Hybrid Image Steganography Method with Random Embedding of Encrypted Message Article Swipe
The main challenge for embedding encrypted message in an input image is to get better the security of the confidential information through hybrid-based image steganography method. Moreover, earlier LSB based solutions existed in which either secret information embedded without encryption or embedded un-randomly in an image and existing MSB based information concealing solutions minimizes information capacity and image quality too. Most of existing steganographic systems either based on LSB or MSB but only some hybrid solutions are available in which either the confidential message is not encoded before embedding it into the image and the embedding system is also not random based. The existing well known hybrid based image steganography techniques are not only deficient in performance but also deficient in embedding of encoded data in an image. To overcome these issues, a Hybrid-LSB-MSB based image steganography and multi-operation data encryption method is proposed in this article. Proposed method is not only randomly embeds the confidential information in a cover image but also provided the facility to encode the confidential information before substituting. The Hybrid-LSB-MSB based proposed image steganography method is compared with earlier Hybrid based image steganography method by using Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR) values including payload capacity. Higher PSNR and Lower MSE values signify effective steganography quality. The experimental results show that proposed method retains higher PSNR and lesser MSE values as contrasted to the existing methods thereby effective in steganographic properties.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.54692/lgurjcsit.2021.0504249
- https://lgurjcsit.lgu.edu.pk/index.php/lgurjcsit/article/download/249/200
- OA Status
- diamond
- Cited By
- 1
- References
- 31
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4226434298
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4226434298Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.54692/lgurjcsit.2021.0504249Digital Object Identifier
- Title
-
Hybrid Image Steganography Method with Random Embedding of Encrypted MessageWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2021Year of publication
- Publication date
-
2021-12-27Full publication date if available
- Authors
-
Umer IqbalList of authors in order
- Landing page
-
https://doi.org/10.54692/lgurjcsit.2021.0504249Publisher landing page
- PDF URL
-
https://lgurjcsit.lgu.edu.pk/index.php/lgurjcsit/article/download/249/200Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
diamondOpen access status per OpenAlex
- OA URL
-
https://lgurjcsit.lgu.edu.pk/index.php/lgurjcsit/article/download/249/200Direct OA link when available
- Concepts
-
Steganography, Least significant bit, Encryption, Steganography tools, Computer science, Peak signal-to-noise ratio, Payload (computing), Embedding, Image (mathematics), Image quality, Information hiding, Artificial intelligence, Theoretical computer science, Algorithm, Computer vision, Computer security, Operating system, Network packetTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
1Total citation count in OpenAlex
- Citations by year (recent)
-
2023: 1Per-year citation counts (last 5 years)
- References (count)
-
31Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4226434298 |
|---|---|
| doi | https://doi.org/10.54692/lgurjcsit.2021.0504249 |
| ids.doi | https://doi.org/10.54692/lgurjcsit.2021.0504249 |
| ids.openalex | https://openalex.org/W4226434298 |
| fwci | 0.10221948 |
| type | article |
| title | Hybrid Image Steganography Method with Random Embedding of Encrypted Message |
| biblio.issue | 4 |
| biblio.volume | 5 |
| biblio.last_page | 49 |
| biblio.first_page | 36 |
| topics[0].id | https://openalex.org/T10388 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9998999834060669 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1707 |
| topics[0].subfield.display_name | Computer Vision and Pattern Recognition |
| topics[0].display_name | Advanced Steganography and Watermarking Techniques |
| topics[1].id | https://openalex.org/T11017 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9979000091552734 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1707 |
| topics[1].subfield.display_name | Computer Vision and Pattern Recognition |
| topics[1].display_name | Chaos-based Image/Signal Encryption |
| topics[2].id | https://openalex.org/T12357 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9868999719619751 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1707 |
