{"id":"https://openalex.org/W2058146462","doi":"https://doi.org/10.1515/jisys-2014-0007","title":"Data Hiding Based on Improved Exploiting Modification Direction Method and Huffman Coding","display_name":"Data Hiding Based on Improved Exploiting Modification Direction Method and Huffman Coding","publication_year":2014,"publication_date":"2014-05-07","ids":{"openalex":"https://openalex.org/W2058146462","doi":"https://doi.org/10.1515/jisys-2014-0007","mag":"2058146462"},"language":"en","primary_location":{"id":"doi:10.1515/jisys-2014-0007","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jisys-2014-0007","pdf_url":"https://www.degruyter.com/document/doi/10.1515/jisys-2014-0007/pdf","source":{"id":"https://openalex.org/S2764846071","display_name":"Journal of Intelligent Systems","issn_l":"0334-1860","issn":["0334-1860","2191-026X"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310315148","host_organization_name":"IlmuKomputer.Com","host_organization_lineage":["https://openalex.org/P4310315148"],"host_organization_lineage_names":["IlmuKomputer.Com"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://www.degruyter.com/document/doi/10.1515/jisys-2014-0007/pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111774764","display_name":"Ali Ahmad","orcid":null},"institutions":[{"id":"https://openalex.org/I12150220","display_name":"University of Mosul","ror":"https://ror.org/039cf4q47","country_code":"IQ","type":"education","lineage":["https://openalex.org/I12150220"]}],"countries":["IQ"],"is_corresponding":true,"raw_author_name":"Ali M. Ahmad","raw_affiliation_strings":["University of\u00a0Mosul"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of\u00a0Mosul","institution_ids":["https://openalex.org/I12150220"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031136250","display_name":"Ghazali Sulong","orcid":null},"institutions":[{"id":"https://openalex.org/I4576418","display_name":"University of Technology Malaysia","ror":"https://ror.org/026w31v75","country_code":"MY","type":"education","lineage":["https://openalex.org/I4576418"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Ghazali Sulong","raw_affiliation_strings":["Faculty of Computing, Universiti Teknologi Malaysia, Johor Bahru, Malaysia","1Faculty of Computing, Universiti Teknologi Malaysia, Johor Bahru, Malaysia","Department of Software Engineering"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Faculty of Computing, Universiti Teknologi Malaysia, Johor Bahru, Malaysia","institution_ids":["https://openalex.org/I4576418"]},{"raw_affiliation_string":"1Faculty of Computing, Universiti Teknologi Malaysia, Johor Bahru, Malaysia","institution_ids":["https://openalex.org/I4576418"]},{"raw_affiliation_string":"Department of Software Engineering","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062125413","display_name":"Amjad Rehman","orcid":"https://orcid.org/0000-0002-3817-2655"},"institutions":[{"id":"https://openalex.org/I142608572","display_name":"Prince Sattam Bin Abdulaziz University","ror":"https://ror.org/04jt46d36","country_code":"SA","type":"education","lineage":["https://openalex.org/I142608572"]},{"id":"https://openalex.org/I931278978","display_name":"College of Business Administration","ror":"https://ror.org/03x1zq178","country_code":"LV","type":"education","lineage":["https://openalex.org/I931278978"]}],"countries":["LV","SA"],"is_corresponding":false,"raw_author_name":"Amjad Rehman","raw_affiliation_strings":["Management Information Systems Department, College of Business Administration, Salman bin Abdul Aziz University, Alkharj, KSA","3Management Information Systems Department, College of Business Administration, Salman bin Abdul Aziz University, Alkharj, KSA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Management Information Systems Department, College of Business Administration, Salman bin Abdul Aziz University, Alkharj, KSA","institution_ids":["https://openalex.org/I142608572"]},{"raw_affiliation_string":"3Management Information Systems Department, College of Business Administration, Salman bin Abdul Aziz University, Alkharj, KSA","institution_ids":["https://openalex.org/I142608572","https://openalex.org/I931278978"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059926057","display_name":"Mohammed Hazim Alkawaz","orcid":"https://orcid.org/0000-0001-9715-8477"},"institutions":[{"id":"https://openalex.org/I12150220","display_name":"University of Mosul","ror":"https://ror.org/039cf4q47","country_code":"IQ","type":"education","lineage":["https://openalex.org/I12150220"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Mohammed Hazim Alkawaz","raw_affiliation_strings":["University of\u00a0Mosul"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of\u00a0Mosul","institution_ids":["https://openalex.org/I12150220"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018549351","display_name":"Tanzila Saba","orcid":"https://orcid.org/0000-0003-3138-3801"},"institutions":[{"id":"https://openalex.org/I142024983","display_name":"Prince Sultan University","ror":"https://ror.org/053mqrf26","country_code":"SA","type":"education","lineage":["https://openalex.org/I142024983"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Tanzila