{"id":"https://openalex.org/W4410869068","doi":"https://doi.org/10.32604/cmc.2025.061246","title":"FuzzyStego: An Adaptive Steganographic Scheme Using Fuzzy Logic for Optimizing Embeddable Areas in Spatial Domain Images","display_name":"FuzzyStego: An Adaptive Steganographic Scheme Using Fuzzy Logic for Optimizing Embeddable Areas in Spatial Domain Images","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4410869068","doi":"https://doi.org/10.32604/cmc.2025.061246"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.061246","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.061246","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.061246","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5117763317","display_name":"Mardhatillah Shevy Ananti","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Mardhatillah Shevy Ananti","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5094024647","display_name":"Adifa Widyadhani Chanda D\u2019Layla","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Adifa Widyadhani Chanda D\u2019Layla","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Ntivuguruzwa Jean De La Croix","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ntivuguruzwa Jean De La Croix","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5075903779","display_name":"Tohari Ahmad","orcid":"https://orcid.org/0000-0002-3390-0756"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tohari Ahmad","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5117763317"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.5483,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.92782973,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"84","issue":"1","first_page":"1031","last_page":"1054"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9911999702453613,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.7632490992546082},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.7203313708305359},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.604642391204834},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5750041007995605},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.5527464747428894},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4633197486400604},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.45227864384651184},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.37727874517440796},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3586794137954712},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.24555835127830505}],"concepts":[{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.7632490992546082},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.7203313708305359},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.604642391204834},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5750041007995605},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.5527464747428894},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4633197486400604},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.45227864384651184},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.37727874517440796},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3586794137954712},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.24555835127830505},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.061246","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.061246","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.061246","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.061246","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W22271197","https://openalex.org/W2135459805","https://openalex.org/W2799921164","https://openalex.org/W2805885446","https://openalex.org/W2924553066","https://openalex.org/W2941480044","https://openalex.org/W2969519104","https://openalex.org/W2995861917","https://openalex.org/W3091624343","https://openalex.org/W3124809916","https://openalex.org/W3135559657","https://openalex.org/W3143958285","https://openalex.org/W3167657925","https://openalex.org/W4280611429","https://openalex.org/W4288458148","https://openalex.org/W4316660898","https://openalex.org/W4320168171","https://openalex.org/W4379356282","https://openalex.org/W4382405050","https://openalex.org/W4386351659","https://openalex.org/W4388819953","https://openalex.org/W4388888590","https://openalex.org/W4390422336","https://openalex.org/W4392976075","https://openalex.org/W4399365500"],"related_works":["https://openalex.org/W2521839693","https://openalex.org/W2969135852","https://openalex.org/W2188948172","https://openalex.org/W2153696906","https://openalex.org/W38533693","https://openalex.org/W2892069487","https://openalex.org/W2741842698","https://openalex.org/W1760333999","https://openalex.org/W2265739152","https://openalex.org/W2094307307"],"abstract_inverted_index":{"In":[0,52,110],"the":[1,14,42,46,49,53,61,66,77,93,99,102,106,113,175,181],"evolving":[2],"landscape":[3],"of":[4,16,37,48,60,80,101,115,196,207],"secure":[5,13],"communication,":[6],"steganography":[7],"has":[8],"become":[9],"increasingly":[10],"vital":[11],"to":[12,76,91,138,148,180,214],"transmission":[15],"secret":[17],"data":[18,169,220],"through":[19],"an":[20,190],"insecure":[21],"public":[22],"network.":[23],"Several":[24],"steganographic":[25,55],"algorithms":[26],"have":[27],"been":[28],"proposed":[29],"using":[30],"digital":[31],"images":[32],"with":[33,112],"a":[34,39,57,87,201],"common":[35],"objective":[36],"balancing":[38],"trade-off":[40],"between":[41],"payload":[43,67,103],"size":[44,68,104],"and":[45,126,141,162,200],"quality":[47,96,135,217],"stego":[50,62,94,107],"image.":[51],"existing":[54,73],"works,":[56],"remarkable":[58],"distortion":[59],"image":[63,134,216],"persists":[64],"when":[65],"is":[69],"increased,":[70],"making":[71],"several":[72],"works":[74],"impractical":[75],"current":[78],"world":[79],"vast":[81],"data.":[82],"This":[83,165],"paper":[84],"introduces":[85],"FuzzyStego,":[86],"novel":[88],"approach":[89],"designed":[90],"enhance":[92],"image\u2019s":[95,108],"by":[97,173],"minimizing":[98,171],"effect":[100],"on":[105],"quality.":[109],"line":[111],"limitations":[114],"traditional":[116],"methods":[117],"like":[118],"Pixel":[119],"Value":[120],"Differencing":[121],"(PVD),":[122],"Transform":[123],"Domain":[124],"Techniques,":[125],"Least":[127],"Significant":[128],"Bit":[129],"(LSB)":[130],"insertion,":[131],"such":[132],"as":[133],"degradation,":[136],"vulnerability":[137],"processing":[139],"attacks,":[140],"restricted":[142],"capacity,":[143],"FuzzyStego":[144,188],"utilizes":[145],"fuzzy":[146],"logic":[147],"categorize":[149],"pixels":[150],"into":[151],"intensity":[152,182],"levels:":[153],"Low":[154],"(L),":[155],"Medium-Low":[156],"(ML),":[157],"Medium":[158],"(M),":[159],"Medium-High":[160],"(MH),":[161],"High":[163],"(H).":[164],"classification":[166],"enables":[167],"adaptive":[168],"embedding,":[170],"detectability":[172],"adjusting":[174],"hidden":[176],"bit":[177],"count":[178],"according":[179],"levels.":[183],"Experimental":[184],"results":[185],"show":[186],"that":[187],"achieves":[189],"average":[191],"Peak":[192],"Signal-to-Noise":[193],"Ratio":[194],"(PSNR)":[195],"58.638":[197],"decibels":[198],"(dB)":[199],"Structural":[202],"Similarity":[203],"Index":[204],"Measure":[205],"(SSIM)":[206],"almost":[208],"1.00,":[209],"demonstrating":[210],"its":[211],"promising":[212],"capability":[213],"preserve":[215],"while":[218],"embedding":[219],"effectively.":[221]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
