{"id":"https://openalex.org/W3154686150","doi":"https://doi.org/10.3233/jifs-189879","title":"ExypnoSteganos - A smarter approach to steganography","display_name":"ExypnoSteganos - A smarter approach to steganography","publication_year":2021,"publication_date":"2021-04-07","ids":{"openalex":"https://openalex.org/W3154686150","doi":"https://doi.org/10.3233/jifs-189879","mag":"3154686150"},"language":"en","primary_location":{"id":"doi:10.3233/jifs-189879","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-189879","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043117941","display_name":"Gaurav Sarraf","orcid":null},"institutions":[{"id":"https://openalex.org/I4210092681","display_name":"Antwerp Management School","ror":"https://ror.org/00hm4a331","country_code":"BE","type":"education","lineage":["https://openalex.org/I149213910","https://openalex.org/I4210092681"]}],"countries":["BE"],"is_corresponding":true,"raw_author_name":"Gaurav Sarraf","raw_affiliation_strings":["Information Science &amp; Engineering, B. M. S. Institute of Technology &amp; Management, Bangalore, India","Information Science & Engineering, B. M. S. Institute of Technology & Management, Bangalore, India"],"affiliations":[{"raw_affiliation_string":"Information Science &amp; Engineering, B. M. S. Institute of Technology &amp; Management, Bangalore, India","institution_ids":["https://openalex.org/I4210092681"]},{"raw_affiliation_string":"Information Science & Engineering, B. M. S. Institute of Technology & Management, Bangalore, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053467334","display_name":"Anirudh Ramesh Srivatsa","orcid":null},"institutions":[{"id":"https://openalex.org/I4210092681","display_name":"Antwerp Management School","ror":"https://ror.org/00hm4a331","country_code":"BE","type":"education","lineage":["https://openalex.org/I149213910","https://openalex.org/I4210092681"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Anirudh Ramesh Srivatsa","raw_affiliation_strings":["Information Science &amp; Engineering, B. M. S. Institute of Technology &amp; Management, Bangalore, India","Information Science & Engineering, B. M. S. Institute of Technology & Management, Bangalore, India"],"affiliations":[{"raw_affiliation_string":"Information Science &amp; Engineering, B. M. S. Institute of Technology &amp; Management, Bangalore, India","institution_ids":["https://openalex.org/I4210092681"]},{"raw_affiliation_string":"Information Science & Engineering, B. M. S. Institute of Technology & Management, Bangalore, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112282742","display_name":"M. Swetha","orcid":null},"institutions":[{"id":"https://openalex.org/I4210092681","display_name":"Antwerp Management School","ror":"https://ror.org/00hm4a331","country_code":"BE","type":"education","lineage":["https://openalex.org/I149213910","https://openalex.org/I4210092681"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"MS Swetha","raw_affiliation_strings":["Information Science &amp; Engineering, B. M. S. Institute of Technology &amp; Management, Bangalore, India","Information Science & Engineering, B. M. S. Institute of Technology & Management, Bangalore, India"],"affiliations":[{"raw_affiliation_string":"Information Science &amp; Engineering, B. M. S. Institute of Technology &amp; Management, Bangalore, India","institution_ids":["https://openalex.org/I4210092681"]},{"raw_affiliation_string":"Information Science & Engineering, B. M. S. Institute of Technology & Management, Bangalore, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5043117941"],"corresponding_institution_ids":["https://openalex.org/I4210092681"],"apc_list":null,"apc_paid":null,"fwci":0.0961,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.35431373,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":"41","issue":"5","first_page":"5595","last_page":"5606"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.9048545360565186},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.848507821559906},{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.779892086982727},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.6213318109512329},{"id":"https://openalex.org/keywords/encode","display_name":"ENCODE","score":0.605412483215332},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.5416240692138672},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4880181849002838},{"id":"https://openalex.org/keywords/steganography-tools","display_name":"Steganography