{"id":"https://openalex.org/W3169592549","doi":"https://doi.org/10.1155/2021/6679284","title":"A High-Capacity Image Steganography Method Using Chaotic Particle Swarm Optimization","display_name":"A High-Capacity Image Steganography Method Using Chaotic Particle Swarm Optimization","publication_year":2021,"publication_date":"2021-06-07","ids":{"openalex":"https://openalex.org/W3169592549","doi":"https://doi.org/10.1155/2021/6679284","mag":"3169592549"},"language":"en","primary_location":{"id":"doi:10.1155/2021/6679284","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/6679284","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/6679284.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2021/6679284.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090094801","display_name":"Aya Jaradat","orcid":"https://orcid.org/0000-0002-4085-1315"},"institutions":[{"id":"https://openalex.org/I156983542","display_name":"Jordan University of Science and Technology","ror":"https://ror.org/03y8mtb59","country_code":"JO","type":"education","lineage":["https://openalex.org/I156983542"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Aya Jaradat","raw_affiliation_strings":["Department of Network Engineering and Security, Jordan University of Science and Technology, Irbid, Jordan"],"affiliations":[{"raw_affiliation_string":"Department of Network Engineering and Security, Jordan University of Science and Technology, Irbid, Jordan","institution_ids":["https://openalex.org/I156983542"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056060865","display_name":"Eyad Taqieddin","orcid":"https://orcid.org/0000-0002-8520-1965"},"institutions":[{"id":"https://openalex.org/I156983542","display_name":"Jordan University of Science and Technology","ror":"https://ror.org/03y8mtb59","country_code":"JO","type":"education","lineage":["https://openalex.org/I156983542"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"Eyad Taqieddin","raw_affiliation_strings":["Department of Network Engineering and Security, Jordan University of Science and Technology, Irbid, Jordan"],"affiliations":[{"raw_affiliation_string":"Department of Network Engineering and Security, Jordan University of Science and Technology, Irbid, Jordan","institution_ids":["https://openalex.org/I156983542"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017748425","display_name":"Moad Mowafi","orcid":"https://orcid.org/0000-0003-4885-9722"},"institutions":[{"id":"https://openalex.org/I156983542","display_name":"Jordan University of Science and Technology","ror":"https://ror.org/03y8mtb59","country_code":"JO","type":"education","lineage":["https://openalex.org/I156983542"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Moad Mowafi","raw_affiliation_strings":["Department of Network Engineering and Security, Jordan University of Science and Technology, Irbid, Jordan"],"affiliations":[{"raw_affiliation_string":"Department of Network Engineering and Security, Jordan University of Science and Technology, Irbid, Jordan","institution_ids":["https://openalex.org/I156983542"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5056060865"],"corresponding_institution_ids":["https://openalex.org/I156983542"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":3.0038,"has_fulltext":true,"cited_by_count":37,"citation_normalized_percentile":{"value":0.92792778,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"2021","issue":null,"first_page":"1","last_page":"11"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.9176437854766846},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.797812819480896},{"id":"https://openalex.org/keywords/particle-swarm-optimization","display_name":"Particle swarm optimization","score":0.7090405821800232},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.6694741249084473},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.608707845211029},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.6067292094230652},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.596422553062439},{"id":"https://openalex.org/keywords/image-quality","display_name":"Image quality","score":0.47740426659584045},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4599527418613434},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.446156769990921},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.43097931146621704},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3437609076499939},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3338202238082886},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.333039790391922},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.32831090688705444},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.14595532417297363}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.9176437854766846},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.797812819480896},{"id":"https://openalex.org/C85617194","wikidata":"https://www.wikidata.org/wiki/Q2072794","display_name":"Particle