{"id":"https://openalex.org/W3172692100","doi":"https://doi.org/10.4018/ijisp.2021070104","title":"A New Combinational Technique in Image Steganography","display_name":"A New Combinational Technique in Image Steganography","publication_year":2021,"publication_date":"2021-06-07","ids":{"openalex":"https://openalex.org/W3172692100","doi":"https://doi.org/10.4018/ijisp.2021070104","mag":"3172692100"},"language":"en","primary_location":{"id":"doi:10.4018/ijisp.2021070104","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijisp.2021070104","pdf_url":null,"source":{"id":"https://openalex.org/S191782446","display_name":"International Journal of Information Security and Privacy","issn_l":"1930-1650","issn":["1930-1650","1930-1669"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security and Privacy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086156136","display_name":"Sabyasachi Pramanik","orcid":"https://orcid.org/0000-0002-9431-8751"},"institutions":[{"id":"https://openalex.org/I175399479","display_name":"Haldia Institute of Technology","ror":"https://ror.org/0211bs523","country_code":"IN","type":"education","lineage":["https://openalex.org/I175399479"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Sabyasachi Pramanik","raw_affiliation_strings":["Haldia Institute of Technology, India"],"affiliations":[{"raw_affiliation_string":"Haldia Institute of Technology, India","institution_ids":["https://openalex.org/I175399479"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027099057","display_name":"Debabrata Samanta","orcid":"https://orcid.org/0000-0003-4118-2480"},"institutions":[{"id":"https://openalex.org/I48018076","display_name":"Christ University","ror":"https://ror.org/022tv9y30","country_code":"IN","type":"education","lineage":["https://openalex.org/I48018076"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Debabrata Samanta","raw_affiliation_strings":["CHRIST University, India"],"affiliations":[{"raw_affiliation_string":"CHRIST University, India","institution_ids":["https://openalex.org/I48018076"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079993367","display_name":"Samir Kumar Bandyopadhyay","orcid":"https://orcid.org/0000-0002-4868-3459"},"institutions":[{"id":"https://openalex.org/I106542073","display_name":"University of Calcutta","ror":"https://ror.org/01e7v7w47","country_code":"IN","type":"education","lineage":["https://openalex.org/I106542073"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Samir Kumar Bandyopadhyay","raw_affiliation_strings":["University of Calcutta, India"],"affiliations":[{"raw_affiliation_string":"University of Calcutta, India","institution_ids":["https://openalex.org/I106542073"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103195623","display_name":"Ramkrishna Ghosh","orcid":"https://orcid.org/0000-0002-1951-7873"},"institutions":[{"id":"https://openalex.org/I175399479","display_name":"Haldia Institute of Technology","ror":"https://ror.org/0211bs523","country_code":"IN","type":"education","lineage":["https://openalex.org/I175399479"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ramkrishna Ghosh","raw_affiliation_strings":["Haldia Institute of Technology, India"],"affiliations":[{"raw_affiliation_string":"Haldia Institute of Technology, India","institution_ids":["https://openalex.org/I175399479"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5086156136"],"corresponding_institution_ids":["https://openalex.org/I175399479"],"apc_list":null,"apc_paid":null,"fwci":2.3056,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.90181373,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"15","issue":"3","first_page":"48","last_page":"64"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10901","display_name":"Advanced Data Compression Techniques","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.9037689566612244},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.7671518325805664},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.753334105014801},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5714998841285706},{"id":"https://openalex.org/keywords/particle-swarm-optimization","display_name":"Particle swarm optimization","score":0.5289354920387268},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.426038920879364},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.39494889974594116},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3263748288154602},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3258236050605774},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3201866149902344},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.16909196972846985}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.9037689566612244},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.7671518325805664},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.753334105014801},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5714998841285706},{"id":"https://openalex.org/C85617194","wikidata":"https://www.wikidata.org/wiki/Q2072794","display_name":"Particle swarm optimization","level":2,"score":0.5289354920387268},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.426038920879364},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.39494889974594116},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3263748288154602},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3258236050605774},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3201866149902344},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16909196972846985},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/ijisp.2021070104","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijisp.2021070104","pdf_url":null,"source":{"id":"https://openalex.org/S191782446","display_name":"International Journal of Information Security and Privacy","issn_l":"1930-1650","issn":["1930-1650","1930-1669"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security and Privacy","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jisp00:v:15:y:2021:i:3:p:48-64","is_oa":false,"landing_page_url":"https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJISP.2021070104","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W197347341","https://openalex.org/W1866874916","https://openalex.org/W2562575049","https://openalex.org/W2591836065","https://openalex.org/W2726476877","https://openalex.org/W2772473105","https://openalex.org/W2788928653","https://openalex.org/W2981326439","https://openalex.org/W3004653829","https://openalex.org/W3005608597","https://openalex.org/W3016507603","https://openalex.org/W3021470291","https://openalex.org/W3022342523","https://openalex.org/W3044391109","https://openalex.org/W3055851871","https://openalex.org/W3088674256","https://openalex.org/W3112950584"],"related_works":["https://openalex.org/W2969135852","https://openalex.org/W2188948172","https://openalex.org/W38533693","https://openalex.org/W2989873089","https://openalex.org/W2809100332","https://openalex.org/W2299048436","https://openalex.org/W2929936941","https://openalex.org/W2187477311","https://openalex.org/W2375981391","https://openalex.org/W2361408597"],"abstract_inverted_index":{"Internet":[0],"is":[1,8,117],"used":[2],"for":[3,120,128],"exchanging":[4],"information.":[5],"Sometimes":[6],"it":[7,126],"needed":[9],"to":[10,22,55,66,79,101,131],"transmit":[11,102],"confidential":[12,24,103,121,134],"data":[13,25,104,122],"via":[14,105],"internet.":[15],"Here":[16],"the":[17,32,36,57,68,129,133],"authors":[18],"use":[19,53,64],"image":[20,74,84,96,107,115],"steganography":[21,97,116],"pass":[23],"within":[26],"a":[27,81,86],"cover":[28,61,73,106],"image.":[29,62,110],"To":[30],"construct":[31],"algorithm,":[33],"they":[34],"take":[35,56],"combinational":[37,112],"help":[38],"of":[39,60,72,88,95,114],"particle":[40],"swarm":[41],"optimization":[42],"(PSO),":[43],"bi-orthogonal":[44],"wavelet":[45],"transform":[46],"(BWT),":[47],"and":[48,75,124],"genetic":[49],"algorithm":[50],"(GA).":[51],"They":[52,63],"PSO":[54],"enhanced":[58],"version":[59],"BWT":[65],"choose":[67],"selective":[69],"sub":[70],"bands":[71],"we":[76],"utilize":[77],"GA":[78],"select":[80],"particular":[82],"stego":[83,89,109],"among":[85],"set":[87],"images.":[90],"Thus,":[91],"an":[92],"innovative":[93],"technique":[94],"has":[98],"been":[99],"made":[100],"generating":[108],"This":[111],"approach":[113],"quite":[118],"safe":[119],"transmission":[123],"makes":[125],"hard":[127],"attackers":[130],"retrieve":[132],"data.":[135]},"counts_by_year":[{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":9}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
