Digital Steganography : A Comprehensive Study on Various Methods for Hiding Secret Data in a Cover file Article Swipe
YOU?
·
· 2024
· Open Access
·
· DOI: https://doi.org/10.32628/cseit24103107
This research paper offers an in-depth examination of digital steganography, with a focus on the diverse methodologies utilized for embedding secret data within cover files. Steganography, the practice of concealing information within other non-secret data, ensures the hidden message remains undetectable to unauthorized observers. This study systematically reviews both traditional and modern steganographic techniques, dissecting their fundamental mechanisms, advantages, and weaknesses. Techniques explored include Least Significant Bit (LSB) insertion, discrete cosine transform (DCT), discrete wavelet transform (DWT), and innovative methods leveraging deep learning and adaptive algorithms. Each method is assessed for its imperceptibility, robustness, and data capacity, offering a comparative analysis to underscore their respective practical applications and limitations. Additionally, the paper delves into steganalysis—methods for detecting hidden information—to provide a comprehensive perspective on the field. Through experimental evaluation and theoretical analysis, this study seeks to enhance the understanding of digital steganography, presenting insights that could inform future research and the development of more secure data hiding techniques.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.32628/cseit24103107
- https://ijsrcseit.com/index.php/home/article/download/CSEIT24103107/CSEIT24103107
- OA Status
- diamond
- References
- 11
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4398141762
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4398141762Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.32628/cseit24103107Digital Object Identifier
- Title
-
Digital Steganography : A Comprehensive Study on Various Methods for Hiding Secret Data in a Cover fileWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2024Year of publication
- Publication date
-
2024-05-19Full publication date if available
- Authors
-
Asoke Nath, Sankar Das, Rahul Sharma, Subhajit Mandal, Hardick SadhuList of authors in order
- Landing page
-
https://doi.org/10.32628/cseit24103107Publisher landing page
- PDF URL
-
https://ijsrcseit.com/index.php/home/article/download/CSEIT24103107/CSEIT24103107Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
diamondOpen access status per OpenAlex
- OA URL
-
https://ijsrcseit.com/index.php/home/article/download/CSEIT24103107/CSEIT24103107Direct OA link when available
- Concepts
-
Steganography, Cover (algebra), Information hiding, Computer science, Steganography tools, Computer security, Artificial intelligence, Engineering, Embedding, Mechanical engineeringTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
11Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4398141762 |
|---|---|
| doi | https://doi.org/10.32628/cseit24103107 |
| ids.doi | https://doi.org/10.32628/cseit24103107 |
| ids.openalex | https://openalex.org/W4398141762 |
| fwci | 0.0 |
| type | article |
| title | Digital Steganography : A Comprehensive Study on Various Methods for Hiding Secret Data in a Cover file |
| biblio.issue | 3 |
| biblio.volume | 10 |
| biblio.last_page | 300 |
| biblio.first_page | 291 |
| topics[0].id | https://openalex.org/T10388 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 1.0 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1707 |
| topics[0].subfield.display_name | Computer Vision and Pattern Recognition |
| topics[0].display_name | Advanced Steganography and Watermarking Techniques |
| topics[1].id | https://openalex.org/T11017 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9988999962806702 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1707 |
| topics[1].subfield.display_name | Computer Vision and Pattern Recognition |
| topics[1].display_name | Chaos-based Image/Signal Encryption |
| topics[2].id | https://openalex.org/T12357 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9900000095367432 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1707 |
| topics[2].subfield.display_name | Computer Vision and Pattern Recognition |
| topics[2].display_name | Digital Media Forensic Detection |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C108801101 |
| concepts[0].level | 3 |
| concepts[0].score | 0.9574716091156006 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q15032 |
| concepts[0].display_name | Steganography |
| concepts[1].id | https://openalex.org/C2780428219 |
| concepts[1].level | 2 |
| concepts[1].score | 0.8545331358909607 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q16952335 |
| concepts[1].display_name | Cover (algebra) |
| concepts[2].id | https://openalex.org/C3073032 |
| concepts[2].level | 3 |
| concepts[2].score | 0.7677032947540283 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q15912075 |
