{"id":"https://openalex.org/W2800580711","doi":"https://doi.org/10.23919/icitst.2017.8356340","title":"LSB-hamming based chaotic steganography (LH-Steg)","display_name":"LSB-hamming based chaotic steganography (LH-Steg)","publication_year":2017,"publication_date":"2017-12-01","ids":{"openalex":"https://openalex.org/W2800580711","doi":"https://doi.org/10.23919/icitst.2017.8356340","mag":"2800580711"},"language":"en","primary_location":{"id":"doi:10.23919/icitst.2017.8356340","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icitst.2017.8356340","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088048699","display_name":"Marwa Saidi","orcid":"https://orcid.org/0000-0002-2486-9750"},"institutions":[{"id":"https://openalex.org/I63596082","display_name":"Tunis El Manar University","ror":"https://ror.org/029cgt552","country_code":"TN","type":"education","lineage":["https://openalex.org/I63596082"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Marwa Saidi","raw_affiliation_strings":["RISC Laboratory, ENIT, University of Tunis El-Manar, Tunis, Tunisia"],"affiliations":[{"raw_affiliation_string":"RISC Laboratory, ENIT, University of Tunis El-Manar, Tunis, Tunisia","institution_ids":["https://openalex.org/I63596082"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066143559","display_name":"Houcemeddine Hermassi","orcid":"https://orcid.org/0000-0002-4681-4312"},"institutions":[{"id":"https://openalex.org/I63596082","display_name":"Tunis El Manar University","ror":"https://ror.org/029cgt552","country_code":"TN","type":"education","lineage":["https://openalex.org/I63596082"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Houcemeddine Hermassi","raw_affiliation_strings":["RISC Laboratory, ENIT, University of Tunis El-Manar, Tunis, Tunisia"],"affiliations":[{"raw_affiliation_string":"RISC Laboratory, ENIT, University of Tunis El-Manar, Tunis, Tunisia","institution_ids":["https://openalex.org/I63596082"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064186375","display_name":"Rhouma Rhouma","orcid":"https://orcid.org/0000-0002-5715-4110"},"institutions":[{"id":"https://openalex.org/I63596082","display_name":"Tunis El Manar University","ror":"https://ror.org/029cgt552","country_code":"TN","type":"education","lineage":["https://openalex.org/I63596082"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Rhouma Rhouma","raw_affiliation_strings":["RISC Laboratory, ENIT, University of Tunis El-Manar, Tunis, Tunisia"],"affiliations":[{"raw_affiliation_string":"RISC Laboratory, ENIT, University of Tunis El-Manar, Tunis, Tunisia","institution_ids":["https://openalex.org/I63596082"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056759341","display_name":"Safya Belghith","orcid":"https://orcid.org/0000-0001-7408-7848"},"institutions":[{"id":"https://openalex.org/I63596082","display_name":"Tunis El Manar University","ror":"https://ror.org/029cgt552","country_code":"TN","type":"education","lineage":["https://openalex.org/I63596082"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Safya Belghith","raw_affiliation_strings":["RISC Laboratory, ENIT, University of Tunis El-Manar, Tunis, Tunisia"],"affiliations":[{"raw_affiliation_string":"RISC Laboratory, ENIT, University of Tunis El-Manar, Tunis, Tunisia","institution_ids":["https://openalex.org/I63596082"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5088048699"],"corresponding_institution_ids":["https://openalex.org/I63596082"],"apc_list":null,"apc_paid":null,"fwci":0.182,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.60450491,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"29","last_page":"34"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.7197309732437134},{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.6203008890151978},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.6082311868667603},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.572317361831665},{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.5510401129722595},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.5476164817810059},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5470812916755676},{"id":"https://openalex.org/keywords/hamming-code","display_name":"Hamming code","score":0.5457016229629517},{"id":"https://openalex.org/keywords/least-significant-bit","display_name":"Least significant bit","score":0.5099576711654663},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.5099290609359741},{"id":"https://openalex.org/keywords/hamming-distance","display_name":"Hamming distance","score":0.5074920058250427},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4982492923736572},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.45589402318000793},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.35377198457717896},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3374192714691162},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.33489930629730225},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.1629161834716797},{"id":"https://openalex.org/keywords/block-code","display_name":"Block