{"id":"https://openalex.org/W4283397936","doi":"https://doi.org/10.13053/cys-26-1-4147","title":"Hiding Information through Reverse-Phase Audio Steganography Technique","display_name":"Hiding Information through Reverse-Phase Audio Steganography Technique","publication_year":2022,"publication_date":"2022-03-30","ids":{"openalex":"https://openalex.org/W4283397936","doi":"https://doi.org/10.13053/cys-26-1-4147"},"language":"es","primary_location":{"id":"doi:10.13053/cys-26-1-4147","is_oa":false,"landing_page_url":"https://doi.org/10.13053/cys-26-1-4147","pdf_url":null,"source":{"id":"https://openalex.org/S61446325","display_name":"Computaci\u00f3n y Sistemas","issn_l":"1405-5546","issn":["1405-5546","2007-9737"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319599","host_organization_name":"National Polytechnic Institute","host_organization_lineage":["https://openalex.org/P4310319599"],"host_organization_lineage_names":["National Polytechnic Institute"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computaci\u00f3n y Sistemas","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009991695","display_name":"Barbara Emma S\u00e1nchez Rinza","orcid":"https://orcid.org/0000-0002-9833-7570"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"B\u00e1rbara Emma S\u00e1nchez Rinza","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021270386","display_name":"Carlos Robledo-S\u00e1nchez","orcid":"https://orcid.org/0000-0002-9163-0627"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Carlos I. Robledo S\u00e1nchez","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Alberto Jaramillo N\u00fa\u00f1ez","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Alberto Jaramillo N\u00fa\u00f1ez","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5009991695"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.05024566,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"26","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9135000109672546,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9135000109672546,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8409284353256226},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.7664636969566345},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7494750618934631},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.64467853307724},{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.6358111500740051},{"id":"https://openalex.org/keywords/steganography-tools","display_name":"Steganography tools","score":0.595585823059082},{"id":"https://openalex.org/keywords/audio-signal","display_name":"Audio signal","score":0.5485587120056152},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5194713473320007},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49601849913597107},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.3815406560897827},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.32912465929985046},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.2459874153137207},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.17778772115707397},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.164194256067276},{"id":"https://openalex.org/keywords/speech-coding","display_name":"Speech coding","score":0.16006332635879517}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8409284353256226},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.7664636969566345},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7494750618934631},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.64467853307724},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.6358111500740051},{"id":"https://openalex.org/C13179402","wikidata":"https://www.wikidata.org/wiki/Q7606662","display_name":"Steganography tools","level":4,"score":0.595585823059082},{"id":"https://openalex.org/C64922751","wikidata":"https://www.wikidata.org/wiki/Q4650799","display_name":"Audio signal","level":3,"score":0.5485587120056152},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5194713473320007},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49601849913597107},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.3815406560897827},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.32912465929985046},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2459874153137207},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17778772115707397},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.164194256067276},{"id":"https://openalex.org/C13895895","wikidata":"https://www.wikidata.org/wiki/Q3270773","display_name":"Speech coding","level":2,"score":0.16006332635879517},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.13053/cys-26-1-4147","is_oa":false,"landing_page_url":"https://doi.org/10.13053/cys-26-1-4147","pdf_url":null,"source":{"id":"https://openalex.org/S61446325","display_name":"Computaci\u00f3n y Sistemas","issn_l":"1405-5546","issn":["1405-5546","2007-9737"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319599","host_organization_name":"National Polytechnic Institute","host_organization_lineage":["https://openalex.org/P4310319599"],"host_organization_lineage_names":["National Polytechnic Institute"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computaci\u00f3n y Sistemas","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2560172240","https://openalex.org/W1995538220","https://openalex.org/W3146660591","https://openalex.org/W2338095724","https://openalex.org/W2186632617","https://openalex.org/W2548321233","https://openalex.org/W83713408","https://openalex.org/W2171676767","https://openalex.org/W2497446005","https://openalex.org/W2054011204"],"abstract_inverted_index":{"Steganography":[0],"is":[1,58],"employed":[2],"in":[3],"the":[4,41],"study":[5],"and":[6],"application":[7],"of":[8,38,43,71,74],"techniques":[9,70],"that":[10,52],"allow":[11],"hiding":[12],"messages":[13,29],"or":[14],"objects":[15,32],"inside":[16],"other":[17,31],"imperceptible":[18],"objects,":[19],"called":[20],"carriers.":[21],"Hence,":[22],"such":[23],"a":[24,35],"procedure":[25],"tries":[26],"to":[27,33,51,60],"hide":[28],"within":[30],"establish":[34],"covert":[36],"channel":[37],"communication,":[39],"becoming":[40],"act":[42],"communication":[44],"unnoticed":[45],"by":[46,65],"observers":[47],"who":[48],"have":[49],"access":[50],"channel.":[53],"In":[54],"this":[55],"work":[56],"steganography":[57],"used":[59],"send":[61],"audio":[62,67,76],"messages,":[63],"covered":[64],"another":[66],"message,":[68],"using":[69],"phase":[72],"inversion":[73],"an":[75],"signal.":[77]},"counts_by_year":[],"updated_date":"2026-04-23T09:07:50.710637","created_date":"2025-10-10T00:00:00"}
