex.org/keywords/file-format","display_name":"File format","score":0.6215514540672302},{"id":"https://openalex.org/keywords/digital-evidence","display_name":"Digital evidence","score":0.5922247171401978},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.5717899203300476},{"id":"https://openalex.org/keywords/data-file","display_name":"Data file","score":0.5615543723106384},{"id":"https://openalex.org/keywords/xml","display_name":"XML","score":0.5125186443328857},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5111396908760071},{"id":"https://openalex.org/keywords/file-size","display_name":"File size","score":0.49791860580444336},{"id":"https://openalex.org/keywords/digital-data","display_name":"Digital data","score":0.4946698844432831},{"id":"https://openalex.org/keywords/copying","display_name":"Copying","score":0.4831501841545105},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4544849395751953},{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.4355856776237488},{"id":"https://openalex.org/keywords/markup-language","display_name":"Markup language","score":0.4309547245502472},{"id":"https://openalex.org/keywords/digital-image","display_name":"Digital image","score":0.42959317564964294},{"id":"https://openalex.org/keywords/plain-text","display_name":"Plain text","score":0.4273122549057007},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.26994067430496216},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.24833211302757263},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.21718519926071167},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.19787761569023132},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.19280341267585754},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.17718932032585144},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1613137423992157},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.13808393478393555},{"id":"https://openalex.org/keywords/data-transmission","display_name":"Data transmission","score":0.11876004934310913}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8514203429222107},{"id":"https://openalex.org/C65377053","wikidata":"https://www.wikidata.org/wiki/Q1572121","display_name":"Image file formats","level":3,"score":0.7008256316184998},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.6490363478660583},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.6485689878463745},{"id":"https://openalex.org/C97250363","wikidata":"https://www.wikidata.org/wiki/Q235557","display_name":"File format","level":2,"score":0.6215514540672302},{"id":"https://openalex.org/C2781357168","wikidata":"https://www.wikidata.org/wiki/Q5276084","display_name":"Digital evidence","level":3,"score":0.5922247171401978},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.5717899203300476},{"id":"https://openalex.org/C171730128","wikidata":"https://www.wikidata.org/wiki/Q5227290","display_name":"Data file","level":2,"score":0.5615543723106384},{"id":"https://openalex.org/C8797682","wikidata":"https://www.wikidata.org/wiki/Q2115","display_name":"XML","level":2,"score":0.5125186443328857},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5111396908760071},{"id":"https://openalex.org/C2776029614","wikidata":"https://www.wikidata.org/wiki/Q1146367","display_name":"File size","level":2,"score":0.49791860580444336},{"id":"https://openalex.org/C2778864079","wikidata":"https://www.wikidata.org/wiki/Q173285","display_name":"Digital data","level":3,"score":0.4946698844432831},{"id":"https://openalex.org/C2779151265","wikidata":"https://www.wikidata.org/wiki/Q1156791","display_name":"Copying","level":2,"score":0.4831501841545105},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4544849395751953},{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.4355856776237488},{"id":"https://openalex.org/C45874996","wikidata":"https://www.wikidata.org/wiki/Q37045","display_name":"Markup language","level":3,"score":0.4309547245502472},{"id":"https://openalex.org/C42781572","wikidata":"https://www.wikidata.org/wiki/Q1250322","display_name":"Digital image","level":4,"score":0.42959317564964294},{"id":"https://openalex.org/C46503548","wikidata":"https://www.wikidata.org/wiki/Q1145976","display_name":"Plain text","level":3,"score":0.4273122549057007},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.26994067430496216},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.24833211302757263},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.21718519926071167},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.19787761569023132},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.19280341267585754},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17718932032585144},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1613137423992157},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.13808393478393555},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.11876004934310913},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3193077.3193087","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3193077.3193087","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd International Conference on Compute and Data Analysis","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7599999904632568,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320322322","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W345561","https://openalex.org/W657766915","https://openalex.org/W1570969260","https://openalex.org/W1997427689","https://openalex.org/W2028642251","https://openalex.org/W2032571703","https://openalex.org/W2040903332","https://openalex.org/W2076342816","https://openalex.org/W2145081976","https://openalex.org/W2261973985","https://openalex.org/W2518005945","https://openalex.org/W2759454420","https://openalex.org/W6634329698"],"related_works":["https://openalex.org/W2026784490","https://openalex.org/W2981541027","https://openalex.org/W2362105210","https://openalex.org/W3046425524","https://openalex.org/W2146547297","https://openalex.org/W2810220420","https://openalex.org/W4224209762","https://openalex.org/W2993290078","https://openalex.org/W2805747897","https://openalex.org/W2069916501"],"abstract_inverted_index":{"Digital":[0],"evidence":[1],"continues":[2],"to":[3,22,26,43,67,119,142,158],"be":[4],"an":[5],"integral":[6],"component":[7],"in":[8,19,46,100,134,166,201],"investigative":[9],"and":[10,28,50,63,74,96,109,157,162,186,191],"judicial":[11],"processes.":[12],"In":[13,33,85],"digital":[14,68,77,101,129],"files,":[15],"information":[16],"is":[17,79,140],"stored":[18],"structured":[20],"containers":[21],"enable":[23],"software":[24],"applications":[25],"process":[27],"render":[29],"it":[30,139],"for":[31,92,126,147],"use.":[32],"this":[34,86,135],"work,":[35],"we":[36,88,113],"extend":[37],"prior":[38],"research":[39],"into":[40],"non-algorithmic":[41],"approaches":[42],"data":[44,99,149,165,177,200],"hiding":[45],"files":[47,183],"whose":[48],"structural":[49],"physical":[51],"properties":[52,75],"are":[53,184,212],"based":[54],"on":[55,214],"Office":[56],"Extensible":[57],"Markup":[58],"Language":[59],"(OOXML)":[60],"by":[61],"extending":[62],"applying":[64],"our":[65,128,180],"approach":[66,104,118],"image":[69,182,216],"files.":[70,84,102,168,217],"The":[71,132],"file":[72,124],"structure":[73],"of":[76,122,152,173],"images":[78],"inherently":[80],"different":[81],"from":[82,106],"OOXML":[83],"paper,":[87],"propose":[89],"a":[90,115],"technique":[91],"creating":[93],"persistent,":[94],"stealthy,":[95],"benign":[97,163],"tagging":[98,130,164,176],"Our":[103],"differs":[105],"current":[107],"steganographic":[108],"cryptographic":[110],"methods":[111],"because":[112],"use":[114],"black":[116],"box":[117],"find":[120,144],"patterns":[121],"candidate":[123],"locations":[125,145,203],"inserting":[127],"data.":[131],"results":[133],"paper":[136],"demonstrate":[137],"that":[138,171,198],"possible":[141],"empirically":[143],"suitable":[146],"storing":[148],"without":[150,193],"knowledge":[151],"the":[153,174,215],"files'":[154],"internal":[155],"structure,":[156],"essentially":[159],"hide":[160],"persistent":[161],"JPEG":[167],"We":[169],"observed":[170],"31%":[172],"inserted":[175],"survives":[178],"when":[179,189,205],"test":[181],"modified":[185],"saved":[187,192],"or":[188],"opened":[190],"modifying.":[194],"Additional":[195],"experiments":[196],"revealed":[197],"hidden":[199],"identified":[202],"persists":[204],"operations":[206],"like":[207],"opening,":[208],"closing,":[209],"terminating,":[210],"copying":[211],"performed":[213]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