code","score":0.10953781008720398},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08129459619522095}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.7197309732437134},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.6203008890151978},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.6082311868667603},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.572317361831665},{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.5510401129722595},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.5476164817810059},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5470812916755676},{"id":"https://openalex.org/C73150493","wikidata":"https://www.wikidata.org/wiki/Q853922","display_name":"Hamming code","level":4,"score":0.5457016229629517},{"id":"https://openalex.org/C4305246","wikidata":"https://www.wikidata.org/wiki/Q3885225","display_name":"Least significant bit","level":2,"score":0.5099576711654663},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.5099290609359741},{"id":"https://openalex.org/C193319292","wikidata":"https://www.wikidata.org/wiki/Q272172","display_name":"Hamming distance","level":2,"score":0.5074920058250427},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4982492923736572},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.45589402318000793},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.35377198457717896},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3374192714691162},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.33489930629730225},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.1629161834716797},{"id":"https://openalex.org/C157125643","wikidata":"https://www.wikidata.org/wiki/Q884707","display_name":"Block code","level":3,"score":0.10953781008720398},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08129459619522095},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/icitst.2017.8356340","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icitst.2017.8356340","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W22271197","https://openalex.org/W1482218439","https://openalex.org/W1518402653","https://openalex.org/W1875845630","https://openalex.org/W1995875735","https://openalex.org/W2004686575","https://openalex.org/W2009130368","https://openalex.org/W2009715451","https://openalex.org/W2015721798","https://openalex.org/W2018576906","https://openalex.org/W2028197392","https://openalex.org/W2049562124","https://openalex.org/W2117500881","https://openalex.org/W2119199090","https://openalex.org/W2124664712","https://openalex.org/W2133743319","https://openalex.org/W2136587336","https://openalex.org/W2165703179","https://openalex.org/W2170311913","https://openalex.org/W2170598445","https://openalex.org/W2542290803","https://openalex.org/W4253000688","https://openalex.org/W6639263069","https://openalex.org/W6654577778","https://openalex.org/W6677567537"],"related_works":["https://openalex.org/W2148973528","https://openalex.org/W2939392096","https://openalex.org/W2205085860","https://openalex.org/W2134958869","https://openalex.org/W2977151837","https://openalex.org/W2059133021","https://openalex.org/W2771684231","https://openalex.org/W2158736088","https://openalex.org/W4297776738","https://openalex.org/W4387195702"],"abstract_inverted_index":{"This":[0],"work":[1],"introduces":[2],"a":[3,66,78],"novel":[4],"secret-key":[5],"spatial":[6],"steganographic":[7],"approach":[8,111],"based":[9],"on":[10],"Hamming":[11],"codes":[12],"and":[13,89],"LSB":[14],"embedding.":[15],"The":[16],"embedding":[17,75],"artifacts":[18],"are":[19],"restricted":[20],"to":[21,35,42,69,92,116],"rich":[22],"textured":[23],"zones":[24],"of":[25,40,50,55,87,95],"the":[26,31,44,48,52,61,74,96,100,109,117],"cover":[27],"image.":[28],"We":[29],"exploited":[30,71],"standard":[32],"deviation":[33],"measurement":[34],"select":[36,70],"potential":[37],"candidate":[38],"block":[39],"pixels":[41],"hold":[43],"secret":[45],"message.":[46],"In":[47],"aim":[49],"ensuring":[51],"security":[53],"aspect":[54],"our":[56],"proposed":[57,110],"method,":[58],"we":[59],"use":[60],"Skew":[62],"Tent":[63],"Map":[64],"as":[65],"random":[67],"generator":[68],"bits":[72],"in":[73,85],"procedure.":[76],"Such":[77],"chaotic":[79],"function":[80],"shows":[81],"an":[82,113],"efficient":[83],"performance":[84],"terms":[86],"randomness":[88],"perfect":[90],"sensibility":[91],"slight":[93],"alteration":[94],"initial":[97],"condition":[98],"or":[99],"control":[101],"parameter":[102],"(sensibility:":[103],"10":[104],"<sup":[105],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[106],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">-14</sup>":[107],").":[108],"showed":[112],"effective":[114],"resistance":[115],"state-of-art":[118],"steganalysis":[119],"attacks.":[120]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
