{"id":"https://openalex.org/W2911293487","doi":"https://doi.org/10.1515/jisys-2018-0225","title":"Video Steganography Using Knight Tour Algorithm and LSB Method for Encrypted Data","display_name":"Video Steganography Using Knight Tour Algorithm and LSB Method for Encrypted Data","publication_year":2019,"publication_date":"2019-02-07","ids":{"openalex":"https://openalex.org/W2911293487","doi":"https://doi.org/10.1515/jisys-2018-0225","mag":"2911293487"},"language":"en","primary_location":{"id":"doi:10.1515/jisys-2018-0225","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jisys-2018-0225","pdf_url":"https://www.degruyter.com/downloadpdf/journals/jisys/29/1/article-p1216.pdf","source":{"id":"https://openalex.org/S2764846071","display_name":"Journal of Intelligent Systems","issn_l":"0334-1860","issn":["0334-1860","2191-026X"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310315148","host_organization_name":"IlmuKomputer.Com","host_organization_lineage":["https://openalex.org/P4310315148"],"host_organization_lineage_names":["IlmuKomputer.Com"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://www.degruyter.com/downloadpdf/journals/jisys/29/1/article-p1216.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041421076","display_name":"Zeyad Safaa Younus","orcid":"https://orcid.org/0000-0002-6818-1392"},"institutions":[{"id":"https://openalex.org/I12150220","display_name":"University of Mosul","ror":"https://ror.org/039cf4q47","country_code":"IQ","type":"education","lineage":["https://openalex.org/I12150220"]}],"countries":["IQ"],"is_corresponding":true,"raw_author_name":"Zeyad Safaa Younus","raw_affiliation_strings":["Assistant Lecturer, Faculty of Computer Sciences and Mathematics, Software Engineering , University of Mosul , Mosul , Iraq , e-mail:","Faculty of Computer Sciences and Mathematics,","Software Engineering, University of Mosul, Mosul, Iraq,"],"raw_orcid":"https://orcid.org/0000-0002-6818-1392","affiliations":[{"raw_affiliation_string":"Assistant Lecturer, Faculty of Computer Sciences and Mathematics, Software Engineering , University of Mosul , Mosul , Iraq , e-mail:","institution_ids":["https://openalex.org/I12150220"]},{"raw_affiliation_string":"Faculty of Computer Sciences and Mathematics,","institution_ids":[]},{"raw_affiliation_string":"Software Engineering, University of Mosul, Mosul, Iraq,","institution_ids":["https://openalex.org/I12150220"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075305959","display_name":"Ghada Thanoon Younus","orcid":null},"institutions":[{"id":"https://openalex.org/I12150220","display_name":"University of Mosul","ror":"https://ror.org/039cf4q47","country_code":"IQ","type":"education","lineage":["https://openalex.org/I12150220"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Ghada Thanoon Younus","raw_affiliation_strings":["Lecturer, Faculty of Computer Sciences and Mathematics, Computer Science , University of Mosul , Mosul , Iraq"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Lecturer, Faculty of Computer Sciences and Mathematics, Computer Science , University of Mosul , Mosul , Iraq","institution_ids":["https://openalex.org/I12150220"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5041421076"],"corresponding_institution_ids":["https://openalex.org/I12150220"],"apc_list":{"value":1000,"currency":"EUR","value_usd":1078},"apc_paid":{"value":1000,"currency":"EUR","value_usd":1078},"fwci":2.5528,"has_fulltext":true,"cited_by_count":40,"citation_normalized_percentile":{"value":0.91723942,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"29","issue":"1","first_page":"1216","last_page":"1225"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8064584732055664},{"id":"https://openalex.org/keywords/least-significant-bit","display_name":"Least significant bit","score":0.7733357548713684},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7334721684455872},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.6609128713607788},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.5303716659545898},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5075541734695435},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.4822845757007599},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.46597644686698914},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.4486185312271118},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.44845905900001526},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.43169838190078735},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3768712282180786},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3258298933506012},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.304657518863678},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.1916857659816742},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.17196547985076904}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8064584732055664},{"id":"https://openalex.org/C4305246","wikidata":"https://www.wikidata.org/wiki/Q3885225","display_name":"Least significant bit","level":2,"score":0.7733357548713684},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7334721684455872},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.6609128713607788},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.5303716659545898},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5075541734695435},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4822845757007599},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.46597644686698914},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.4486185312271118},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.44845905900001526},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.43169838190078735},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3768712282180786},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3258298933506012},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.304657518863678},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1916857659816742},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.17196547985076904},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1515/jisys-2018-0225","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jisys-2018-0225","pdf_url":"https://www.degruyter.com/downloadpdf/journals/jisys/29/1/article-p1216.pdf","source":{"id":"https://openalex.org/S2764846071","display_name":"Journal