{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T23:58:58Z","timestamp":1776902338383,"version":"3.51.2"},"reference-count":56,"publisher":"Tech Science Press","issue":"2","license":[{"start":{"date-parts":[[2024,11,24]],"date-time":"2024-11-24T00:00:00Z","timestamp":1732406400000},"content-version":"vor","delay-in-days":328,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.053706","type":"journal-article","created":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T06:56:53Z","timestamp":1729234613000},"page":"2727-2751","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":10,"title":["A Shuffling-Steganography Algorithm to Protect Data of Drone Applications"],"prefix":"10.32604","volume":"81","author":[{"given":"Ahamad B.","family":"Alkodre","sequence":"first","affiliation":[]},{"given":"Nour Mahmoud","family":"Bahbouh","sequence":"additional","affiliation":[]},{"given":"Sandra","family":"Sendra","sequence":"additional","affiliation":[]},{"given":"Adnan Ahmed Abi","family":"Sen","sequence":"additional","affiliation":[]},{"given":"Yazed","family":"Alsaawy","sequence":"additional","affiliation":[]},{"given":"Saad Said","family":"Alqahtany","sequence":"additional","affiliation":[]},{"given":"Abdallah","family":"Namoun","sequence":"additional","affiliation":[]},{"given":"Hani","family":"Almoamari","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.scijus.2021.11.002","article-title":"Applications of drone in disaster management: A scoping review","volume":"62","author":"Daud","year":"2022","journal-title":"Sci. Justice"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"2500","DOI":"10.20546\/ijcmas.2019.801.264","article-title":"Application of drone in agriculture","volume":"8","author":"Ahirwar","year":"2019","journal-title":"Int. J. Curr. Microbiol. Appl. Sci."},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.3390\/drones6010015","article-title":"Drone applications fighting COVID-19 pandemic\u2014Towards good practices","volume":"6","author":"Rest\u00e1s","year":"2022","journal-title":"Drones"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"12425","DOI":"10.1109\/JIOT.2021.3137362","article-title":"IoTaaS: Drone-based Internet of Things as a service framework for smart cities","volume":"9","author":"Hoque","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref5","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/j.paerosci.2017.04.003","article-title":"Classifications, applications, and design challenges of drones: A review","volume":"91","author":"Hassanalian","year":"2017","journal-title":"Prog. Aerosp. Sci."},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2020.100218","article-title":"Security analysis of drones systems: Attacks, limitations, and recommendations","volume":"11","author":"Yaacoub","year":"2020, Art. no. 100218","journal-title":"Internet of Things"},{"key":"ref7","first-page":"189","article-title":"Preserving privacy in internet of things: A survey","volume":"10","author":"Abi Sen","year":"2018","journal-title":"Int. J. Inf. Technol."},{"key":"ref8","series-title":"2019 6th Int. Conf. Comput. Sustain. Global Dev. (INDIACom)","first-page":"1282","article-title":"A comparative study between security and privacy","author":"Abi Sen","year":"2019"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"2049","DOI":"10.22214\/ijraset.2022.44279","article-title":"Types and tools of steganography","volume":"10","author":"Arora","year":"2022","journal-title":"Int. J. Res. Appl. Sci. Eng. Technol."},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2024.123748","article-title":"Cryptanalysis of an image encryption scheme using variant Hill cipher and chaos","volume":"250","author":"Wen","year":"2024, Art. no. 123748","journal-title":"Expert. Syst. Appl."},{"key":"ref11","article-title":"Cryptanalyzing an image cipher using multiple chaos and DNA operations","volume":"35","author":"Wen","year":"2023, Art. no. 101612","journal-title":"J. King Saud Univ.\u2014Comput. Inf. Sci."},{"key":"ref12","article-title":"Cryptanalyzing a bit-level image encryption algorithm based on chaotic maps","volume":"51","author":"Wen","year":"2024, Art. no. 101634","journal-title":"Eng. Sci. Technol., Int. J."},{"key":"ref13","doi-asserted-by":"crossref","first-page":"145459","DOI":"10.1109\/ACCESS.2021.3123571","article-title":"Cryptanalysis and improvement of the image encryption scheme based on Feistel network and dynamic DNA encoding","volume":"9","author":"Feng","year":"2021","journal-title":"IEEE Access"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2024.123190","article-title":"Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption","volume":"246","author":"Feng","year":"2024, Art. no. 123190","journal-title":"Expert. Syst. Appl."