| topics[2].subfield.display_name | Computer Vision and Pattern Recognition |
| topics[2].display_name | Digital Media Forensic Detection |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C108801101 |
| concepts[0].level | 3 |
| concepts[0].score | 0.9077795743942261 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q15032 |
| concepts[0].display_name | Steganography |
| concepts[1].id | https://openalex.org/C4305246 |
| concepts[1].level | 2 |
| concepts[1].score | 0.7957850694656372 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q3885225 |
| concepts[1].display_name | Least significant bit |
| concepts[2].id | https://openalex.org/C148730421 |
| concepts[2].level | 2 |
| concepts[2].score | 0.7149925231933594 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q141090 |
| concepts[2].display_name | Encryption |
| concepts[3].id | https://openalex.org/C13179402 |
| concepts[3].level | 4 |
| concepts[3].score | 0.6102529764175415 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q7606662 |
| concepts[3].display_name | Steganography tools |
| concepts[4].id | https://openalex.org/C41008148 |
| concepts[4].level | 0 |
| concepts[4].score | 0.6034371852874756 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[4].display_name | Computer science |
| concepts[5].id | https://openalex.org/C154579607 |
| concepts[5].level | 3 |
| concepts[5].score | 0.5980992317199707 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q3373850 |
| concepts[5].display_name | Peak signal-to-noise ratio |
| concepts[6].id | https://openalex.org/C134066672 |
| concepts[6].level | 3 |
| concepts[6].score | 0.5850647687911987 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q1424639 |
| concepts[6].display_name | Payload (computing) |
| concepts[7].id | https://openalex.org/C41608201 |
| concepts[7].level | 2 |
| concepts[7].score | 0.5716402530670166 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q980509 |
| concepts[7].display_name | Embedding |
| concepts[8].id | https://openalex.org/C115961682 |
| concepts[8].level | 2 |
| concepts[8].score | 0.4528820812702179 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q860623 |
| concepts[8].display_name | Image (mathematics) |
| concepts[9].id | https://openalex.org/C55020928 |
| concepts[9].level | 3 |
| concepts[9].score | 0.45246458053588867 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q3813865 |
| concepts[9].display_name | Image quality |
| concepts[10].id | https://openalex.org/C3073032 |
| concepts[10].level | 3 |
| concepts[10].score | 0.4173011779785156 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q15912075 |
| concepts[10].display_name | Information hiding |
| concepts[11].id | https://openalex.org/C154945302 |
| concepts[11].level | 1 |
| concepts[11].score | 0.40950557589530945 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[11].display_name | Artificial intelligence |
| concepts[12].id | https://openalex.org/C80444323 |
| concepts[12].level | 1 |
| concepts[12].score | 0.37600177526474 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q2878974 |
| concepts[12].display_name | Theoretical computer science |
| concepts[13].id | https://openalex.org/C11413529 |
| concepts[13].level | 1 |
| concepts[13].score | 0.3688300848007202 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q8366 |
| concepts[13].display_name | Algorithm |
| concepts[14].id | https://openalex.org/C31972630 |
| concepts[14].level | 1 |
| concepts[14].score | 0.35572242736816406 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q844240 |
| concepts[14].display_name | Computer vision |
| concepts[15].id | https://openalex.org/C38652104 |
| concepts[15].level | 1 |
| concepts[15].score | 0.14184662699699402 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[15].display_name | Computer security |
| concepts[16].id | https://openalex.org/C111919701 |
| concepts[16].level | 1 |
| concepts[16].score | 0.0 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[16].display_name | Operating system |
| concepts[17].id | https://openalex.org/C158379750 |
| concepts[17].level | 2 |
| concepts[17].score | 0.0 |
| concepts[17].wikidata | https://www.wikidata.org/wiki/Q214111 |
| concepts[17].display_name | Network packet |
| keywords[0].id | https://openalex.org/keywords/steganography |
| keywords[0].score | 0.9077795743942261 |
| keywords[0].display_name | Steganography |
| keywords[1].id | https://openalex.org/keywords/least-significant-bit |
| keywords[1].score | 0.7957850694656372 |
| keywords[1].display_name | Least significant bit |
| keywords[2].id | https://openalex.org/keywords/encryption |
| keywords[2].score | 0.7149925231933594 |
