{"id":"https://openalex.org/W2998074579","doi":"https://doi.org/10.3233/jifs-179563","title":"A novel and dependable image steganography model for strengthening the security of cloud storage","display_name":"A novel and dependable image steganography model for strengthening the security of cloud storage","publication_year":2019,"publication_date":"2019-12-31","ids":{"openalex":"https://openalex.org/W2998074579","doi":"https://doi.org/10.3233/jifs-179563","mag":"2998074579"},"language":"en","primary_location":{"id":"doi:10.3233/jifs-179563","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-179563","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040168644","display_name":"Mostafa A. Ahmad","orcid":null},"institutions":[{"id":"https://openalex.org/I4210136004","display_name":"University of Bisha","ror":"https://ror.org/040548g92","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210136004"]},{"id":"https://openalex.org/I63601056","display_name":"Menoufia University","ror":"https://ror.org/05sjrb944","country_code":"EG","type":"education","lineage":["https://openalex.org/I63601056"]}],"countries":["EG","SA"],"is_corresponding":true,"raw_author_name":"Mostafa Ahmad","raw_affiliation_strings":["Department of Computer Science, College of Computing and Information, University of Bisha, Saudi Arabia","Department of Computer Science, Faculty of Computers and Information, Menoufia University, Shebin El-Kom, Egypt"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Computing and Information, University of Bisha, Saudi Arabia","institution_ids":["https://openalex.org/I4210136004"]},{"raw_affiliation_string":"Department of Computer Science, Faculty of Computers and Information, Menoufia University, Shebin El-Kom, Egypt","institution_ids":["https://openalex.org/I63601056"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077725442","display_name":"Ahmed Ghoneim","orcid":"https://orcid.org/0000-0003-2076-8925"},"institutions":[{"id":"https://openalex.org/I63601056","display_name":"Menoufia University","ror":"https://ror.org/05sjrb944","country_code":"EG","type":"education","lineage":["https://openalex.org/I63601056"]},{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["EG","SA"],"is_corresponding":false,"raw_author_name":"Ahmed Ghoneim","raw_affiliation_strings":["Department of Computer Science, College of Science, Menoufia University, Egypt","Department of Software Engineering, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Science, Menoufia University, Egypt","institution_ids":["https://openalex.org/I63601056"]},{"raw_affiliation_string":"Department of Software Engineering, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050880595","display_name":"Saleh Alshomrani","orcid":null},"institutions":[{"id":"https://openalex.org/I4210099699","display_name":"Jeddah University","ror":"https://ror.org/015ya8798","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210099699"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Saleh Alshomrani","raw_affiliation_strings":["Department of Computer Science and Artificial Intellgence, College of Computer Science and Engineering, University of Jeddah, Jeddah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Artificial Intellgence, College of Computer Science and Engineering, University of Jeddah, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I4210099699"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017440430","display_name":"Ahmed H. Samak","orcid":"https://orcid.org/0009-0005-4420-9265"},"institutions":[{"id":"https://openalex.org/I63601056","display_name":"Menoufia University","ror":"https://ror.org/05sjrb944","country_code":"EG","type":"education","lineage":["https://openalex.org/I63601056"]},{"id":"https://openalex.org/I4210136004","display_name":"University of Bisha","ror":"https://ror.org/040548g92","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210136004"]}],"countries":["EG","SA"],"is_corresponding":false,"raw_author_name":"Ahmed Samak","raw_affiliation_strings":["Department of Computer Science, College of Computing and Information, University of Bisha, Saudi Arabia","Department of Computer Science, College of Science, Menoufia University, Egypt"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Computing and Information, University of Bisha, Saudi Arabia","institution_ids":["https://openalex.org/I4210136004"]},{"raw_affiliation_string":"Department of Computer Science, College of Science, Menoufia University, Egypt","institution_ids":["https://openalex.org/I63601056"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051538683","display_name":"Nader Omar","orcid":null},"institutions":[{"id":"https://openalex.org/I4210136004","display_name":"University of Bisha","ror":"https://ror.org/040548g92","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210136004"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Nader Omar","raw_affiliation_strings":["Department of Computer Science, College of Computing and Information, University of Bisha, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Computing and Information, University of Bisha, Saudi Arabia","institution_ids":["https://openalex.org/I4210136004"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088826563","display_name":"Fahad Algarni","orcid":"https://orcid.org/0000-0003-3895-2309"},"institutions":[{"id":"https://openalex.org/I4210136004","display_name":"University of Bisha","ror":"https://ror.org/040548g92","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210136004"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Fahad Algarni","raw_affiliation_strings":["Department of Computer Science, College of Computing and Information, University of Bisha, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Computing and Information, University of Bisha, Saudi