{"id":"https://openalex.org/W4413764604","doi":"https://doi.org/10.32604/cmc.2025.068429","title":"Lightweight Multi-Layered Encryption and Steganography Model for Protecting Secret Messages in MPEG Video Frames","display_name":"Lightweight Multi-Layered Encryption and Steganography Model for Protecting Secret Messages in MPEG Video Frames","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4413764604","doi":"https://doi.org/10.32604/cmc.2025.068429"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.068429","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.068429","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.068429","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Sara H. Elsayed","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Sara H. Elsayed","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008864666","display_name":"Reham M. Abd\u2010Elsalam","orcid":"https://orcid.org/0000-0002-8697-1232"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rodaina Abdelsalam","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114464794","display_name":"Mahmoud A. Ismail Shoman","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mahmoud A. Ismail Shoman","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5104990063","display_name":"Raed Alotaibi","orcid":"https://orcid.org/0000-0002-6961-1155"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Raed Alotaibi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5084004389","display_name":"Omar Reyad","orcid":"https://orcid.org/0000-0003-3479-6986"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Omar Reyad","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20443716,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"85","issue":"3","first_page":"4995","last_page":"5013"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9542999863624573,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8134716749191284},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.735011875629425},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6794975996017456},{"id":"https://openalex.org/keywords/steganography-tools","display_name":"Steganography tools","score":0.5133430361747742},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5025248527526855},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.33741843700408936},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.18730294704437256},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.18367040157318115}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8134716749191284},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.735011875629425},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6794975996017456},{"id":"https://openalex.org/C13179402","wikidata":"https://www.wikidata.org/wiki/Q7606662","display_name":"Steganography tools","level":4,"score":0.5133430361747742},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5025248527526855},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.33741843700408936},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.18730294704437256},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.18367040157318115}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.068429","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.068429","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.068429","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.068429","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W2081326817","https://openalex.org/W2547085574","https://openalex.org/W2793838519","https://openalex.org/W2912078367","https://openalex.org/W2944731310","https://openalex.org/W3005341548","https://openalex.org/W3043193092","https://openalex.org/W3092845162","https://openalex.org/W3119035352","https://openalex.org/W3126604885","https://openalex.org/W3183811773","https://openalex.org/W4285216117","https://openalex.org/W4285807161","https://openalex.org/W4304084325","https://openalex.org/W4304127811","https://openalex.org/W4313180959","https://openalex.org/W4313398979","https://openalex.org/W4313408607","https://openalex.org/W4362466319","https://openalex.org/W4376108162","https://openalex.org/W4380483904","https://openalex.org/W4381327710","https://openalex.org/W4384406928","https://openalex.org/W4387805051","https://openalex.org/W4389624268","https://openalex.org/W4391731460","https://openalex.org/W4392522359","https://openalex.org/W4392752164","https://openalex.org/W4400810011","https://openalex.org/W4401179011","https://openalex.org/W4412769450"],"related_works":["https://openalex.org/W2560172240","https://openalex.org/W3146660591","https://openalex.org/W1995538220","https://openalex.org/W3020816551","https://openalex.org/W2338095724","https://openalex.org/W2804412098","https://openalex.org/W2186632617","https://openalex.org/W2548321233","https://openalex.org/W2188948172","https://openalex.org/W2154118756"],"abstract_inverted_index":{"Ensuring":[0],"the":[1,11,21,50,77,112,117,133,137,142,160,251,259],"secure":[2],"transmission":[3],"of":[4,10,23,86,116,162,184,222],"secret":[5,66,78],"messages,":[6],"particularly":[7],"through":[8],"video\u2014one":[9],"most":[12],"widely":[13],"used":[14],"media":[15],"formats\u2014is":[16],"a":[17,28,42,81,105,122],"critical":[18],"challenge":[19],"in":[20,121,152,182],"field":[22],"information":[24],"security.":[25],"Relying":[26],"on":[27],"single-layered":[29],"security":[30,244],"approach":[31,73],"is":[32,102,129,145,209],"often":[33],"insufficient":[34],"for":[35],"safeguarding":[36],"sensitive":[37],"data.":[38],"This":[39],"study":[40],"proposes":[41],"triple-lightweight":[43],"cryptographic":[44],"and":[45,59,150,157,170,193,199,206,227,255,264],"steganographic":[46],"model":[47],"that":[48,235],"integrates":[49],"Hill":[51],"Cipher":[52],"Technique":[53],"(HCT),":[54],"Rotation":[55],"Left":[56],"Digits":[57],"(RLD),":[58],"Discrete":[60],"Wavelet":[61],"Transform":[62],"(DWT)":[63],"to":[64,92,176,239,246],"embed":[65],"messages":[67],"within":[68],"video":[69,118,134,168,237],"frames":[70,135,208,238,257],"securely.":[71],"The":[72,125,202],"begins":[74],"with":[75,155,159],"encrypting":[76],"text":[79],"using":[80,104,136,147,166,212],"private":[82,107],"key":[83,108,248],"matrix":[84],"(PK1)":[85],"size":[87],"2":[88,90],"\u00d7":[89,94],"up":[91],"6":[93,95],"via":[96],"HCT.":[97],"A":[98],"second":[99],"encryption":[100],"layer":[101],"applied":[103],"dynamic":[106],"(PK2)":[109],"derived":[110],"from":[111,174],"RGB":[113],"pixel":[114],"values":[115],"frame,":[119],"resulting":[120],"rotated":[123],"cipher.":[124],"doubly":[126],"encrypted":[127,200],"message":[128,144,171],"then":[130,158],"embedded":[131],"into":[132],"DWT":[138,149],"method.":[139],"Upon":[140],"transmission,":[141],"concealed":[143],"extracted":[146],"inverse":[148,161],"decrypted":[151],"two":[153],"steps\u2014first":[154],"PK2":[156,241],"PK1.":[163],"Experiments":[164],"conducted":[165],"MPEG":[167],"sequences":[169],"lengths":[172],"ranging":[173],"10":[175],"300":[177],"bytes":[178],"demonstrate":[179],"strong":[180],"performance":[181],"terms":[183],"Mean":[185,217],"Square":[186],"Error":[187,219],"(MSE),":[188],"Peak":[189],"Signal-to-Noise":[190],"Ratio":[191],"(PSNR),":[192],"Correlation":[194],"Coefficient":[195],"(CC)":[196],"between":[197,204,253],"original":[198,205,254],"messages.":[201],"similarity":[203],"stego":[207,256],"further":[210],"validated":[211],"Structural":[213],"Similarity":[214],"Index":[215],"(SSIM),":[216],"Absolute":[218],"(MAE),":[220],"Number":[221],"Pixel":[223],"Change":[224],"Rate":[225],"(NPCR),":[226],"Unified":[228],"Average":[229],"Changing":[230],"Intensity":[231],"(UACI).":[232],"Results":[233],"confirm":[234],"utilizing":[236],"generate":[240],"offers":[242],"superior":[243],"compared":[245],"static":[247],"images.":[249],"Moreover,":[250],"indistinguishability":[252],"highlights":[258],"method\u2019s":[260],"robustness":[261],"against":[262],"visual":[263],"statistical":[265],"attacks.":[266]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