of Intelligent Systems","issn_l":"0334-1860","issn":["0334-1860","2191-026X"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310315148","host_organization_name":"IlmuKomputer.Com","host_organization_lineage":["https://openalex.org/P4310315148"],"host_organization_lineage_names":["IlmuKomputer.Com"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent Systems","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:de19f97604dd47488d56acbe2169fead","is_oa":true,"landing_page_url":"https://doaj.org/article/de19f97604dd47488d56acbe2169fead","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Intelligent Systems, Vol 29, Iss 1, Pp 1216-1225 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1515/jisys-2018-0225","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jisys-2018-0225","pdf_url":"https://www.degruyter.com/downloadpdf/journals/jisys/29/1/article-p1216.pdf","source":{"id":"https://openalex.org/S2764846071","display_name":"Journal of Intelligent Systems","issn_l":"0334-1860","issn":["0334-1860","2191-026X"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310315148","host_organization_name":"IlmuKomputer.Com","host_organization_lineage":["https://openalex.org/P4310315148"],"host_organization_lineage_names":["IlmuKomputer.Com"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent Systems","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.6800000071525574,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2911293487.pdf","grobid_xml":"https://content.openalex.org/works/W2911293487.grobid-xml"},"referenced_works_count":27,"referenced_works":["https://openalex.org/W1835586838","https://openalex.org/W1963658137","https://openalex.org/W2031029123","https://openalex.org/W2033309082","https://openalex.org/W2041330138","https://openalex.org/W2053755698","https://openalex.org/W2054959937","https://openalex.org/W2080731889","https://openalex.org/W2083122891","https://openalex.org/W2132841816","https://openalex.org/W2274212289","https://openalex.org/W2317104396","https://openalex.org/W2334224313","https://openalex.org/W2415746998","https://openalex.org/W2469362207","https://openalex.org/W2525907687","https://openalex.org/W2563856117","https://openalex.org/W2565004246","https://openalex.org/W2568589919","https://openalex.org/W2591582186","https://openalex.org/W2765698185","https://openalex.org/W2765889732","https://openalex.org/W2766428270","https://openalex.org/W2799925652","https://openalex.org/W2883701794","https://openalex.org/W3015542317","https://openalex.org/W4254812591"],"related_works":["https://openalex.org/W3127945325","https://openalex.org/W2205085860","https://openalex.org/W2885826910","https://openalex.org/W2134958869","https://openalex.org/W2181427603","https://openalex.org/W2409080236","https://openalex.org/W2977151837","https://openalex.org/W2074995973","https://openalex.org/W2796470635","https://openalex.org/W2771684231"],"abstract_inverted_index":{"Abstract":[0],"This":[1],"paper":[2],"aims":[3],"to":[4,80,89,111,146,163,208],"propose":[5],"a":[6,41,59,69,104,204,218],"method":[7,20,45,154,188,202,212,232],"for":[8,30,46,129,139],"data":[9,33],"hiding":[10],"in":[11,65,77,189,213],"video":[12,37,100,120],"by":[13,24,57,184,217],"utilizing":[14,25,58,185],"the":[15,26,32,35,48,52,66,82,85,91,94,98,113,116,123,133,136,141,148,151,157,165,170,174,181,186,200,209,225,234,237,246],"least":[16],"significant":[17],"bit":[18],"(LSB)":[19],"and":[21,39,88,162,167,192,224],"improving":[22],"it":[23,145],"knight":[27,124],"tour":[28,125],"algorithm":[29,126],"concealing":[31],"inside":[34,135,144,180],"AVI":[36],"file":[38],"using":[40],"key":[42,63],"function":[43],"encryption":[44],"encrypting":[47],"secret":[49,53,95,142,176,238],"message.":[50,96],"First,":[51],"message":[54,87,143,177,239],"is":[55,68,127,178],"encrypted":[56,175],"mathematical":[60],"equation.":[61],"The":[62,194],"used":[64],"equation":[67],"set":[70,105],"of":[71,84,93,106,115,119,132,150,160,169,215,221,228],"random":[72,130],"numbers.":[73],"These":[74],"numbers":[75],"differ":[76],"each":[78],"implementation":[79],"warrant":[81],"safety":[83],"hidden":[86],"increase":[90,164],"security":[92,168,235],"Then,":[97],"cover":[99],"was":[101],"converted":[102],"from":[103],"frames":[107],"into":[108],"separated":[109],"images":[110],"take":[112],"advantage":[114],"large":[117],"size":[118],"file.":[121],"Afterward,":[122,173],"utilized":[128,138,156],"selecting":[131],"pixels":[134,183],"frame":[137],"embedding":[140],"overcome":[147],"shortcoming":[149],"conventional":[152],"LSB":[153,187],"that":[155,199],"serial":[158],"selection":[159],"pixel":[161],"robustness":[166],"proposed":[171,201],"method.":[172],"embedded":[179],"selected":[182],"bits":[190],"(7":[191],"8).":[193],"observational":[195],"results":[196],"have":[197],"drawn":[198,242],"has":[203],"superior":[205],"performance":[206],"compared":[207],"previous":[210],"steganography":[211],"terms":[214],"quality":[216],"high":[219],"PSNR":[220],"67.3638":[222],"dB":[223],"lowest":[226],"MSE":[227],"0.2578.":[229],"Furthermore,":[230],"this":[231],"preserves":[233],"where":[236],"cannot":[240],"be":[241],"out":[243],"without":[244],"knowing":[245],"decoding":[247],"rules.":[248]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":11},{"year":2021,"cited_by_count":10},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2}],"updated_date":"2025-12-06T23:10:59.065948","created_date":"2025-10-10T00:00:00"}