Saba","raw_affiliation_strings":["College of Computer and Information Sciences, Prince Sultan University, Riyadh, KSA","4College of Computer and Information Sciences, Prince Sultan University, Riyadh, KSA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Computer and Information Sciences, Prince Sultan University, Riyadh, KSA","institution_ids":["https://openalex.org/I142024983"]},{"raw_affiliation_string":"4College of Computer and Information Sciences, Prince Sultan University, Riyadh, KSA","institution_ids":["https://openalex.org/I142024983"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5111774764"],"corresponding_institution_ids":["https://openalex.org/I12150220"],"apc_list":{"value":1000,"currency":"EUR","value_usd":1078},"apc_paid":null,"fwci":2.7185,"has_fulltext":true,"cited_by_count":38,"citation_normalized_percentile":{"value":0.9240641,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"23","issue":"4","first_page":"451","last_page":"459"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7514294385910034},{"id":"https://openalex.org/keywords/huffman-coding","display_name":"Huffman coding","score":0.7261104583740234},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.7233489751815796},{"id":"https://openalex.org/keywords/grayscale","display_name":"Grayscale","score":0.644690990447998},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.505728006362915},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.4777373671531677},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.44137272238731384},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.4404560923576355},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4284379780292511},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.4108135402202606},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.3893553614616394},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.34345120191574097},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3251129984855652},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3039385676383972},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.29668232798576355},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.2773728370666504},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.13603129982948303}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7514294385910034},{"id":"https://openalex.org/C46900642","wikidata":"https://www.wikidata.org/wiki/Q2647","display_name":"Huffman coding","level":3,"score":0.7261104583740234},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.7233489751815796},{"id":"https://openalex.org/C78201319","wikidata":"https://www.wikidata.org/wiki/Q685727","display_name":"Grayscale","level":3,"score":0.644690990447998},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.505728006362915},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.4777373671531677},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.44137272238731384},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.4404560923576355},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4284379780292511},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.4108135402202606},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.3893553614616394},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34345120191574097},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3251129984855652},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3039385676383972},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.29668232798576355},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.2773728370666504},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.13603129982948303},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1515/jisys-2014-0007","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jisys-2014-0007","pdf_url":"https://www.degruyter.com/document/doi/10.1515/jisys-2014-0007/pdf","source":{"id":"https://openalex.org/S2764846071","display_name":"Journal of Intelligent Systems","issn_l":"0334-1860","issn":["0334-1860","2191-026X"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310315148","host_organization_name":"IlmuKomputer.Com","host_organization_lineage":["https://openalex.org/P4310315148"],"host_organization_lineage_names":["IlmuKomputer.Com"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent Systems","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:fc4c1908ea5b4266996c2b99cf4bb827","is_oa":true,"landing_page_url":"https://doaj.org/article/fc4c1908ea5b4266996c2b99cf4bb827","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Intelligent Systems, Vol 23, Iss 4, Pp 451-459 (2014)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1515/jisys-2014-0007","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jisys-2014-0007","pdf_url":"https://www.degruyter.com/document/doi/10.1515/jisys-2014-0007/pdf","source":{"id":"https://openalex.org/S2764846071","display_name":"Journal of Intelligent Systems","issn_l":"0334-1860","issn":["0334-1860","2191-026X"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310315148","host_organization_name":"IlmuKomputer.Com","host_organization_lineage":["https://openalex.org/P4310315148"],"host_organization_lineage_names":["IlmuKomputer.Com"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2058146462.pdf","grobid_xml":"https://content.openalex.org/works/W2058146462.grobid-xml"},"referenced_works_count":17,"referenced_works":["https://openalex.org/W1551265734","https://openalex.org/W1747656468","https://openalex.org/W1982422912","https://openalex.org/W2007222021","https://openalex.org/W2047117289","https://openalex.org/W2054105434","https://openalex.org/W2054959937","https://openalex.org/W2068010187","https://openalex.org/W2081665128","https://openalex.org/W2094003795","https://openalex.org/W2105935466","https://openalex.org/W2118296934","https://openalex.org/W2121663704","https://openalex.org/W2127986571","https://openalex.org/W2139005432","https://openalex.org/W2159390040","https://openalex.org/W6675875971"],"related_works":["https://openalex.org/W2356840395","https://openalex.org/W3203504906","https://openalex.org/W2497446005","https://openalex.org/W2171676767","https://openalex.org/W4312890355","https://openalex.org/W2189589914","https://openalex.org/W1716757876","https://openalex.org/W83713408","https://openalex.org/W4293373802","https://openalex.org/W4318577714"],"abstract_inverted_index":{"Abstract":[0],"The":[1,139,260,302],"rapid":[2],"growth":[3],"of":[4,31,70,112,117,125,134,147,150,178,208,279,293,299,325,355,360],"covert":[5],"activities":[6],"via":[7],"communications":[8],"network":[9],"brought":[10],"about":[11],"an":[12,17,98,113,188],"increasing":[13],"need":[14],"to":[15,23,35,65,223,248,289],"provide":[16],"efficient":[18],"method":[19,104,296,308,338],"for":[20,220,228],"data":[21,91],"hiding":[22,92],"protect":[24],"secret":[25,71,110,168,239],"information":[26],"from":[27],"malicious":[28],"attacks.":[29],"One":[30],"the":[32,86,183,194,225,250,271,280,287,291,294,306,319,329,336,341],"options":[33],"is":[34,94,119,129,141,158,174,190,234,262,267,276,284,309],"combine":[36],"two":[37,145,197],"approaches,":[38],"namely":[39,199,344],"steganography":[40],"and":[41,54,82,105,121,152,202,210,318,327,347,358],"compression.":[42],"However,":[43],"its":[44,80,161,237,300],"performance":[45,292],"heavily":[46],"relies":[47],"on":[48,182],"three":[49],"major":[50],"factors,":[51],"payload,":[52],"imperceptibility,":[53],"robustness,":[55],"which":[56,164,206,275],"are":[57,217],"always":[58],"in":[59,252,297,323],"trade-offs.":[60],"Thus,":[61],"this":[62],"study":[63],"aims":[64],"hide":[66,249],"a":[67,74,88,109,132,167,171,253,265,351],"large":[68],"amount":[69],"message":[72,111],"inside":[73],"grayscale":[75,244],"host":[76],"image":[77,173],"without":[78],"sacrificing":[79],"quality":[81],"robustness.":[83,301],"To":[84],"realize":[85],"goal,":[87],"new":[89],"two-tier":[90],"technique":[93],"proposed":[95,295,307,337],"that":[96,305,335],"integrates":[97],"improved":[99],"exploiting":[100],"modification":[101],"direction":[102],"(EMD)":[103],"Huffman":[106],"coding.":[107],"First,":[108],"arbitrary":[114],"plain":[115],"text":[116],"characters":[118],"compressed":[120,130],"transformed":[122,159],"into":[123,131,144,160,176,196],"streams":[124],"bits;":[126],"each":[127,156,229,232],"character":[128],"maximum":[133],"5":[135,179],"bits":[136],"per":[137],"stream.":[138],"stream":[140],"then":[142],"divided":[143],"parts":[146],"different":[148],"sizes":[149],"3":[151,209],"2":[153,204,211,273],"bits.":[154],"Subsequently,":[155],"part":[157,233],"decimal":[162],"value,":[163],"serves":[165],"as":[166],"code.":[169],"Second,":[170],"cover":[172],"partitioned":[175],"groups":[177,216],"pixels":[180],"based":[181],"original":[184,320,345],"EMD":[185,346],"method.":[186],"Then,":[187,227],"enhancement":[189],"introduced":[191],"by":[192,241],"dividing":[193],"group":[195],"parts,":[198],"k":[200,203],"1":[201],",":[205],"consist":[207],"pixels,":[212],"respectively.":[213],"Furthermore,":[214],"several":[215],"randomly":[218],"selected":[219,230],"embedding":[221,317],"purposes":[222],"increase":[224],"security.":[226],"group,":[231],"embedded":[235],"with":[236,350],"corresponding":[238],"code":[240,251],"modifying":[242],"one":[243,278],"value":[245],"at":[246],"most":[247,281],"(2":[254],"ki":[255],"+":[256],"1)-ary":[257],"notational":[258],"system.":[259],"process":[261],"repeated":[263],"until":[264],"stego-image":[266,288],"eventually":[268],"produced.":[269],"Finally,":[270],"\u03c7":[272],"test,":[274],"considered":[277],"severe":[282],"attacks,":[283],"applied":[285],"against":[286],"evaluate":[290],"terms":[298,324],"test":[303],"revealed":[304],"more":[310],"robust":[311],"than":[312],"both":[313,340],"least":[314],"significant":[315],"bit":[316],"EMD.":[321],"Additionally,":[322],"imperceptibility":[326],"capacity,":[328],"experimental":[330],"results":[331],"have":[332],"also":[333],"shown":[334],"outperformed":[339],"well-known":[342],"methods,":[343],"optimized":[348],"EMD,":[349],"peak":[352],"signal-to-noise":[353],"ratio":[354],"55.92":[356],"dB":[357],"payload":[359],"52,428":[361],"bytes.":[362]},"counts_by_year":[{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":6},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2026-05-21T06:26:12.895304","created_date":"2016-06-24T00:00:00"}
