{"id":"https://openalex.org/W3144940835","doi":"https://doi.org/10.4018/ijisp.2021040101","title":"An Improved Separable and Reversible Steganography in Encrypted Grayscale Images","display_name":"An Improved Separable and Reversible Steganography in Encrypted Grayscale Images","publication_year":2021,"publication_date":"2021-04-01","ids":{"openalex":"https://openalex.org/W3144940835","doi":"https://doi.org/10.4018/ijisp.2021040101","mag":"3144940835"},"language":"en","primary_location":{"id":"doi:10.4018/ijisp.2021040101","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijisp.2021040101","pdf_url":null,"source":{"id":"https://openalex.org/S191782446","display_name":"International Journal of Information Security and Privacy","issn_l":"1930-1650","issn":["1930-1650","1930-1669"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security and Privacy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041465384","display_name":"Manisha Duevedi","orcid":null},"institutions":[{"id":"https://openalex.org/I110166357","display_name":"University of Delhi","ror":"https://ror.org/04gzb2213","country_code":"IN","type":"education","lineage":["https://openalex.org/I110166357"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Manisha Duevedi","raw_affiliation_strings":["University of Delhi, India"],"affiliations":[{"raw_affiliation_string":"University of Delhi, India","institution_ids":["https://openalex.org/I110166357"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061752090","display_name":"Sunil Kumar Muttoo","orcid":"https://orcid.org/0000-0001-6450-9592"},"institutions":[{"id":"https://openalex.org/I110166357","display_name":"University of Delhi","ror":"https://ror.org/04gzb2213","country_code":"IN","type":"education","lineage":["https://openalex.org/I110166357"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sunil Kumar Muttoo","raw_affiliation_strings":["University of Delhi, India"],"affiliations":[{"raw_affiliation_string":"University of Delhi, India","institution_ids":["https://openalex.org/I110166357"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5041465384"],"corresponding_institution_ids":["https://openalex.org/I110166357"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.03091503,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"15","issue":"2","first_page":"1","last_page":"28"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.9884999990463257,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8852699995040894},{"id":"https://openalex.org/keywords/grayscale","display_name":"Grayscale","score":0.7693570256233215},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7294235825538635},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.7278987169265747},{"id":"https://openalex.org/keywords/homomorphism","display_name":"Homomorphism","score":0.7187765836715698},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5822706818580627},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.5236784815788269},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.5197479724884033},{"id":"https://openalex.org/keywords/separable-space","display_name":"Separable space","score":0.45873701572418213},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.39817219972610474},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.35001838207244873},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.32984036207199097},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.244841068983078},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12383347749710083},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.11406981945037842}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8852699995040894},{"id":"https://openalex.org/C78201319","wikidata":"https://www.wikidata.org/wiki/Q685727","display_name":"Grayscale","level":3,"score":0.7693570256233215},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7294235825538635},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.7278987169265747},{"id":"https://openalex.org/C4042151","wikidata":"https://www.wikidata.org/wiki/Q215111","display_name":"Homomorphism","level":2,"score":0.7187765836715698},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5822706818580627},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.5236784815788269},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.5197479724884033},{"id":"https://openalex.org/C70710897","wikidata":"https://www.wikidata.org/wiki/Q680081","display_name":"Separable space","level":2,"score":0.45873701572418213},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.39817219972610474},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.35001838207244873},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.32984036207199097},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.244841068983078},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12383347749710083},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.11406981945037842},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/ijisp.2021040101","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijisp.2021040101","pdf_url":null,"source":{"id":"https://openalex.org/S191782446","display_name":"International Journal of Information Security and Privacy","issn_l":"1930-1650","issn":["1930-1650","1930-1669"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security and Privacy","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jisp00:v:15:y:2021:i:2:p:1-28","is_oa":false,"landing_page_url":"https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJISP.2021040101","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W745149532","https://openalex.org/W1966371408","https://openalex.org/W1978248473","https://openalex.org/W1990962661","https://openalex.org/W2038917571","https://openalex.org/W2039326923","https://openalex.org/W2049558423","https://openalex.org/W2056340285","https://openalex.org/W2056515392","https://openalex.org/W2057395793","https://openalex.org/W2070482985","https://openalex.org/W2075965608","https://openalex.org/W2078607543","https://openalex.org/W2079174845","https://openalex.org/W2121393355","https://openalex.org/W2134823205","https://openalex.org/W2135459805","https://openalex.org/W2152185406","https://openalex.org/W2158986121","https://openalex.org/W2170269447","https://openalex.org/W2586175702","https://openalex.org/W2611290438","https://openalex.org/W2758029476","https://openalex.org/W2799610375","https://openalex.org/W2808474579","https://openalex.org/W2899732343","https://openalex.org/W2900141423","https://openalex.org/W3209866323"],"related_works":["https://openalex.org/W4308159138","https://openalex.org/W1979798674","https://openalex.org/W3169947911","https://openalex.org/W4327811209","https://openalex.org/W3037616202","https://openalex.org/W2963079901","https://openalex.org/W115686965","https://openalex.org/W390508480","https://openalex.org/W3190769222","https://openalex.org/W2769668853"],"abstract_inverted_index":{"Reversible":[0],"data":[1,107],"hiding":[2],"in":[3,85,95,103,110],"encrypted":[4,39,81,97,112],"images":[5],"(RDH-EI)":[6],"has":[7],"attracted":[8],"various":[9],"communities":[10],"that":[11,20,32,89,102],"deal":[12],"with":[13],"security.":[14,124],"Xiao":[15,154],"et":[16,155],"al.":[17,156],"presented":[18],"RDH-EI":[19],"uses":[21],"pixel":[22],"value":[23],"ordering":[24],"(PVO)":[25],"and":[26,38,138],"additive":[27,120],"homomorphism":[28,121],"for":[29],"encryption":[30],"ensuring":[31,88],"the":[33,45,59,64,90,134,143,151],"embedding":[34,61,136,140],"capacity":[35,141],"of":[36,47,92,142,153],"plain":[37,104],"image":[40,79,116,144],"remains":[41],"relatively":[42],"same.":[43],"However,":[44],"size":[46],"location":[48,147],"map":[49,148],"required":[50],"to":[51,101,122],"manage":[52],"over/under":[53],"flow":[54],"blocks":[55],"increased":[56],"drastically":[57],"reducing":[58,146],"overall":[60],"capacity.":[62],"In":[63],"paper,":[65],"a":[66],"new":[67],"PVO-based":[68],"separable":[69],"RDH":[70],"scheme":[71,127],"is":[72,80,99,108,117,128],"proposed":[73,126],"using":[74,82,119],"double":[75],"encryption.":[76],"The":[77,114,125],"original":[78],"chaotic":[83],"mapping":[84],"Phase":[86],"1,":[87],"performance":[91],"PVO":[93],"algorithm":[94],"an":[96],"domain":[98],"similar":[100],"domain.":[105],"Secret":[106],"embedded":[109,115],"this":[111],"image.":[113],"re-encrypted":[118],"enhance":[123],"more":[129],"efficient":[130],"as":[131],"it":[132],"improves":[133],"pure":[135],"rate":[137],"total":[139],"by":[145],"size,":[149],"overcoming":[150],"drawback":[152]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
