{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:51:16Z","timestamp":1767340276898,"version":"3.37.3"},"reference-count":47,"publisher":"Wiley","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Union","doi-asserted-by":"crossref","award":["2015CA-SF-04"],"award-info":[{"award-number":["2015CA-SF-04"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"crossref"}]},{"name":"University of Granma","award":["2015CA-SF-04"],"award-info":[{"award-number":["2015CA-SF-04"]}]},{"name":"Fundaci\u00f3n EPAS","award":["2015CA-SF-04"],"award-info":[{"award-number":["2015CA-SF-04"]}]},{"name":"Universidad Cat\u00f3lica de Temuco","award":["2015CA-SF-04"],"award-info":[{"award-number":["2015CA-SF-04"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2017]]},"abstract":"<jats:p>This contribution proposes a novel steganographic method based on the compression standard according to the Joint Photographic Expert Group and an Entropy Thresholding technique. The steganographic algorithm uses one public key and one private key to generate a binary sequence of pseudorandom numbers that indicate where the elements of the binary sequence of a secret message will be inserted. The insertion takes eventually place at the first seven AC coefficients in the transformed DCT domain. Before the insertion of the message the image undergoes several transformations. After the insertion the inverse transformations are applied in reverse order to the original transformations. The insertion itself takes only place if an entropy threshold of the corresponding block is satisfied and if the pseudorandom number indicates to do so. The experimental work on the validation of the algorithm consists of the calculation of the peak signal-to-noise ratio (PSNR), the difference and correlation distortion metrics, the histogram analysis, and the relative entropy, comparing the same characteristics for the cover and stego image. The proposed algorithm improves the level of imperceptibility analyzed through the PSNR values. A steganalysis experiment shows that the proposed algorithm is highly resistant against the Chi-square attack.<\/jats:p>","DOI":"10.1155\/2017\/5397082","type":"journal-article","created":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T21:00:36Z","timestamp":1488402036000},"page":"1-14","source":"Crossref","is-referenced-by-count":21,"title":["A Secure Steganographic Algorithm Based on Frequency Domain for the Transmission of Hidden Information"],"prefix":"10.1155","volume":"2017","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3488-3094","authenticated-orcid":true,"given":"A.","family":"Soria-Lorente","sequence":"first","affiliation":[{"name":"Department of Basic Sciences, Granma University, Bayamo, Cuba"},{"name":"Departamento de Ciencias Matem\u00e1ticas y F\u00edsicas, Casilla 15 D, Universidad Cat\u00f3lica de Temuco, Temuco, Chile"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8479-261X","authenticated-orcid":true,"given":"S.","family":"Berres","sequence":"additional","affiliation":[{"name":"Departamento de Ciencias Matem\u00e1ticas y F\u00edsicas, Casilla 15 D, Universidad Cat\u00f3lica de Temuco, Temuco, Chile"}]}],"member":"311","reference":[{"issue":"2","key":"39","first-page":"116","volume":"10","year":"2016","journal-title":"Revista Cubana de Ciencias Inform\u00e1ticas"},{"key":"19","first-page":"333","volume":"1","year":"2015","journal-title":"International Journal of Engineering Science Invention Research and Development"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.17148\/ijarcce.2015.4149"},{"key":"25","first-page":"54","volume":"2","year":"2013","journal-title":"International Journal of Computer Science and Mobile Computing"},{"issue":"1","key":"40","first-page":"319","volume":"5","year":"2014","journal-title":"International Journal of Computer Science and Information Technologies"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(02)00402-6"},{"key":"36","first-page":"1","volume":"1","year":"2012","journal-title":"International Journal of Latest Research in Science and Technology"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2010.08.007"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2014.08.022"},{"key":"18","first-page":"226","volume":"3","year":"2014","journal-title":"International Journal of Scientific and Technology Research"},{"issue":"4","key":"3","first-page":"265","volume":"16","year":"2014","journal-title":"International Journal of Network Security"},{"issue":"1","key":"28","first-page":"68","volume":"17","year":"2015","journal-title":"Journal of Computer Engineering"},{"issue":"1","key":"16","first-page":"30","volume":"4","year":"2015","journal-title":"International Journal of Emerging Trends & Technology in Computer Science"},{"issue":"4","key":"2","first-page":"583","volume":"4","year":"2013","journal-title":"International Journal of Computer Science and Information Technologies"},{"issue":"4","key":"30","first-page":"603","volume":"2","year":"2013","journal-title":"International Journal of Engineering and Advanced Technology"},{"key":"27","first-page":"141","volume":"3","year":"2013","journal-title":"Journal of Biological Systems"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.3923\/rjit.2014.207.215"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.3923\/rjit.2013.263.276"},{"issue":"4","key":"15","first-page":"26","volume":"3","year":"2012","journal-title":"Journal of Global Research in Computer Science"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.5121\/ijcis.2012.2314"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.5121\/sipij.2010.1206"},{"issue":"5","key":"35","first-page":"508","volume":"8","year":"2013","journal-title":"Journal of Engineering Science and Technology"},{"issue":"7","key":"38","first-page":"2039","volume":"4","year":"2013","journal-title":"International Journal of Computer Trends and Technology"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2014.09.001"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/msecp.2003.1203220"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45496-9_21"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16435-4_13"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2014.01.027"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.998"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0255(01)00194-3"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.09.008"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2006.10.014"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.02.019"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.02.008"},{"issue":"4","key":"45","first-page":"169","volume":"11","year":"2007","journal-title":"Cient\u00edfica"},{"issue":"3","key":"9","first-page":"220","volume":"1","year":"2010","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.05.032"},{"issue":"1","key":"14","doi-asserted-by":"crossref","first-page":"90","DOI":"10.21307\/ijssis-2017-750","volume":"8","year":"2015","journal-title":"International Journal on Smart Sensing and Intelligent Systems"},{"year":"1996","key":"37"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-008-0327-7"},{"key":"12","first-page":"548","volume":"21","year":"2013","journal-title":"Turkish Journal of Electrical Engineering and Computer Sciences"},{"key":"20","first-page":"1","volume-title":"A fair benchmark for image watermarking systems","volume":"3657","year":"1999"},{"issue":"3","key":"44","first-page":"177","volume":"2","year":"2011","journal-title":"International Journal of Computer Science and Technology"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.5815\/ijigsp.2015.05.08"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2004.02.003"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.3923\/itj.2011.1285.1294"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2008.03.005"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2017\/5397082.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2017\/5397082.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2017\/5397082.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,17]],"date-time":"2020-05-17T17:00:28Z","timestamp":1589734828000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2017\/5397082\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":47,"alternative-id":["5397082","5397082"],"URL":"https:\/\/doi.org\/10.1155\/2017\/5397082","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2017]]}}}