{"id":"https://openalex.org/W2892532484","doi":"https://doi.org/10.4018/ijdcf.2019010109","title":"Breaking Steganography","display_name":"Breaking Steganography","publication_year":2018,"publication_date":"2018-10-11","ids":{"openalex":"https://openalex.org/W2892532484","doi":"https://doi.org/10.4018/ijdcf.2019010109","mag":"2892532484"},"language":"en","primary_location":{"id":"doi:10.4018/ijdcf.2019010109","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijdcf.2019010109","pdf_url":null,"source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Digital Crime and Forensics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054324316","display_name":"Zhenxing Qian","orcid":"https://orcid.org/0000-0003-1622-0561"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhenxing Qian","raw_affiliation_strings":["School of Computer Science, Fudan University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004865399","display_name":"Zichi Wang","orcid":"https://orcid.org/0000-0003-0283-5338"},"institutions":[{"id":"https://openalex.org/I113940042","display_name":"Shanghai University","ror":"https://ror.org/006teas31","country_code":"CN","type":"education","lineage":["https://openalex.org/I113940042"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zichi Wang","raw_affiliation_strings":["Shanghai Institute for Advanced Communication and Data Science, Key Laboratory of Specialty Fiber Optics and Optical Access Networks, Joint International Research Laboratory of Specialty Fiber Optics and Advanced Communication, Shanghai University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Institute for Advanced Communication and Data Science, Key Laboratory of Specialty Fiber Optics and Optical Access Networks, Joint International Research Laboratory of Specialty Fiber Optics and Advanced Communication, Shanghai University, Shanghai, China","institution_ids":["https://openalex.org/I113940042"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071724015","display_name":"Xinpeng Zhang","orcid":"https://orcid.org/0000-0001-5867-1315"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinpeng Zhang","raw_affiliation_strings":["School of Computer Science, Fudan University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043596876","display_name":"Guorui Feng","orcid":"https://orcid.org/0000-0001-8249-2608"},"institutions":[{"id":"https://openalex.org/I113940042","display_name":"Shanghai University","ror":"https://ror.org/006teas31","country_code":"CN","type":"education","lineage":["https://openalex.org/I113940042"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guorui Feng","raw_affiliation_strings":["School of Communication and Information Engineering, Shanghai University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Communication and Information Engineering, Shanghai University, Shanghai, China","institution_ids":["https://openalex.org/I113940042"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5054324316"],"corresponding_institution_ids":["https://openalex.org/I24943067"],"apc_list":null,"apc_paid":null,"fwci":0.533,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.71697338,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"11","issue":"1","first_page":"114","last_page":"125"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.9587113857269287},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.9000856876373291},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8166722059249878},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.6311010718345642},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.6132673025131226},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.5936561822891235},{"id":"https://openalex.org/keywords/distortion","display_name":"Distortion (music)","score":0.5845009088516235},{"id":"https://openalex.org/keywords/economic-shortage","display_name":"Economic shortage","score":0.4972517788410187},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4907747209072113},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4608665406703949},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.43696504831314087},{"id":"https://openalex.org/keywords/steganography-tools","display_name":"Steganography tools","score":0.4176258444786072},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3667248487472534},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.33186155557632446},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.12865066528320312}],"concepts":[{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.9587113857269287},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.9000856876373291},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8166722059249878},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.6311010718345642},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.6132673025131226},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.5936561822891235},{"id":"https://openalex.org/C126780896","wikidata":"https://www.wikidata.org/wiki/Q899871","display_name":"Distortion (music)","level":4,"score":0.5845009088516235},{"id":"https://openalex.org/C194051981","wikidata":"https://www.wikidata.org/wiki/Q1337691","display_name":"Economic shortage","level":3,"score":0.4972517788410187},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4907747209072113},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4608665406703949},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.43696504831314087},{"id":"https://openalex.org/C13179402","wikidata":"https://www.wikidata.org/wiki/Q7606662","display_name":"Steganography tools","level":4,"score":0.4176258444786072},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3667248487472534},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.33186155557632446},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.12865066528320312},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.0},{"id":"https://openalex.org/C194257627","wikidata":"https://www.wikidata.org/wiki/Q211554","display_name":"Amplifier","level":3,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.4018/ijdcf.2019010109","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijdcf.2019010109","pdf_url":null,"source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Digital Crime and Forensics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W22271197","https://openalex.org/W1490898761","https://openalex.org/W1663899164","https://openalex.org/W1973466159","https://openalex.org/W1976570511","https://openalex.org/W2009130368","https://openalex.org/W2010380519","https://openalex.org/W2015721798","https://openalex.org/W2055335989","https://openalex.org/W2055625960","https://openalex.org/W2104705565","https://openalex.org/W2118296934","https://openalex.org/W2123170991","https://openalex.org/W2124664712","https://openalex.org/W2133665775","https://openalex.org/W2134527668","https://openalex.org/W2154026545","https://openalex.org/W2159269332","https://openalex.org/W2170269447","https://openalex.org/W2277839806","https://openalex.org/W2339370745","https://openalex.org/W2418139591","https://openalex.org/W2508768807","https://openalex.org/W2538511122","https://openalex.org/W2542290803","https://openalex.org/W2556529708","https://openalex.org/W2602492243","https://openalex.org/W3209866323"],"related_works":["https://openalex.org/W2154118756","https://openalex.org/W129330134","https://openalex.org/W1965991389","https://openalex.org/W2166431153","https://openalex.org/W2158736088","https://openalex.org/W1659544335","https://openalex.org/W2370747589","https://openalex.org/W1974279004","https://openalex.org/W1716757876","https://openalex.org/W2093508258"],"abstract_inverted_index":{"This":[0],"article":[1],"describes":[2],"how":[3],"to":[4,20,33,63,80],"overcome":[5],"the":[6,39,51,65,75,85,104,119],"shortage":[7],"of":[8,50,53,67,84,107,122],"steganalysis":[9,28,54],"for":[10,55],"small":[11,56],"capacity-based":[12],"embedding.":[13],"A":[14],"slight":[15,59,98],"modification":[16],"method":[17],"is":[18,46,111,124],"proposed":[19,92],"break":[21,64],"steganography.":[22],"For":[23,38],"a":[24,35,91],"given":[25],"image,":[26],"traditional":[27],"methods":[29],"are":[30,61,72],"first":[31],"used":[32],"achieve":[34],"preliminary":[36],"result.":[37],"\u201cclear\u201d":[40],"image":[41],"judged":[42],"by":[43],"steganalysis,":[44],"it":[45],"still":[47],"suspicious":[48],"because":[49],"incompleteness":[52],"capacity.":[57],"Thus,":[58],"modifications":[60,71],"made":[62,73],"possibility":[66],"covert":[68,120],"communication.":[69],"The":[70],"on":[74],"locations":[76],"with":[77],"minimal":[78],"distortion":[79,93],"guarantee":[81],"high":[82],"quality":[83],"modified":[86],"image.":[87],"To":[88],"this":[89],"end,":[90],"minimization":[94],"based":[95],"algorithm":[96],"using":[97],"modification.":[99],"Experimental":[100],"results":[101],"show":[102],"that":[103,118],"error":[105],"rate":[106],"secret":[108],"data":[109],"extraction":[110],"around":[112],"50%":[113],"after":[114],"implementation,":[115],"which":[116],"indicates":[117],"communication":[121],"steganography":[123],"destroyed":[125],"completely.":[126]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3}],"updated_date":"2026-04-03T22:45:19.894376","created_date":"2025-10-10T00:00:00"}