| concepts[2].display_name | Information hiding |
| concepts[3].id | https://openalex.org/C41008148 |
| concepts[3].level | 0 |
| concepts[3].score | 0.6445808410644531 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[3].display_name | Computer science |
| concepts[4].id | https://openalex.org/C13179402 |
| concepts[4].level | 4 |
| concepts[4].score | 0.629892885684967 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q7606662 |
| concepts[4].display_name | Steganography tools |
| concepts[5].id | https://openalex.org/C38652104 |
| concepts[5].level | 1 |
| concepts[5].score | 0.5196484327316284 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[5].display_name | Computer security |
| concepts[6].id | https://openalex.org/C154945302 |
| concepts[6].level | 1 |
| concepts[6].score | 0.18261122703552246 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[6].display_name | Artificial intelligence |
| concepts[7].id | https://openalex.org/C127413603 |
| concepts[7].level | 0 |
| concepts[7].score | 0.13043621182441711 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q11023 |
| concepts[7].display_name | Engineering |
| concepts[8].id | https://openalex.org/C41608201 |
| concepts[8].level | 2 |
| concepts[8].score | 0.12626862525939941 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q980509 |
| concepts[8].display_name | Embedding |
| concepts[9].id | https://openalex.org/C78519656 |
| concepts[9].level | 1 |
| concepts[9].score | 0.0 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q101333 |
| concepts[9].display_name | Mechanical engineering |
| keywords[0].id | https://openalex.org/keywords/steganography |
| keywords[0].score | 0.9574716091156006 |
| keywords[0].display_name | Steganography |
| keywords[1].id | https://openalex.org/keywords/cover |
| keywords[1].score | 0.8545331358909607 |
| keywords[1].display_name | Cover (algebra) |
| keywords[2].id | https://openalex.org/keywords/information-hiding |
| keywords[2].score | 0.7677032947540283 |
| keywords[2].display_name | Information hiding |
| keywords[3].id | https://openalex.org/keywords/computer-science |
| keywords[3].score | 0.6445808410644531 |
| keywords[3].display_name | Computer science |
| keywords[4].id | https://openalex.org/keywords/steganography-tools |
| keywords[4].score | 0.629892885684967 |
| keywords[4].display_name | Steganography tools |
| keywords[5].id | https://openalex.org/keywords/computer-security |
| keywords[5].score | 0.5196484327316284 |
| keywords[5].display_name | Computer security |
| keywords[6].id | https://openalex.org/keywords/artificial-intelligence |
| keywords[6].score | 0.18261122703552246 |
| keywords[6].display_name | Artificial intelligence |
| keywords[7].id | https://openalex.org/keywords/engineering |
| keywords[7].score | 0.13043621182441711 |
| keywords[7].display_name | Engineering |
| keywords[8].id | https://openalex.org/keywords/embedding |
| keywords[8].score | 0.12626862525939941 |
| keywords[8].display_name | Embedding |
| language | en |
| locations[0].id | doi:10.32628/cseit24103107 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4210200847 |
| locations[0].source.issn | 2456-3307 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 2456-3307 |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | International Journal of Scientific Research in Computer Science Engineering and Information Technology |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://ijsrcseit.com/index.php/home/article/download/CSEIT24103107/CSEIT24103107 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | International Journal of Scientific Research in Computer Science, Engineering and Information Technology |
| locations[0].landing_page_url | https://doi.org/10.32628/cseit24103107 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5112041541 |
| authorships[0].author.orcid | https://orcid.org/0009-0006-7239-5103 |
| authorships[0].author.display_name | Asoke Nath |
| authorships[0].countries | IN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I4401726862, https://openalex.org/I906608882 |
| authorships[0].affiliations[0].raw_affiliation_string | Department of Computer Science and Research, St. Xavier's College (Autonomous), Kolkata, West Bengal, India |
| authorships[0].institutions[0].id | https://openalex.org/I4401726862 |
| authorships[0].institutions[0].ror | https://ror.org/0316y5a96 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I4401726862 |
| authorships[0].institutions[0].country_code | |
| authorships[0].institutions[0].display_name | St. Xavier's College (Autonomous) |
| authorships[0].institutions[1].id | https://openalex.org/I906608882 |
| authorships[0].institutions[1].ror | https://ror.org/039543c28 |
| authorships[0].institutions[1].type | education |
| authorships[0].institutions[1].lineage | https://openalex.org/I906608882 |
| authorships[0].institutions[1].country_code | IN |
| authorships[0].institutions[1].display_name | St Xavier’s College |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | None Asoke Nath |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Department of Computer Science and Research, St. Xavier's College (Autonomous), Kolkata, West Bengal, India |
| authorships[1].author.id | https://openalex.org/A5102735350 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | Sankar Das |
| authorships[1].countries | IN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I4401726862, https://openalex.org/I906608882 |
| authorships[1].affiliations[0].raw_affiliation_string | Department of Computer Science and Research, St. Xavier's College (Autonomous), Kolkata, West Bengal, India |
| authorships[1].institutions[0].id | https://openalex.org/I4401726862 |
| authorships[1].institutions[0].ror | https://ror.org/0316y5a96 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I4401726862 |
| authorships[1].institutions[0].country_code | |
| authorships[1].institutions[0].display_name | St. Xavier's College (Autonomous) |
| authorships[1].institutions[1].id | https://openalex.org/I906608882 |
| authorships[1].institutions[1].ror | https://ror.org/039543c28 |
| authorships[1].institutions[1].type | education |
| authorships[1].institutions[1].lineage | https://openalex.org/I906608882 |
| authorships[1].institutions[1].country_code | IN |
| authorships[1].institutions[1].display_name | St Xavier’s College |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | None Sankar Das |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Department of Computer Science and Research, St. Xavier's College (Autonomous), Kolkata, West Bengal, India |
| authorships[2].author.id | https://openalex.org/A5054300851 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-1177-1156 |
| authorships[2].author.display_name | Rahul Sharma |
| authorships[2].countries | IN |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I4401726862, https://openalex.org/I906608882 |
| authorships[2].affiliations[0].raw_affiliation_string | Department of Computer Science and Research, St. Xavier's College (Autonomous), Kolkata, West Bengal, India |
| authorships[2].institutions[0].id | https://openalex.org/I4401726862 |
| authorships[2].institutions[0].ror | https://ror.org/0316y5a96 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I4401726862 |
| authorships[2].institutions[0].country_code | |
| authorships[2].institutions[0].display_name | St. Xavier's College (Autonomous) |
| authorships[2].institutions[1].id | https://openalex.org/I906608882 |
| authorships[2].institutions[1].ror | https://ror.org/039543c28 |
| authorships[2].institutions[1].type | education |
| authorships[2].institutions[1].lineage | https://openalex.org/I906608882 |
| authorships[2].institutions[1].country_code | IN |
| authorships[2].institutions[1].display_name | St Xavier’s College |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | None Rahul Sharma |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Department of Computer Science and Research, St. Xavier's College (Autonomous), Kolkata, West Bengal, India |
| authorships[3].author.id | https://openalex.org/A5070382445 |
| authorships[3].author.orcid | |
| authorships[3].author.display_name | Subhajit Mandal |
| authorships[3].countries | IN |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I4401726862, https://openalex.org/I906608882 |
| authorships[3].affiliations[0].raw_affiliation_string | Department of Computer Science and Research, St. Xavier's College (Autonomous), Kolkata, West Bengal, India |
| authorships[3].institutions[0].id | https://openalex.org/I4401726862 |
| authorships[3].institutions[0].ror | https://ror.org/0316y5a96 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I4401726862 |
| authorships[3].institutions[0].country_code | |
| authorships[3].institutions[0].display_name | St. Xavier's College (Autonomous) |
| authorships[3].institutions[1].id | https://openalex.org/I906608882 |
| authorships[3].institutions[1].ror | https://ror.org/039543c28 |
| authorships[3].institutions[1].type | education |
| authorships[3].institutions[1].lineage | https://openalex.org/I906608882 |
| authorships[3].institutions[1].country_code | IN |
| authorships[3].institutions[1].display_name | St Xavier’s College |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | None Subhajit Mandal |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | Department of Computer Science and Research, St. Xavier's College (Autonomous), Kolkata, West Bengal, India |
| authorships[4].author.id | https://openalex.org/A5098727534 |
| authorships[4].author.orcid | |
| authorships[4].author.display_name | Hardick Sadhu |
| authorships[4].countries | IN |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I4401726862, https://openalex.org/I906608882 |
| authorships[4].affiliations[0].raw_affiliation_string | Department of Computer Science and Research, St. Xavier's College (Autonomous), Kolkata, West Bengal, India |
| authorships[4].institutions[0].id | https://openalex.org/I4401726862 |
| authorships[4].institutions[0].ror | https://ror.org/0316y5a96 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I4401726862 |
| authorships[4].institutions[0].country_code | |
| authorships[4].institutions[0].display_name | St. Xavier's College (Autonomous) |
| authorships[4].institutions[1].id | https://openalex.org/I906608882 |
| authorships[4].institutions[1].ror | https://ror.org/039543c28 |
| authorships[4].institutions[1].type | education |
| authorships[4].institutions[1].lineage | https://openalex.org/I906608882 |
| authorships[4].institutions[1].country_code | IN |
| authorships[4].institutions[1].display_name | St Xavier’s College |
| authorships[4].author_position | last |
| authorships[4].raw_author_name | None Hardick Sadhu |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | Department of Computer Science and Research, St. Xavier's College (Autonomous), Kolkata, West Bengal, India |
| has_content.pdf | True |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://ijsrcseit.com/index.php/home/article/download/CSEIT24103107/CSEIT24103107 |
| open_access.oa_status | diamond |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Digital Steganography : A Comprehensive Study on Various Methods for Hiding Secret Data in a Cover file |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10388 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 1.0 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1707 |
| primary_topic.subfield.display_name | Computer Vision and Pattern Recognition |
| primary_topic.display_name | Advanced Steganography and Watermarking Techniques |
| related_works | https://openalex.org/W2560172240, https://openalex.org/W2989873089, https://openalex.org/W3146660591, https://openalex.org/W1995538220, https://openalex.org/W2299048436, https://openalex.org/W2809100332, https://openalex.org/W83713408, https://openalex.org/W2497446005, https://openalex.org/W2929936941, https://openalex.org/W2171676767 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.32628/cseit24103107 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4210200847 |
| best_oa_location.source.issn | 2456-3307 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 2456-3307 |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | International Journal of Scientific Research in Computer Science Engineering and Information Technology |
| best_oa_location.source.host_organization | |
| best_oa_location.source.host_organization_name | |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://ijsrcseit.com/index.php/home/article/download/CSEIT24103107/CSEIT24103107 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | International Journal of Scientific Research in Computer Science, Engineering and Information Technology |
| best_oa_location.landing_page_url | https://doi.org/10.32628/cseit24103107 |
| primary_location.id | doi:10.32628/cseit24103107 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4210200847 |
| primary_location.source.issn | 2456-3307 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 2456-3307 |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | International Journal of Scientific Research in Computer Science Engineering and Information Technology |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://ijsrcseit.com/index.php/home/article/download/CSEIT24103107/CSEIT24103107 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | International Journal of Scientific Research in Computer Science, Engineering and Information Technology |
| primary_location.landing_page_url | https://doi.org/10.32628/cseit24103107 |
| publication_date | 2024-05-19 |
| publication_year | 2024 |
| referenced_works | https://openalex.org/W2118848263, https://openalex.org/W2133562511, https://openalex.org/W2078478587, https://openalex.org/W2066021566, https://openalex.org/W2318413963, https://openalex.org/W1992116320, https://openalex.org/W2601242302, https://openalex.org/W3025382900, https://openalex.org/W2158525949, https://openalex.org/W1968242826, https://openalex.org/W2795037764 |
| referenced_works_count | 11 |
| abstract_inverted_index.a | 11, 98, 120 |
| abstract_inverted_index.an | 4 |
| abstract_inverted_index.is | 88 |
| abstract_inverted_index.of | 7, 28, 139, 152 |
| abstract_inverted_index.on | 13, 123 |
| abstract_inverted_index.to | 41, 101, 135 |
| abstract_inverted_index.Bit | 66 |
| abstract_inverted_index.and | 50, 59, 77, 83, 94, 107, 129, 149 |
| abstract_inverted_index.for | 18, 90, 115 |
| abstract_inverted_index.its | 91 |
| abstract_inverted_index.the | 14, 26, 36, 110, 124, 137, 150 |
| abstract_inverted_index.Each | 86 |
| abstract_inverted_index.This | 0, 44 |