| keywords[2].display_name | Encryption |
| keywords[3].id | https://openalex.org/keywords/steganography-tools |
| keywords[3].score | 0.6102529764175415 |
| keywords[3].display_name | Steganography tools |
| keywords[4].id | https://openalex.org/keywords/computer-science |
| keywords[4].score | 0.6034371852874756 |
| keywords[4].display_name | Computer science |
| keywords[5].id | https://openalex.org/keywords/peak-signal-to-noise-ratio |
| keywords[5].score | 0.5980992317199707 |
| keywords[5].display_name | Peak signal-to-noise ratio |
| keywords[6].id | https://openalex.org/keywords/payload |
| keywords[6].score | 0.5850647687911987 |
| keywords[6].display_name | Payload (computing) |
| keywords[7].id | https://openalex.org/keywords/embedding |
| keywords[7].score | 0.5716402530670166 |
| keywords[7].display_name | Embedding |
| keywords[8].id | https://openalex.org/keywords/image |
| keywords[8].score | 0.4528820812702179 |
| keywords[8].display_name | Image (mathematics) |
| keywords[9].id | https://openalex.org/keywords/image-quality |
| keywords[9].score | 0.45246458053588867 |
| keywords[9].display_name | Image quality |
| keywords[10].id | https://openalex.org/keywords/information-hiding |
| keywords[10].score | 0.4173011779785156 |
| keywords[10].display_name | Information hiding |
| keywords[11].id | https://openalex.org/keywords/artificial-intelligence |
| keywords[11].score | 0.40950557589530945 |
| keywords[11].display_name | Artificial intelligence |
| keywords[12].id | https://openalex.org/keywords/theoretical-computer-science |
| keywords[12].score | 0.37600177526474 |
| keywords[12].display_name | Theoretical computer science |
| keywords[13].id | https://openalex.org/keywords/algorithm |
| keywords[13].score | 0.3688300848007202 |
| keywords[13].display_name | Algorithm |
| keywords[14].id | https://openalex.org/keywords/computer-vision |
| keywords[14].score | 0.35572242736816406 |
| keywords[14].display_name | Computer vision |
| keywords[15].id | https://openalex.org/keywords/computer-security |
| keywords[15].score | 0.14184662699699402 |
| keywords[15].display_name | Computer security |
| language | en |
| locations[0].id | doi:10.54692/lgurjcsit.2021.0504249 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4210179474 |
| locations[0].source.issn | 2519-7991, 2521-0122 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 2519-7991 |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Lahore Garrison University Research Journal of Computer Science and Information Technology |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].license | |
| locations[0].pdf_url | https://lgurjcsit.lgu.edu.pk/index.php/lgurjcsit/article/download/249/200 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Lahore Garrison University Research Journal of Computer Science and Information Technology |
| locations[0].landing_page_url | https://doi.org/10.54692/lgurjcsit.2021.0504249 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5083535368 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-2888-9919 |
| authorships[0].author.display_name | Umer Iqbal |
| authorships[0].countries | PK |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I195024194 |
| authorships[0].affiliations[0].raw_affiliation_string | Riphah College of Computing, Riphah International University Faisalabad Campus Pakistan |
| authorships[0].institutions[0].id | https://openalex.org/I195024194 |
| authorships[0].institutions[0].ror | https://ror.org/02kdm5630 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I195024194 |
| authorships[0].institutions[0].country_code | PK |
| authorships[0].institutions[0].display_name | Riphah International University |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | None Umer Iqbal |
| authorships[0].is_corresponding | True |
| authorships[0].raw_affiliation_strings | Riphah College of Computing, Riphah International University Faisalabad Campus Pakistan |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://lgurjcsit.lgu.edu.pk/index.php/lgurjcsit/article/download/249/200 |
| open_access.oa_status | diamond |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Hybrid Image Steganography Method with Random Embedding of Encrypted Message |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10388 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9998999834060669 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1707 |
| primary_topic.subfield.display_name | Computer Vision and Pattern Recognition |
| primary_topic.display_name | Advanced Steganography and Watermarking Techniques |