Arabia","institution_ids":["https://openalex.org/I4210136004"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5040168644","https://openalex.org/A5050880595"],"corresponding_institution_ids":["https://openalex.org/I4210099699","https://openalex.org/I4210136004","https://openalex.org/I63601056"],"apc_list":null,"apc_paid":null,"fwci":0.1012,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.46821289,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":"38","issue":"3","first_page":"2777","last_page":"2788"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9868999719619751,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6941510438919067},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6882358193397522},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.6731570363044739},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5882219076156616},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.46311914920806885},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.445056289434433},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.41835319995880127},{"id":"https://openalex.org/keywords/steganography-tools","display_name":"Steganography tools","score":0.41019296646118164},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.18558630347251892},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.0997302234172821}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6941510438919067},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6882358193397522},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.6731570363044739},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5882219076156616},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.46311914920806885},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.445056289434433},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.41835319995880127},{"id":"https://openalex.org/C13179402","wikidata":"https://www.wikidata.org/wiki/Q7606662","display_name":"Steganography tools","level":4,"score":0.41019296646118164},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.18558630347251892},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0997302234172821}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jifs-179563","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-179563","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1543622922","https://openalex.org/W1594861902","https://openalex.org/W1847738348","https://openalex.org/W1970416050","https://openalex.org/W1984153007","https://openalex.org/W1992496874","https://openalex.org/W1995484676","https://openalex.org/W2005359609","https://openalex.org/W2007326055","https://openalex.org/W2010380519","https://openalex.org/W2024382275","https://openalex.org/W2028197392","https://openalex.org/W2041860486","https://openalex.org/W2053691921","https://openalex.org/W2056515392","https://openalex.org/W2096096425","https://openalex.org/W2111282197","https://openalex.org/W2115483445","https://openalex.org/W2117523387","https://openalex.org/W2129652681","https://openalex.org/W2155487813","https://openalex.org/W2167752453","https://openalex.org/W2327938343","https://openalex.org/W2339234989","https://openalex.org/W2884179402","https://openalex.org/W3209866323","https://openalex.org/W6703703100"],"related_works":["https://openalex.org/W2560172240","https://openalex.org/W3146660591","https://openalex.org/W1995538220","https://openalex.org/W3020816551","https://openalex.org/W2338095724","https://openalex.org/W2804412098","https://openalex.org/W2186632617","https://openalex.org/W2548321233","https://openalex.org/W2188948172","https://openalex.org/W2154118756"],"abstract_inverted_index":{"Image":[0],"steganography":[1,76,149],"provides":[2],"efficient":[3],"techniques":[4],"and":[5,46,51,105,131,174,183,223,236],"methods":[6],"for":[7,136],"embedding":[8],"secure":[9],"data":[10,83],"into":[11],"an":[12],"image.":[13],"Researchers":[14],"face":[15],"many":[16],"challenges":[17,70],"in":[18,84,197],"this":[19,64],"field":[20],"such":[21],"as:":[22],"ensuring":[23,32],"the":[24,27,33,39,43,47,53,60,68,80,91,95,102,106,115,122,145,148,159,184,189,194,198,206,210,214,217,220,224,243,246],"quality":[25],"of":[26,55,82,94,144,172,179,188,212,219,226,245],"stego":[28],"image":[29,49,57,75,104,111,162],"is":[30,36,112,125,134,230,234,249],"adequate,":[31],"hidden":[34,44,61],"message":[35,45,124,222],"secure,":[37],"increasing":[38],"hiding":[40],"capacity,":[41],"recovering":[42],"cover":[48,103,110,161],"losslessy,":[50],"overcoming":[52],"effects":[54],"lossy":[56],"compression":[58],"on":[59],"message.":[62,108],"In":[63],"paper,":[65],"we":[66],"address":[67],"above":[69],"by":[71,204,251],"proposing":[72],"a":[73],"new":[74],"model":[77,97,146,233,248],"to":[78,99,114,164],"ensure":[79],"security":[81,138],"cloud":[85],"storage.":[86],"The":[87,109,141,232],"fundamental":[88],"processes":[89],"within":[90],"base":[92],"level":[93,143],"proposed":[96,247],"are":[98,202],"preprocess":[100],"both":[101],"secret":[107,123,190,207,221],"transformed":[113,160],"wavelet":[116],"domain":[117],"using":[118,127,238],"integer-to-integer":[119],"transform":[120],"while":[121],"compressed":[126],"lossless":[128],"entropy":[129],"coding":[130],"then":[132],"it":[133,154,169],"encrypted":[135,185],"additional":[137],"before":[139],"embedding.":[140],"control":[142],"drives":[147],"process":[150,211],"as":[151],"follows.":[152],"Firstly,":[153],"selects":[155],"significant":[156,181,200,228],"coefficients":[157,182,201,229],"from":[158,176],"according":[163],"some":[165],"threshold":[166],"values.":[167],"Then,":[168],"creates":[170],"groups":[171],"7-bits":[173],"3-bits":[175],"non-lossy":[177,195],"bits":[178,196],"selected":[180,199,227],"bit":[186],"stream":[187],"message,":[191],"respectively.":[192],"Finally,":[193],"updated":[203],"injecting":[205],"bits.":[208],"Through":[209],"steganography,":[213],"consistency":[215],"between":[216],"payload":[218],"number":[225],"checked.":[231],"validated":[235],"verified":[237],"extensive":[239],"real":[240],"experiments.":[241],"Moreover,":[242],"performance":[244],"measured":[250],"comparison":[252],"with":[253],"other":[254],"recent":[255],"models.":[256]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