tools","score":0.45246031880378723},{"id":"https://openalex.org/keywords/safer","display_name":"SAFER","score":0.42690831422805786},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.4234466254711151},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.35343626141548157},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3306155502796173},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2953476011753082},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.251200795173645}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.9048545360565186},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.848507821559906},{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.779892086982727},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.6213318109512329},{"id":"https://openalex.org/C66746571","wikidata":"https://www.wikidata.org/wiki/Q1134833","display_name":"ENCODE","level":3,"score":0.605412483215332},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.5416240692138672},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4880181849002838},{"id":"https://openalex.org/C13179402","wikidata":"https://www.wikidata.org/wiki/Q7606662","display_name":"Steganography tools","level":4,"score":0.45246031880378723},{"id":"https://openalex.org/C2776654903","wikidata":"https://www.wikidata.org/wiki/Q2601463","display_name":"SAFER","level":2,"score":0.42690831422805786},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.4234466254711151},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.35343626141548157},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3306155502796173},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2953476011753082},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.251200795173645},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jifs-189879","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-189879","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W154544624","https://openalex.org/W1713630528","https://openalex.org/W2035385859","https://openalex.org/W2046180645","https://openalex.org/W2107420448","https://openalex.org/W2120804545","https://openalex.org/W2128461288","https://openalex.org/W2146763593","https://openalex.org/W2161022751","https://openalex.org/W2180979975","https://openalex.org/W2407561938","https://openalex.org/W2545316382","https://openalex.org/W2548753991","https://openalex.org/W2579318729","https://openalex.org/W2618218947","https://openalex.org/W2621048556","https://openalex.org/W2751202750","https://openalex.org/W2752782242","https://openalex.org/W2963682422","https://openalex.org/W2964121744","https://openalex.org/W2964153729","https://openalex.org/W3018619417","https://openalex.org/W6606318847","https://openalex.org/W6631190155","https://openalex.org/W6634343353","https://openalex.org/W6637162671","https://openalex.org/W6677840641","https://openalex.org/W6679553605","https://openalex.org/W6730109398","https://openalex.org/W6732500996","https://openalex.org/W6743731764"],"related_works":["https://openalex.org/W3202697060","https://openalex.org/W2561659658","https://openalex.org/W2953754633","https://openalex.org/W2507956577","https://openalex.org/W2001809135","https://openalex.org/W2045707760","https://openalex.org/W2170720314","https://openalex.org/W4312890355","https://openalex.org/W2789446168","https://openalex.org/W2045577846"],"abstract_inverted_index":{"With":[0],"the":[1,44,69,117,126,130,142,164],"ever-rising":[2],"threat":[3],"to":[4,42,66,86,92,124,172],"security,":[5],"multiple":[6],"industries":[7],"are":[8],"always":[9],"in":[10,17,46,129,149],"search":[11],"of":[12,71,96,141,146],"safer":[13],"communication":[14],"techniques":[15,136],"both":[16],"rest":[18],"and":[19,38,88],"transit.":[20],"Multiple":[21],"security":[22,28],"institutions":[23],"agree":[24],"that":[25,82,163,179],"any":[26,72,173],"systems":[27],"can":[29,137,156,168],"be":[30,67,157,170],"modeled":[31],"around":[32],"three":[33],"major":[34],"concepts:":[35],"Confidentiality,":[36],"Availability,":[37],"Integrity.":[39],"We":[40,159],"try":[41],"reduce":[43],"holes":[45],"these":[47],"concepts":[48],"by":[49],"developing":[50],"a":[51],"Deep":[52],"Learning":[53],"based":[54],"Steganography":[55],"technique.":[56],"In":[57,76],"our":[58,180],"study,":[59],"we":[60,79,177],"have":[61,80,160],"seen,":[62],"data":[63,90,128],"compression":[64],"has":[65],"at":[68],"heart":[70],"sound":[73],"steganography":[74],"system.":[75],"this":[77],"paper,":[78],"shown":[81,162],"it":[83],"is":[84],"possible":[85],"compress":[87],"encode":[89,138],"efficiently":[91],"solve":[93],"critical":[94],"problems":[95],"steganography.":[97],"The":[98,134],"deep":[99],"learning":[100],"technique,":[101],"which":[102],"comprises":[103],"an":[104],"auto-encoder":[105],"with":[106],"Convolutional":[107],"Neural":[108],"Network":[109],"as":[110,145],"its":[111],"building":[112],"block,":[113],"not":[114],"only":[115],"compresses":[116],"secret":[118,139],"file":[119,132,174],"but":[120],"also":[121,161],"learns":[122],"how":[123],"hide":[125],"compressed":[127],"cover":[131],"efficiently.":[133],"proposed":[135,181],"files":[140,155],"same":[143,165],"size":[144],"cover,":[147],"or":[148],"some":[150],"sporadic":[151],"cases,":[152],"even":[153],"larger":[154],"encoded.":[158],"model":[166],"architecture":[167],"theoretically":[169],"applied":[171],"type.":[175],"Finally,":[176],"show":[178],"technique":[182],"surreptitiously":[183],"evades":[184],"all":[185],"popular":[186],"steganalysis":[187],"techniques.":[188]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2021-04-26T00:00:00"}