| related_works | https://openalex.org/W2049703184, https://openalex.org/W2977151837, https://openalex.org/W2158736088, https://openalex.org/W2181427603, https://openalex.org/W2409080236, https://openalex.org/W2796470635, https://openalex.org/W2347929411, https://openalex.org/W2238140690, https://openalex.org/W3046393280, https://openalex.org/W4214583425 |
| cited_by_count | 1 |
| counts_by_year[0].year | 2023 |
| counts_by_year[0].cited_by_count | 1 |
| locations_count | 1 |
| best_oa_location.id | doi:10.54692/lgurjcsit.2021.0504249 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4210179474 |
| best_oa_location.source.issn | 2519-7991, 2521-0122 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 2519-7991 |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Lahore Garrison University Research Journal of Computer Science and Information Technology |
| best_oa_location.source.host_organization | |
| best_oa_location.source.host_organization_name | |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://lgurjcsit.lgu.edu.pk/index.php/lgurjcsit/article/download/249/200 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Lahore Garrison University Research Journal of Computer Science and Information Technology |
| best_oa_location.landing_page_url | https://doi.org/10.54692/lgurjcsit.2021.0504249 |
| primary_location.id | doi:10.54692/lgurjcsit.2021.0504249 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4210179474 |
| primary_location.source.issn | 2519-7991, 2521-0122 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 2519-7991 |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Lahore Garrison University Research Journal of Computer Science and Information Technology |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.license | |
| primary_location.pdf_url | https://lgurjcsit.lgu.edu.pk/index.php/lgurjcsit/article/download/249/200 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Lahore Garrison University Research Journal of Computer Science and Information Technology |
| primary_location.landing_page_url | https://doi.org/10.54692/lgurjcsit.2021.0504249 |
| publication_date | 2021-12-27 |
| publication_year | 2021 |
| referenced_works | https://openalex.org/W2554533315, https://openalex.org/W2889531145, https://openalex.org/W3195056400, https://openalex.org/W2802052183, https://openalex.org/W2799925652, https://openalex.org/W2591176040, https://openalex.org/W2517369211, https://openalex.org/W2413210633, https://openalex.org/W2547036113, https://openalex.org/W2311624203, https://openalex.org/W2289356800, https://openalex.org/W2594570269, https://openalex.org/W2804043509, https://openalex.org/W2586164962, https://openalex.org/W2176627963, https://openalex.org/W1968529674, https://openalex.org/W6646386650, https://openalex.org/W2147674576, https://openalex.org/W2540953262, https://openalex.org/W2541074843, https://openalex.org/W2922356059, https://openalex.org/W2900367918, https://openalex.org/W4210717336, https://openalex.org/W6772099519, https://openalex.org/W3181375284, https://openalex.org/W3111975322, https://openalex.org/W3099242011, https://openalex.org/W3097192538, https://openalex.org/W2998428816, https://openalex.org/W1984185638, https://openalex.org/W3185797710 |
| referenced_works_count | 31 |
| abstract_inverted_index.a | 132, 158 |
| abstract_inverted_index.To | 128 |
| abstract_inverted_index.an | 8, 44, 126 |
| abstract_inverted_index.as | 230 |
| abstract_inverted_index.by | 189 |
| abstract_inverted_index.in | 7, 32, 43, 78, 115, 120, 125, 144, 157, 238 |
| abstract_inverted_index.is | 11, 84, 97, 142, 149, 180 |
| abstract_inverted_index.it | 89 |
| abstract_inverted_index.of | 17, 61, 122 |
| abstract_inverted_index.on | 67 |
| abstract_inverted_index.or | 40, 69 |
| abstract_inverted_index.to | 12, 166, 198, 232 |
| abstract_inverted_index.LSB | 28, 68 |
| abstract_inverted_index.MSB | 48, 70 |
| abstract_inverted_index.MSE | 210, 228 |
| abstract_inverted_index.The | 0, 102, 173, 216 |
| abstract_inverted_index.and | 46, 56, 93, 137, 195, 208, 226 |
| abstract_inverted_index.are | 76, 111 |
| abstract_inverted_index.but | 71, 117, 161 |
| abstract_inverted_index.for | 3 |
| abstract_inverted_index.get | 13 |
| abstract_inverted_index.not | 85, 99, 112, 150 |
| abstract_inverted_index.the | 15, 18, 81, 91, 94, 154, 164, 168, 233 |
| abstract_inverted_index.Mean | 191 |
| abstract_inverted_index.Most | 60 |
| abstract_inverted_index.PSNR | 207, 225 |
| abstract_inverted_index.Peak | 196 |
| abstract_inverted_index.also | 98, 118, 162 |
| abstract_inverted_index.data | 124, 139 |
| abstract_inverted_index.into | 90 |
| abstract_inverted_index.main | 1 |
| abstract_inverted_index.only | 72, 113, 151 |