| abstract_inverted_index.both | 48 |
| abstract_inverted_index.data | 21, 95, 155 |
| abstract_inverted_index.deep | 81 |
| abstract_inverted_index.into | 113 |
| abstract_inverted_index.more | 153 |
| abstract_inverted_index.that | 144 |
| abstract_inverted_index.this | 132 |
| abstract_inverted_index.with | 10 |
| abstract_inverted_index.(LSB) | 67 |
| abstract_inverted_index.Least | 64 |
| abstract_inverted_index.could | 145 |
| abstract_inverted_index.cover | 23 |
| abstract_inverted_index.data, | 34 |
| abstract_inverted_index.focus | 12 |
| abstract_inverted_index.other | 32 |
| abstract_inverted_index.paper | 2, 111 |
| abstract_inverted_index.seeks | 134 |
| abstract_inverted_index.study | 45, 133 |
| abstract_inverted_index.their | 55, 103 |
| abstract_inverted_index.(DCT), | 72 |
| abstract_inverted_index.(DWT), | 76 |
| abstract_inverted_index.cosine | 70 |
| abstract_inverted_index.delves | 112 |
| abstract_inverted_index.field. | 125 |
| abstract_inverted_index.files. | 24 |
| abstract_inverted_index.future | 147 |
| abstract_inverted_index.hidden | 37, 117 |
| abstract_inverted_index.hiding | 156 |
| abstract_inverted_index.inform | 146 |
| abstract_inverted_index.method | 87 |
| abstract_inverted_index.modern | 51 |
| abstract_inverted_index.offers | 3 |
| abstract_inverted_index.secret | 20 |
| abstract_inverted_index.secure | 154 |
| abstract_inverted_index.within | 22, 31 |
| abstract_inverted_index.Through | 126 |
| abstract_inverted_index.digital | 8, 140 |
| abstract_inverted_index.diverse | 15 |
| abstract_inverted_index.enhance | 136 |
| abstract_inverted_index.ensures | 35 |
| abstract_inverted_index.include | 63 |
| abstract_inverted_index.message | 38 |
| abstract_inverted_index.methods | 79 |
| abstract_inverted_index.provide | 119 |
| abstract_inverted_index.remains | 39 |
| abstract_inverted_index.reviews | 47 |
| abstract_inverted_index.wavelet | 74 |
| abstract_inverted_index.adaptive | 84 |
| abstract_inverted_index.analysis | 100 |
| abstract_inverted_index.assessed | 89 |
| abstract_inverted_index.discrete | 69, 73 |
| abstract_inverted_index.explored | 62 |
| abstract_inverted_index.in-depth | 5 |
| abstract_inverted_index.insights | 143 |
| abstract_inverted_index.learning | 82 |
| abstract_inverted_index.offering | 97 |
| abstract_inverted_index.practice | 27 |
| abstract_inverted_index.research | 1, 148 |
| abstract_inverted_index.utilized | 17 |
| abstract_inverted_index.analysis, | 131 |
| abstract_inverted_index.capacity, | 96 |
| abstract_inverted_index.detecting | 116 |
| abstract_inverted_index.embedding | 19 |
| abstract_inverted_index.practical | 105 |
| abstract_inverted_index.transform | 71, 75 |
| abstract_inverted_index.Techniques | 61 |
| abstract_inverted_index.concealing | 29 |
| abstract_inverted_index.dissecting | 54 |
| abstract_inverted_index.evaluation | 128 |
| abstract_inverted_index.innovative | 78 |
| abstract_inverted_index.insertion, | 68 |
| abstract_inverted_index.leveraging | 80 |
| abstract_inverted_index.non-secret | 33 |
| abstract_inverted_index.observers. | 43 |
| abstract_inverted_index.presenting | 142 |
| abstract_inverted_index.respective | 104 |
| abstract_inverted_index.underscore | 102 |
| abstract_inverted_index.Significant | 65 |
| abstract_inverted_index.advantages, | 58 |
| abstract_inverted_index.algorithms. | 85 |
| abstract_inverted_index.comparative | 99 |
| abstract_inverted_index.development | 151 |
| abstract_inverted_index.examination | 6 |
| abstract_inverted_index.fundamental | 56 |
| abstract_inverted_index.information | 30 |
| abstract_inverted_index.mechanisms, | 57 |
| abstract_inverted_index.perspective | 122 |
| abstract_inverted_index.robustness, | 93 |
| abstract_inverted_index.techniques, | 53 |
| abstract_inverted_index.techniques. | 157 |
| abstract_inverted_index.theoretical | 130 |
| abstract_inverted_index.traditional | 49 |
| abstract_inverted_index.weaknesses. | 60 |
| abstract_inverted_index.applications | 106 |
| abstract_inverted_index.experimental | 127 |
| abstract_inverted_index.limitations. | 108 |
| abstract_inverted_index.unauthorized | 42 |
| abstract_inverted_index.undetectable | 40 |
| abstract_inverted_index.Additionally, | 109 |
| abstract_inverted_index.comprehensive | 121 |
| abstract_inverted_index.methodologies | 16 |
| abstract_inverted_index.understanding | 138 |
| abstract_inverted_index.Steganography, | 25 |
| abstract_inverted_index.steganographic | 52 |
| abstract_inverted_index.steganography, | 9, 141 |
| abstract_inverted_index.systematically | 46 |
| abstract_inverted_index.information—to | 118 |
| abstract_inverted_index.imperceptibility, | 92 |
| abstract_inverted_index.steganalysis—methods | 114 |
| cited_by_percentile_year | |
| countries_distinct_count | 1 |
| institutions_distinct_count | 5 |
| citation_normalized_percentile.value | 0.07940573 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |