{"id":"https://openalex.org/W2031737658","doi":"https://doi.org/10.1117/12.465324","title":"<title>StegoWall: blind statistical detection of hidden data</title>","display_name":"<title>StegoWall: blind statistical detection of hidden data</title>","publication_year":2002,"publication_date":"2002-04-29","ids":{"openalex":"https://openalex.org/W2031737658","doi":"https://doi.org/10.1117/12.465324","mag":"2031737658"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1117/12.465324","pdf_url":null,"source":{"id":"https://openalex.org/S183492911","display_name":"Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE","issn_l":"0277-786X","issn":["0277-786X","1996-756X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310315543","host_organization_name":"SPIE","host_organization_lineage":["https://openalex.org/P4310315543"],"host_organization_lineage_names":["SPIE"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://access.archive-ouverte.unige.ch/access/metadata/8a16bf21-010c-4cde-9866-bc5bdaac1417/download","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091506990","display_name":"Slava Voloshynovskiy","orcid":"https://orcid.org/0000-0003-0416-9674"},"institutions":[{"id":"https://openalex.org/I114457229","display_name":"University of Geneva","ror":"https://ror.org/01swzsf04","country_code":"CH","type":"education","lineage":["https://openalex.org/I114457229"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Sviatoslav V. Voloshynovskiy","raw_affiliation_strings":["#N##TAB##TAB##TAB##TAB# University of Geneva, Switzerland#N##TAB##TAB##TAB#"],"affiliations":[{"raw_affiliation_string":"#N##TAB##TAB##TAB##TAB# University of Geneva, Switzerland#N##TAB##TAB##TAB#","institution_ids":["https://openalex.org/I114457229"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084179677","display_name":"Alexander Herrigel","orcid":null},"institutions":[],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Alexander Herrigel","raw_affiliation_strings":["Digital Copyright Technologies (Germany)"],"affiliations":[{"raw_affiliation_string":"Digital Copyright Technologies (Germany)","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069589344","display_name":"Yuri B. Rytsar","orcid":null},"institutions":[],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Yuri B. Rytsar","raw_affiliation_strings":["Digital Copyright Technologies (Switzerland)"],"affiliations":[{"raw_affiliation_string":"Digital Copyright Technologies (Switzerland)","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108500658","display_name":"Thierry Pun","orcid":null},"institutions":[{"id":"https://openalex.org/I114457229","display_name":"University of Geneva","ror":"https://ror.org/01swzsf04","country_code":"CH","type":"education","lineage":["https://openalex.org/I114457229"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Thierry Pun","raw_affiliation_strings":["#N##TAB##TAB##TAB##TAB# University of Geneva, Switzerland#N##TAB##TAB##TAB#"],"affiliations":[{"raw_affiliation_string":"#N##TAB##TAB##TAB##TAB# University of Geneva, Switzerland#N##TAB##TAB##TAB#","institution_ids":["https://openalex.org/I114457229"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.645,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":22,"citation_normalized_percentile":{"value":0.860144,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":86,"max":87},"biblio":{"volume":"4675","issue":null,"first_page":"57","last_page":"68"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/information-protection-policy","display_name":"Information protection policy","score":0.4897666},{"id":"https://openalex.org/keywords/data-security","display_name":"Data Security","score":0.47157755},{"id":"https://openalex.org/keywords/digital-data","display_name":"Digital data","score":0.46766627}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.85435057},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.6946361},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.69303733},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.594173},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5526642},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5295143},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.51826924},{"id":"https://openalex.org/C168297262","wikidata":"https://www.wikidata.org/wiki/Q6031182","display_name":"Information protection policy","level":2,"score":0.4897666},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.47435343},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.47157755},{"id":"https://openalex.org/C2778864079","wikidata":"https://www.wikidata.org/wiki/Q173285","display_name":"Digital data","level":3,"score":0.46766627},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.43074682},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.40401226},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.23778054},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2213006},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.20291013},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.16535711},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.16220397},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.14767003},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1117/12.465324","pdf_url":null,"source":{"id":"https://openalex.org/S183492911","display_name":"Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE","issn_l":"0277-786X","issn":["0277-786X","1996-756X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310315543","host_organization_name":"SPIE","host_organization_lineage":["https://openalex.org/P4310315543"],"host_organization_lineage_names":["SPIE"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://archive-ouverte.unige.ch/unige:47959","pdf_url":"https://access.archive-ouverte.unige.ch/access/metadata/8a16bf21-010c-4cde-9866-bc5bdaac1417/download","source":{"id":"https://openalex.org/S4306402259","display_name":"Archive ouverte UNIGE (University of Geneva)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I114457229","host_organization_name":"University of Geneva","host_organization_lineage":["https://openalex.org/I114457229"],"host_organization_lineage_names":["University of Geneva"],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://archive-ouverte.unige.ch/unige:47959","pdf_url":"https://access.archive-ouverte.unige.ch/access/metadata/8a16bf21-010c-4cde-9866-bc5bdaac1417/download","source":{"id":"https://openalex.org/S4306402259","display_name":"Archive ouverte UNIGE (University of Geneva)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I114457229","host_organization_name":"University of Geneva","host_organization_lineage":["https://openalex.org/I114457229"],"host_organization_lineage_names":["University of Geneva"],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":22,"referenced_works":["https://openalex.org/W1493698890","https://openalex.org/W1506757555","https://openalex.org/W1514337436","https://openalex.org/W1527181506","https://openalex.org/W1532906507","https://openalex.org/W1585214684","https://openalex.org/W1589812914","https://openalex.org/W1760182598","https://openalex.org/W1965280641","https://openalex.org/W1968822013","https://openalex.org/W1983913844","https://openalex.org/W201917955","https://openalex.org/W2048651174","https://openalex.org/W2127917840","https://openalex.org/W2145488453","https://openalex.org/W2154903392","https://openalex.org/W2161022751","https://openalex.org/W2161439181","https://openalex.org/W2170391307","https://openalex.org/W285471286","https://openalex.org/W4298032380","https://openalex.org/W756198136"],"related_works":["https://openalex.org/W4386274459","https://openalex.org/W4256644184","https://openalex.org/W4233393998","https://openalex.org/W3095859383","https://openalex.org/W2906371921","https://openalex.org/W2764992344","https://openalex.org/W2356840395","https://openalex.org/W2187024223","https://openalex.org/W2106872846","https://openalex.org/W1983585341"],"abstract_inverted_index":{"Novel":[0],"functional":[1],"possibilities,":[2],"provided":[3],"by":[4,24],"recent":[5],"data":[6,67,102,109,138,155],"hiding":[7,139],"technologies,":[8],"carry":[9],"out":[10],"the":[11,35,39,50,62,84,93,121,124,128,134],"danger":[12],"of":[13,52,95,130,136,144],"uncontrolled":[14],"(unauthorized)":[15],"and":[16,45,70,79,127,182,185],"unlimited":[17],"information":[18,152],"exchange":[19],"that":[20],"might":[21],"be":[22,170],"used":[23,171],"people":[25],"with":[26],"unfriendly":[27],"interests.":[28],"The":[29,111,141,166],"multimedia":[30,57],"industry":[31],"as":[32,34,73,75],"well":[33,74],"research":[36],"community":[37],"recognize":[38],"urgent":[40],"necessity":[41],"for":[42,55,64,80,92,98,172],"network":[43],"security":[44],"copyright":[46],"protection,":[47],"or":[48],"rather":[49],"lack":[51],"adequate":[53],"law":[54],"digital":[56,69],"protection.":[58],"This":[59],"paper":[60],"advocates":[61],"need":[63],"detecting":[65],"hidden":[66,86,101,154],"in":[68,76,104,133],"analog":[71],"media":[72],"electronic":[77],"transmissions,":[78],"attempting":[81],"to":[82,106,149,157],"identify":[83],"underlying":[85],"data.":[87],"Solving":[88],"this":[89],"problem":[90],"calls":[91],"development":[94,135],"an":[96],"architecture":[97,113],"blind":[99],"stochastic":[100,164],"detection":[103,160],"order":[105],"prevent":[107],"unauthorized":[108],"exchange.":[110],"proposed":[112],"is":[114,148],"called":[115],"StegoWall;":[116],"its":[117,159],"key":[118],"aspects":[119],"are":[120],"solid":[122],"investigation,":[123],"deep":[125],"understanding,":[126],"prediction":[129],"possible":[131],"tendencies":[132],"advanced":[137],"technologies.":[140],"basic":[142],"idea":[143],"our":[145],"complex":[146],"approach":[147],"exploit":[150],"all":[151],"about":[153],"statistics":[156],"perform":[158],"based":[161],"on":[162],"a":[163],"framework.":[165],"StegoWall":[167],"system":[168],"will":[169],"four":[173],"main":[174],"applications:":[175],"robust":[176],"watermarking,":[177],"secret":[178],"communications,":[179],"integrity":[180],"control":[181],"tamper":[183],"proofing,":[184],"internet/network":[186],"security.":[187]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2031737658","counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2024-12-14T01:42:41.728942","created_date":"2016-06-24"}