swarm optimization","level":2,"score":0.7090405821800232},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.6694741249084473},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.608707845211029},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.6067292094230652},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.596422553062439},{"id":"https://openalex.org/C55020928","wikidata":"https://www.wikidata.org/wiki/Q3813865","display_name":"Image quality","level":3,"score":0.47740426659584045},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4599527418613434},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.446156769990921},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.43097931146621704},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3437609076499939},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3338202238082886},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.333039790391922},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.32831090688705444},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.14595532417297363},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2021/6679284","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/6679284","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/6679284.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:d6282fda6975433aa32de1ce85d038c3","is_oa":true,"landing_page_url":"https://doaj.org/article/d6282fda6975433aa32de1ce85d038c3","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2021 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2021/6679284","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/6679284","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/6679284.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3169592549.pdf","grobid_xml":"https://content.openalex.org/works/W3169592549.grobid-xml"},"referenced_works_count":31,"referenced_works":["https://openalex.org/W1983147739","https://openalex.org/W2001994758","https://openalex.org/W2014384241","https://openalex.org/W2084218876","https://openalex.org/W2085350204","https://openalex.org/W2085549176","https://openalex.org/W2114991945","https://openalex.org/W2133665775","https://openalex.org/W2186439582","https://openalex.org/W2292637813","https://openalex.org/W2533898518","https://openalex.org/W2573137292","https://openalex.org/W2593360921","https://openalex.org/W2597387073","https://openalex.org/W2613442691","https://openalex.org/W2765505907","https://openalex.org/W2777049428","https://openalex.org/W2794624153","https://openalex.org/W2808626692","https://openalex.org/W2886736527","https://openalex.org/W2897265369","https://openalex.org/W2900141423","https://openalex.org/W2941089993","https://openalex.org/W2944293858","https://openalex.org/W2972450862","https://openalex.org/W2978818838","https://openalex.org/W2981326439","https://openalex.org/W2982326632","https://openalex.org/W3013707901","https://openalex.org/W6640222061","https://openalex.org/W6646012233"],"related_works":["https://openalex.org/W2131399837","https://openalex.org/W4205668919","https://openalex.org/W2002818115","https://openalex.org/W2511661528","https://openalex.org/W2337415362","https://openalex.org/W2034832479","https://openalex.org/W2159222831","https://openalex.org/W29562711","https://openalex.org/W3015028912","https://openalex.org/W2188206690"],"abstract_inverted_index":{"Image":[0],"steganography":[1,37],"has":[2],"been":[3,12],"widely":[4],"adopted":[5],"to":[6,14,21,57],"protect":[7],"confidential":[8],"data.":[9],"Researchers":[10],"have":[11],"seeking":[13],"improve":[15],"the":[16,23,28,49,54,59,64,67,72,75,98,107],"steganographic":[17],"techniques":[18],"in":[19,53,104],"order":[20],"increase":[22],"embedding":[24,73],"capacity":[25],"while":[26,62],"preserving":[27],"stego-image":[29],"quality.":[30],"In":[31],"this":[32],"paper,":[33],"we":[34],"propose":[35],"a":[36],"method":[38],"using":[39],"particle":[40],"swarm":[41],"optimization":[42],"and":[43,77,84,109],"chaos":[44],"theory":[45],"aiming":[46],"at":[47],"finding":[48],"best":[50],"pixel":[51],"locations":[52],"cover":[55],"image":[56,111],"hide":[58],"secret":[60,78,92],"data":[61],"maintaining":[63],"quality":[65,112],"of":[66,91,106],"resultant":[68],"stego-image.":[69],"To":[70],"enhance":[71],"capacity,":[74],"host":[76],"images":[79],"are":[80],"divided":[81],"into":[82],"blocks":[83],"each":[85],"block":[86],"stores":[87],"an":[88],"appropriate":[89],"amount":[90],"bits.":[93],"Experimental":[94],"results":[95],"show":[96],"that":[97],"proposed":[99],"scheme":[100],"outperforms":[101],"existing":[102],"methods":[103],"terms":[105],"PSNR":[108],"SSIM":[110],"metrics.":[113]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":14},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":1}],"updated_date":"2026-03-25T14:56:36.534964","created_date":"2025-10-10T00:00:00"}
