{"id":"https://openalex.org/W3120837035","doi":"https://doi.org/10.1145/3424954.3425511","title":"Data hiding","display_name":"Data hiding","publication_year":2020,"publication_date":"2020-11-18","ids":{"openalex":"https://openalex.org/W3120837035","doi":"https://doi.org/10.1145/3424954.3425511","mag":"3120837035"},"language":"en","primary_location":{"id":"doi:10.1145/3424954.3425511","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3424954.3425511","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the European Interdisciplinary Cybersecurity Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044117915","display_name":"David Meg\u00edas","orcid":"https://orcid.org/0000-0002-0507-7731"},"institutions":[{"id":"https://openalex.org/I138847295","display_name":"Universitat Oberta de Catalunya","ror":"https://ror.org/01f5wp925","country_code":"ES","type":"education","lineage":["https://openalex.org/I138847295"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"David Meg\u00edas","raw_affiliation_strings":["Internet Interdisciplinary Institute (IN3), Universitat Oberta de Catalunya (UOC), Center for Cybersecurity Research of Catalonia (CYBERCAT), Castelldefels, Catalunya, Spain"],"affiliations":[{"raw_affiliation_string":"Internet Interdisciplinary Institute (IN3), Universitat Oberta de Catalunya (UOC), Center for Cybersecurity Research of Catalonia (CYBERCAT), Castelldefels, Catalunya, Spain","institution_ids":["https://openalex.org/I138847295"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5044117915"],"corresponding_institution_ids":["https://openalex.org/I138847295"],"apc_list":null,"apc_paid":null,"fwci":0.2931,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.58561874,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8452402949333191},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.8098655939102173},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.7506256103515625},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6766868829727173},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6045482754707336},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.5508256554603577},{"id":"https://openalex.org/keywords/broadcasting","display_name":"Broadcasting (networking)","score":0.4879905581474304},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4158092141151428},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3797285258769989},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11945608258247375},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.10118091106414795}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8452402949333191},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.8098655939102173},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.7506256103515625},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6766868829727173},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6045482754707336},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.5508256554603577},{"id":"https://openalex.org/C110157686","wikidata":"https://www.wikidata.org/wiki/Q922122","display_name":"Broadcasting (networking)","level":2,"score":0.4879905581474304},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4158092141151428},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3797285258769989},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11945608258247375},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.10118091106414795},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3424954.3425511","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3424954.3425511","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the European Interdisciplinary Cybersecurity Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8100000023841858,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1524144700","https://openalex.org/W1978627933","https://openalex.org/W1991976017","https://openalex.org/W2031029123","https://openalex.org/W2152988830","https://openalex.org/W2274856082","https://openalex.org/W2495699424","https://openalex.org/W2519082534","https://openalex.org/W2551527924","https://openalex.org/W2753919623","https://openalex.org/W2963514896","https://openalex.org/W3014388304","https://openalex.org/W3021799630"],"related_works":["https://openalex.org/W2584827882","https://openalex.org/W2538581760","https://openalex.org/W3195097297","https://openalex.org/W4225340788","https://openalex.org/W3038106605","https://openalex.org/W2513267613","https://openalex.org/W3049084372","https://openalex.org/W2528109871","https://openalex.org/W2940702331","https://openalex.org/W2905822832"],"abstract_inverted_index":{"Data":[0],"hiding":[1,74,89],"provides":[2,67],"a":[3,12,109],"collection":[4],"of":[5,32,70,87,93],"techniques":[6,57],"that":[7],"can":[8,59],"be":[9],"used":[10],"within":[11],"wider":[13],"cybersecurity":[14],"or":[15,30,35],"privacy":[16,27],"framework,":[17],"making":[18],"it":[19],"possible,":[20],"for":[21,62,103,115],"example,":[22],"to":[23,36],"protect":[24],"the":[25,71,77,91,106],"users'":[26],"in":[28,39,80,90],"streaming":[29],"broadcasting":[31],"multimedia":[33],"contents":[34],"detect":[37],"cyberattacks":[38],"IoT":[40],"networks":[41],"when":[42,111],"combined":[43],"with":[44],"machine":[45],"learning":[46],"solutions.":[47],"However,":[48],"criminals":[49],"and":[50,55,58,76,96,105],"terrorists":[51],"are":[52,113],"also":[53,99],"aware":[54],"these":[56],"exploit":[60],"them":[61],"malicious":[63],"purposes.":[64],"This":[65],"contribution":[66],"an":[68],"overview":[69],"traditional":[72],"data":[73,88],"applications":[75],"current":[78],"trends":[79],"this":[81],"field,":[82],"pointing":[83],"out":[84],"prospective":[85],"uses":[86],"context":[92],"information":[94],"security":[95],"privacy,":[97],"but":[98],"introducing":[100],"potential":[101],"threats":[102],"users":[104],"society":[107],"as":[108],"whole":[110],"they":[112],"applied":[114],"evil.":[116]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2021-01-18T00:00:00"}