| abstract_inverted_index.show | 219 |
| abstract_inverted_index.some | 73 |
| abstract_inverted_index.that | 220 |
| abstract_inverted_index.this | 145 |
| abstract_inverted_index.too. | 59 |
| abstract_inverted_index.well | 104 |
| abstract_inverted_index.with | 182 |
| abstract_inverted_index.(MSE) | 194 |
| abstract_inverted_index.Error | 193 |
| abstract_inverted_index.Lower | 209 |
| abstract_inverted_index.Noise | 199 |
| abstract_inverted_index.Ratio | 200 |
| abstract_inverted_index.based | 29, 49, 66, 107, 134, 175, 185 |
| abstract_inverted_index.cover | 159 |
| abstract_inverted_index.image | 10, 23, 45, 57, 92, 108, 135, 160, 177, 186 |
| abstract_inverted_index.input | 9 |
| abstract_inverted_index.known | 105 |
| abstract_inverted_index.these | 130 |
| abstract_inverted_index.using | 190 |
| abstract_inverted_index.which | 33, 79 |
| abstract_inverted_index.(PSNR) | 201 |
| abstract_inverted_index.Higher | 206 |
| abstract_inverted_index.Hybrid | 184 |
| abstract_inverted_index.Signal | 197 |
| abstract_inverted_index.based. | 101 |
| abstract_inverted_index.before | 87, 171 |
| abstract_inverted_index.better | 14 |
| abstract_inverted_index.either | 34, 65, 80 |
| abstract_inverted_index.embeds | 153 |
| abstract_inverted_index.encode | 167 |
| abstract_inverted_index.higher | 224 |
| abstract_inverted_index.hybrid | 74, 106 |
| abstract_inverted_index.image. | 127 |
| abstract_inverted_index.lesser | 227 |
| abstract_inverted_index.method | 141, 148, 179, 188, 222 |
| abstract_inverted_index.random | 100 |
| abstract_inverted_index.secret | 35 |
| abstract_inverted_index.system | 96 |
| abstract_inverted_index.values | 202, 211, 229 |
| abstract_inverted_index.Squared | 192 |
| abstract_inverted_index.earlier | 27, 183 |
| abstract_inverted_index.encoded | 86, 123 |
| abstract_inverted_index.existed | 31 |
| abstract_inverted_index.issues, | 131 |
| abstract_inverted_index.message | 6, 83 |
| abstract_inverted_index.method. | 25 |
| abstract_inverted_index.methods | 235 |
| abstract_inverted_index.payload | 204 |
| abstract_inverted_index.quality | 58 |
| abstract_inverted_index.results | 218 |
| abstract_inverted_index.retains | 223 |
| abstract_inverted_index.signify | 212 |
| abstract_inverted_index.systems | 64 |
| abstract_inverted_index.thereby | 236 |
| abstract_inverted_index.through | 21 |
| abstract_inverted_index.without | 38 |
| abstract_inverted_index.Proposed | 147 |
| abstract_inverted_index.article. | 146 |
| abstract_inverted_index.capacity | 55 |
| abstract_inverted_index.compared | 181 |
| abstract_inverted_index.embedded | 37, 41 |
| abstract_inverted_index.existing | 47, 62, 103, 234 |
| abstract_inverted_index.facility | 165 |
| abstract_inverted_index.overcome | 129 |
| abstract_inverted_index.proposed | 143, 176, 221 |
| abstract_inverted_index.provided | 163 |
| abstract_inverted_index.quality. | 215 |
| abstract_inverted_index.randomly | 152 |
| abstract_inverted_index.security | 16 |
| abstract_inverted_index.Moreover, | 26 |
| abstract_inverted_index.available | 77 |
| abstract_inverted_index.capacity. | 205 |
| abstract_inverted_index.challenge | 2 |
| abstract_inverted_index.deficient | 114, 119 |
| abstract_inverted_index.effective | 213, 237 |
| abstract_inverted_index.embedding | 4, 88, 95, 121 |
| abstract_inverted_index.encrypted | 5 |
| abstract_inverted_index.including | 203 |
| abstract_inverted_index.minimizes | 53 |
| abstract_inverted_index.solutions | 30, 52, 75 |
| abstract_inverted_index.concealing | 51 |
| abstract_inverted_index.contrasted | 231 |
| abstract_inverted_index.encryption | 39, 140 |
| abstract_inverted_index.techniques | 110 |
| abstract_inverted_index.information | 20, 36, 50, 54, 156, 170 |
| abstract_inverted_index.performance | 116 |
| abstract_inverted_index.properties. | 240 |
| abstract_inverted_index.un-randomly | 42 |
| abstract_inverted_index.confidential | 19, 82, 155, 169 |
| abstract_inverted_index.experimental | 217 |
| abstract_inverted_index.hybrid-based | 22 |
| abstract_inverted_index.steganography | 24, 109, 136, 178, 187, 214 |
| abstract_inverted_index.substituting. | 172 |
| abstract_inverted_index.Hybrid-LSB-MSB | 133, 174 |
| abstract_inverted_index.steganographic | 63, 239 |
| abstract_inverted_index.multi-operation | 138 |
| cited_by_percentile_year.max | 94 |
| cited_by_percentile_year.min | 89 |
| corresponding_author_ids | https://openalex.org/A5083535368 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 1 |
| corresponding_institution_ids | https://openalex.org/I195024194 |
| citation_normalized_percentile.value | 0.45010741 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |