{"id":"https://openalex.org/W2975804107","doi":"https://doi.org/10.1145/3349266.3351383","title":"JPEG Steganography Using BPCS","display_name":"JPEG Steganography Using BPCS","publication_year":2019,"publication_date":"2019-09-26","ids":{"openalex":"https://openalex.org/W2975804107","doi":"https://doi.org/10.1145/3349266.3351383","mag":"2975804107"},"language":"en","primary_location":{"id":"doi:10.1145/3349266.3351383","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3349266.3351383","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 20th Annual SIG Conference on Information Technology Education","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072805338","display_name":"Flavien Andrieux","orcid":null},"institutions":[{"id":"https://openalex.org/I180949307","display_name":"Illinois Institute of Technology","ror":"https://ror.org/037t3ry66","country_code":"US","type":"education","lineage":["https://openalex.org/I180949307"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Flavien Andrieux","raw_affiliation_strings":["Illinois Institute of Technology, Chicago, IL, USA"],"affiliations":[{"raw_affiliation_string":"Illinois Institute of Technology, Chicago, IL, USA","institution_ids":["https://openalex.org/I180949307"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034735045","display_name":"Clement Deltel","orcid":null},"institutions":[{"id":"https://openalex.org/I180949307","display_name":"Illinois Institute of Technology","ror":"https://ror.org/037t3ry66","country_code":"US","type":"education","lineage":["https://openalex.org/I180949307"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Clement Deltel","raw_affiliation_strings":["Illinois Institute of Technology, Chicago, IL, USA"],"affiliations":[{"raw_affiliation_string":"Illinois Institute of Technology, Chicago, IL, USA","institution_ids":["https://openalex.org/I180949307"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5072805338"],"corresponding_institution_ids":["https://openalex.org/I180949307"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10128746,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"163","last_page":"163"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9406999945640564,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12707","display_name":"Vehicle License Plate Recognition","score":0.9312999844551086,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.9001492857933044},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7873767614364624},{"id":"https://openalex.org/keywords/least-significant-bit","display_name":"Least significant bit","score":0.7049940824508667},{"id":"https://openalex.org/keywords/steganography-tools","display_name":"Steganography tools","score":0.6472153067588806},{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.6249182820320129},{"id":"https://openalex.org/keywords/bitmap","display_name":"Bitmap","score":0.6234854459762573},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.5616909861564636},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.5588456988334656},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.5492050051689148},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5409305095672607},{"id":"https://openalex.org/keywords/lossy-compression","display_name":"Lossy compression","score":0.46698233485221863},{"id":"https://openalex.org/keywords/image-file-formats","display_name":"Image file formats","score":0.4624163806438446},{"id":"https://openalex.org/keywords/bit-plane","display_name":"Bit plane","score":0.4602232575416565},{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.44381439685821533},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.270649254322052},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14080294966697693},{"id":"https://openalex.org/keywords/bit-field","display_name":"Bit field","score":0.10500705242156982}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.9001492857933044},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7873767614364624},{"id":"https://openalex.org/C4305246","wikidata":"https://www.wikidata.org/wiki/Q3885225","display_name":"Least significant bit","level":2,"score":0.7049940824508667},{"id":"https://openalex.org/C13179402","wikidata":"https://www.wikidata.org/wiki/Q7606662","display_name":"Steganography tools","level":4,"score":0.6472153067588806},{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.6249182820320129},{"id":"https://openalex.org/C3115412","wikidata":"https://www.wikidata.org/wiki/Q1194708","display_name":"Bitmap","level":2,"score":0.6234854459762573},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.5616909861564636},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.5588456988334656},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.5492050051689148},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5409305095672607},{"id":"https://openalex.org/C165021410","wikidata":"https://www.wikidata.org/wiki/Q55564","display_name":"Lossy compression","level":2,"score":0.46698233485221863},{"id":"https://openalex.org/C65377053","wikidata":"https://www.wikidata.org/wiki/Q1572121","display_name":"Image file formats","level":3,"score":0.4624163806438446},{"id":"https://openalex.org/C56056324","wikidata":"https://www.wikidata.org/wiki/Q878866","display_name":"Bit plane","level":4,"score":0.4602232575416565},{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.44381439685821533},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.270649254322052},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14080294966697693},{"id":"https://openalex.org/C183383400","wikidata":"https://www.wikidata.org/wiki/Q2374485","display_name":"Bit field","level":3,"score":0.10500705242156982},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C25197100","wikidata":"https://www.wikidata.org/wiki/Q890886","display_name":"Drilling","level":2,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3349266.3351383","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3349266.3351383","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 20th Annual SIG Conference on Information Technology Education","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6000000238418579,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2154118756","https://openalex.org/W2166431153","https://openalex.org/W129330134","https://openalex.org/W1965991389","https://openalex.org/W2158736088","https://openalex.org/W1974279004","https://openalex.org/W2370747589","https://openalex.org/W4367185560","https://openalex.org/W1659544335","https://openalex.org/W1533972467"],"abstract_inverted_index":{"Steganography":[0],"is":[1,8,62,144,175,239,263,318],"the":[2,22,37,48,51,55,65,81,85,89,114,118,131,173,216,241,245,251,255,264,274,278,290,312,324,341,349],"art":[3],"of":[4,24,41,64,88,126,133,172,215,236,244,266,277,323,345,348],"camouflage:":[5],"its":[6],"purpose":[7],"to":[9,28,33,58,84,98,109,147,260,310,339],"make":[10,29],"a":[11,30,95,100,111,145,165,196,202,205,221,228,296,301,353],"message":[12,31,53,101,112],"go":[13],"unnoticed":[14],"within":[15],"another":[16],"message.":[17],"It":[18],"differs":[19],"from":[20],"cryptography,":[21],"\"art":[23],"secrecy\",":[25],"which":[26],"seeks":[27],"unintelligible":[32],"anyone":[34],"other":[35],"than":[36],"lawful.":[38],"The":[39,60,233,258,270,315],"concept":[40],"steganography":[42,143,166,198],"could":[43,307],"split":[44],"into":[45,204,250,320],"three":[46],"parts:":[47],"cover":[49,115,325],"object,":[50],"hidden":[52,319],"and":[54,77,162,194,254,343],"process":[56],"performed":[57],"hide.":[59],"JPEG":[61,208,306,354],"one":[63],"most":[66],"commonly":[67],"used":[68,309],"formats":[69],"for":[70,168,183],"images":[71],"because":[72],"it":[73,94],"combines":[74],"image":[75,152,247,280,291,299,304,328],"quality":[76],"limited":[78,186],"size":[79],"on":[80],"disk":[82],"thanks":[83],"good":[86],"compression":[87],"algorithm.":[90],"Therefore,":[91],"that":[92,176,200,240],"makes":[93],"prime":[96],"candidate":[97],"hide":[99,110,148,311],"in":[102,113,124,158,227,273,305],"it.":[103],"Furthermore,":[104],"there":[105],"are":[106,248],"many":[107],"algorithms":[108],"image,":[116],"but":[117],"result":[119],"remains":[120],"not":[121],"very":[122,229],"high":[123],"terms":[125],"payload":[127,203],"capacity,":[128],"even":[129],"though":[130],"type":[132],"embedding":[134],"was":[135,155],"easily":[136],"detectable.":[137],"Bit":[138],"Plane":[139],"Complexity":[140],"Segmentation":[141],"(BPCS)":[142],"technique":[146,167,199,212,238],"data":[149,287,317],"inside":[150],"an":[151],"file.":[153],"BPCS":[154,197,237],"originally":[156],"developed":[157],"1988":[159],"by":[160],"Kawaguchi":[161],"Eason":[163],"as":[164],"bitmap":[169],"images.":[170],"One":[171],"reason":[174],"traditional":[177],"techniques,":[178],"LSB":[179],"(Least":[180],"Significant":[181],"Bit)":[182],"instance,":[184],"have":[185],"information":[187,226],"hiding":[188],"capacity.":[189],"This":[190,211],"paper":[191,334],"describes,":[192],"analyzes":[193],"implements":[195],"embeds":[201],"lossy":[206],"format":[207],"using":[209],"Matlab.":[210],"takes":[213],"advantage":[214],"human":[217,222],"eye":[218],"limitation":[219],"where":[220],"cannot":[223],"identify":[224],"any":[225,330],"complicated":[230],"binary":[231,246],"pattern.":[232],"main":[234],"principle":[235],"bit":[242,268,275],"planes":[243,276],"divided":[249],"informative":[252],"region":[253,322],"noise-like":[256,271,321],"region.":[257],"criteria":[259],"divide":[261],"them":[262],"complexity":[265],"each":[267],"plane.":[269],"regions":[272],"vessel":[279,298,303,327],"can":[281],"then":[282],"be":[283,308],"replaced":[284],"with":[285],"secret":[286,313,316],"without":[288,329],"affecting":[289],"quality.":[292],"In":[293],"our":[294,346],"method,":[295],"color":[297],"or":[300,326],"grayscale":[302],"information.":[314],"distortion.":[331],"Finally,":[332],"this":[333],"performs":[335],"some":[336],"steganalysis":[337],"techniques":[338],"analyze":[340],"accuracy":[342],"security":[344],"implementation":[347],"BCPS":[350],"algorithm":[351],"over":[352],"image.":[355]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
