{"id":"https://openalex.org/W2591836065","doi":"https://doi.org/10.1155/2017/5397082","title":"A Secure Steganographic Algorithm Based on Frequency Domain for the Transmission of Hidden Information","display_name":"A Secure Steganographic Algorithm Based on Frequency Domain for the Transmission of Hidden Information","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2591836065","doi":"https://doi.org/10.1155/2017/5397082","mag":"2591836065"},"language":"en","primary_location":{"id":"doi:10.1155/2017/5397082","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2017/5397082","pdf_url":"http://downloads.hindawi.com/journals/scn/2017/5397082.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"http://downloads.hindawi.com/journals/scn/2017/5397082.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000677754","display_name":"Anier Soria-Lorente","orcid":"https://orcid.org/0000-0003-3488-3094"},"institutions":[{"id":"https://openalex.org/I2802558902","display_name":"Universidad Cat\u00f3lica de Temuco","ror":"https://ror.org/051nvp675","country_code":"CL","type":"education","lineage":["https://openalex.org/I2802558902"]},{"id":"https://openalex.org/I4210147029","display_name":"University of Granma","ror":"https://ror.org/0488pxx86","country_code":"CU","type":"education","lineage":["https://openalex.org/I4210147029"]}],"countries":["CL","CU"],"is_corresponding":true,"raw_author_name":"A. Soria-Lorente","raw_affiliation_strings":["Departamento de Ciencias Matem\u00e1ticas y F\u00edsicas, Casilla 15 D, Universidad Cat\u00f3lica de Temuco, Temuco, Chile","Department of Basic Sciences, Granma University, Bayamo, Cuba"],"raw_orcid":"https://orcid.org/0000-0003-3488-3094","affiliations":[{"raw_affiliation_string":"Departamento de Ciencias Matem\u00e1ticas y F\u00edsicas, Casilla 15 D, Universidad Cat\u00f3lica de Temuco, Temuco, Chile","institution_ids":["https://openalex.org/I2802558902"]},{"raw_affiliation_string":"Department of Basic Sciences, Granma University, Bayamo, Cuba","institution_ids":["https://openalex.org/I4210147029"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057021984","display_name":"Stefan Berres","orcid":"https://orcid.org/0000-0002-8479-261X"},"institutions":[{"id":"https://openalex.org/I2802558902","display_name":"Universidad Cat\u00f3lica de Temuco","ror":"https://ror.org/051nvp675","country_code":"CL","type":"education","lineage":["https://openalex.org/I2802558902"]}],"countries":["CL"],"is_corresponding":false,"raw_author_name":"S. Berres","raw_affiliation_strings":["Departamento de Ciencias Matem\u00e1ticas y F\u00edsicas, Casilla 15 D, Universidad Cat\u00f3lica de Temuco, Temuco, Chile"],"raw_orcid":"https://orcid.org/0000-0002-8479-261X","affiliations":[{"raw_affiliation_string":"Departamento de Ciencias Matem\u00e1ticas y F\u00edsicas, Casilla 15 D, Universidad Cat\u00f3lica de Temuco, Temuco, Chile","institution_ids":["https://openalex.org/I2802558902"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5000677754"],"corresponding_institution_ids":["https://openalex.org/I2802558902","https://openalex.org/I4210147029"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":1.2937,"has_fulltext":true,"cited_by_count":31,"citation_normalized_percentile":{"value":0.87881032,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"2017","issue":null,"first_page":"1","last_page":"14"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8169614672660828},{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.8056551814079285},{"id":"https://openalex.org/keywords/pseudorandom-number-generator","display_name":"Pseudorandom number generator","score":0.7751412391662598},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7148253917694092},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.6663373708724976},{"id":"https://openalex.org/keywords/histogram","display_name":"Histogram","score":0.5642096400260925},{"id":"https://openalex.org/keywords/thresholding","display_name":"Thresholding","score":0.5447772741317749},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.5424843430519104},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.5386561751365662},{"id":"https://openalex.org/keywords/pseudorandom-binary-sequence","display_name":"Pseudorandom binary sequence","score":0.5234082341194153},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.47112178802490234},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.43278267979621887},{"id":"https://openalex.org/keywords/peak-signal-to-noise-ratio","display_name":"Peak signal-to-noise ratio","score":0.42108353972435},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.31518054008483887},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2550012767314911},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.24963852763175964},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.118283212184906}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8169614672660828},{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.8056551814079285},{"id":"https://openalex.org/C140642157","wikidata":"https://www.wikidata.org/wiki/Q1623338","display_name":"Pseudorandom number generator","level":2,"score":0.7751412391662598},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7148253917694092},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.6663373708724976},{"id":"https://openalex.org/C53533937","wikidata":"https://www.wikidata.org/wiki/Q185020","display_name":"Histogram","level":3,"score":0.5642096400260925},{"id":"https://openalex.org/C191178318","wikidata":"https://www.wikidata.org/wiki/Q2256906","display_name":"Thresholding","level":3,"score":0.5447772741317749},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.5424843430519104},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.5386561751365662},{"id":"https://openalex.org/C128040838","wikidata":"https://www.wikidata.org/wiki/Q1810628","display_name":"Pseudorandom binary sequence","level":3,"score":0.5234082341194153},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.47112178802490234},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.43278267979621887},{"id":"https://openalex.org/C154579607","wikidata":"https://www.wikidata.org/wiki/Q3373850","display_name":"Peak signal-to-noise ratio","level":3,"score":0.42108353972435},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.31518054008483887},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2550012767314911},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.24963852763175964},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.118283212184906},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1155/2017/5397082","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2017/5397082","pdf_url":"http://downloads.hindawi.com/journals/scn/2017/5397082.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:737c54219a12467a83c7c22a87ae3ab2","is_oa":false,"landing_page_url":"https://doaj.org/article/737c54219a12467a83c7c22a87ae3ab2","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2017 (2017)","raw_type":"article"},{"id":"pmh:oai:repositoriodigital.uct.cl:10925/4117","is_oa":false,"landing_page_url":"http://repositoriodigital.uct.cl/handle/10925/4117","pdf_url":null,"source":{"id":"https://openalex.org/S4306401092","display_name":"Repositorio Acad\u00e9mico de la Universidad Cat\u00f3lica de Temuco (Universidad Cat\u00f3lica de Temuco)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"SECURITY AND COMMUNICATION NETWORKS","raw_type":"Article"}],"best_oa_location":{"id":"doi:10.1155/2017/5397082","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2017/5397082","pdf_url":"http://downloads.hindawi.com/journals/scn/2017/5397082.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1043411689","display_name":null,"funder_award_id":"2015CA-SF-04","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320319826","display_name":"Universidad Cat\u00f3lica de Temuco","ror":null},{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2591836065.pdf","grobid_xml":"https://content.openalex.org/works/W2591836065.grobid-xml"},"referenced_works_count":32,"referenced_works":["https://openalex.org/W277545381","https://openalex.org/W331457344","https://openalex.org/W1567020416","https://openalex.org/W1568574635","https://openalex.org/W1760530029","https://openalex.org/W1955882805","https://openalex.org/W1988134477","https://openalex.org/W1995484676","https://openalex.org/W1998846819","https://openalex.org/W2016584134","https://openalex.org/W2029596906","https://openalex.org/W2037948350","https://openalex.org/W2047805575","https://openalex.org/W2058135112","https://openalex.org/W2065449792","https://openalex.org/W2096049969","https://openalex.org/W2103228545","https://openalex.org/W2111415735","https://openalex.org/W2123849779","https://openalex.org/W2129547628","https://openalex.org/W2146621575","https://openalex.org/W2153542878","https://openalex.org/W2157989186","https://openalex.org/W2159907644","https://openalex.org/W2161439181","https://openalex.org/W2187096872","https://openalex.org/W2317951628","https://openalex.org/W2323337162","https://openalex.org/W2332823379","https://openalex.org/W2334963019","https://openalex.org/W2472588986","https://openalex.org/W3005199992"],"related_works":["https://openalex.org/W2148973528","https://openalex.org/W2939392096","https://openalex.org/W4243922849","https://openalex.org/W2106726851","https://openalex.org/W4309385482","https://openalex.org/W2792878404","https://openalex.org/W2068740952","https://openalex.org/W1583147569","https://openalex.org/W2182496537","https://openalex.org/W3154843532"],"abstract_inverted_index":{"This":[0],"contribution":[1],"proposes":[2],"a":[3,37,53],"novel":[4],"steganographic":[5,25],"method":[6],"based":[7],"on":[8,129],"the":[9,14,46,49,65,71,76,79,81,87,89,98,112,119,130,133,137,140,145,151,155,159,163,172,178,186,193],"compression":[10],"standard":[11],"according":[12],"to":[13,35,97,123],"Joint":[15],"Photographic":[16],"Expert":[17],"Group":[18],"and":[19,31,117,147,154,165],"an":[20,108],"Entropy":[21],"Thresholding":[22],"technique.":[23],"The":[24,59,101,126,168],"algorithm":[26,134,170,188],"uses":[27],"one":[28,32],"public":[29],"key":[30,34],"private":[33],"generate":[36],"binary":[38,50],"sequence":[39,51],"of":[40,48,52,78,111,132,136,139,174],"pseudorandom":[41,120],"numbers":[42],"that":[43,185],"indicate":[44],"where":[45],"elements":[47],"secret":[54],"message":[55,80],"will":[56],"be":[57],"inserted.":[58],"insertion":[60,77,88,102],"takes":[61,104],"eventually":[62],"place":[63,106],"at":[64],"first":[66],"seven":[67],"AC":[68],"coefficients":[69],"in":[70,94],"transformed":[72],"DCT":[73],"domain.":[74],"Before":[75],"image":[82],"undergoes":[83],"several":[84],"transformations.":[85,100],"After":[86],"inverse":[90],"transformations":[91],"are":[92],"applied":[93],"reverse":[95],"order":[96],"original":[99],"itself":[103],"only":[105],"if":[107,118],"entropy":[109],"threshold":[110],"corresponding":[113],"block":[114],"is":[115,189],"satisfied":[116],"number":[121],"indicates":[122],"do":[124],"so.":[125],"experimental":[127],"work":[128],"validation":[131],"consists":[135],"calculation":[138],"peak":[141],"signal-to-noise":[142],"ratio":[143],"(PSNR),":[144],"difference":[146],"correlation":[148],"distortion":[149],"metrics,":[150],"histogram":[152],"analysis,":[153],"relative":[156],"entropy,":[157],"comparing":[158],"same":[160],"characteristics":[161],"for":[162],"cover":[164],"stego":[166],"image.":[167],"proposed":[169,187],"improves":[171],"level":[173],"imperceptibility":[175],"analyzed":[176],"through":[177],"PSNR":[179],"values.":[180],"A":[181],"steganalysis":[182],"experiment":[183],"shows":[184],"highly":[190],"resistant":[191],"against":[192],"Chi-square":[194],"attack.":[195]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