},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.3390\/s22031109","article-title":"A dynamic four-step data security model for data in cloud computing based on cryptography and steganography","volume":"22","author":"Adee","year":"2022, Art. no. 1109","journal-title":"Sensors"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.3390\/math9212829","article-title":"A review on text steganography techniques","volume":"9","author":"Majeed","year":"2021, Art. no. 2829","journal-title":"Mathematics"},{"key":"ref17","first-page":"297","article-title":"A comparative overview & analysis of text and image steganography","volume":"22","author":"Sharma","year":"2019","journal-title":"Think India J."},{"key":"ref18","first-page":"11246","article-title":"Comparative analysis of different steganography technique for image or data security","volume":"29","author":"Kumar","year":"2020","journal-title":"Int. J. Adv. Sci. Technol. (IJAST)"},{"key":"ref19","article-title":"Text steganography techniques: A review","volume":"7","author":"Idres","year":"2023","journal-title":"Int. Res. J. Innov. Eng. Technol."},{"key":"ref20","doi-asserted-by":"crossref","first-page":"849","DOI":"10.1007\/978-3-030-22277-2_34","author":"Kumar","year":"2020","journal-title":"Handbook of Computer Networks and Cyber Security: Principles and Paradigms"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.3390\/app11156851","article-title":"A comparative analysis of Arabic text steganography","volume":"11","author":"Thabit","year":"2021, Art. no. 6851","journal-title":"Appl. Sci."},{"key":"ref22","doi-asserted-by":"crossref","first-page":"4110","DOI":"10.24996\/ijs.2021.62.11.31","article-title":"Text-based steganography using Huffman compression and AES encryption algorithm","author":"Ali","year":"2021","journal-title":"Iraqi J. Sci."},{"key":"ref23","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/LSP.2020.3042413","article-title":"Linguistic steganography: From symbolic space to semantic space","volume":"28","author":"Zhang","year":"2020","journal-title":"IEEE Signal Process. Lett."},{"key":"ref24","doi-asserted-by":"crossref","first-page":"11037","DOI":"10.1007\/s13369-020-04917-5","article-title":"Functionality-improved Arabic text steganography based on unicode features","volume":"45","author":"Alanazi","year":"2020","journal-title":"Arab. J. Sci. Eng."},{"key":"ref25","article-title":"A dynamic multi-layer steganography approach based on arabic letters","volume":"13","author":"Alqahtany","year":"2023, Art. no. 7294","journal-title":"Diacritics Image Layers. Appl. Sci."},{"key":"ref26","first-page":"1559","article-title":"Arabic text steganography using lunar and solar diacritics","volume":"31","author":"Ali","year":"2023","journal-title":"Indones. J. Electr. Eng. Comput. Sci."},{"key":"ref27","doi-asserted-by":"crossref","first-page":"23409","DOI":"10.1109\/ACCESS.2021.3053998","article-title":"Image steganography: A review of the recent advances","volume":"9","author":"Subramanian","year":"2021","journal-title":"IEEE Access"},{"key":"ref28","first-page":"109","article-title":"Comparison of steganographic techniques of spatial domain and frequency domain in digital images","volume":"6","author":"Din","year":"2023","journal-title":"Borneo Int. J."},{"key":"ref29","doi-asserted-by":"crossref","first-page":"69","DOI":"10.32604\/iasc.2021.014773","article-title":"Image steganography in spatial domain: Current status, techniques, and trends","volume":"27","author":"Alhomoud","year":"2021","journal-title":"Intell. Autom. Soft Comput."},{"key":"ref30","doi-asserted-by":"crossref","first-page":"15977","DOI":"10.1007\/s11042-020-10298-6","article-title":"Cover independent image steganography in spatial domain using higher order pixel bits","volume":"80","author":"Maji","year":"2021","journal-title":"Multimed. Tools Appl."},{"key":"ref31","series-title":"Cyber Secur. Comput. Sci.: Second EAI Int. Conf., ICONCS 2020, Dhaka, Bangladesh","first-page":"101","article-title":"A new 8-directional pixel selection technique of LSB based image steganography","volume":"2","author":"Alam","year":"2020"},{"key":"ref32","series-title":"2022 Int. Conf. Data Sci. Intell. Comput. (ICDSIC), Karbala, Iraq","first-page":"170","article-title":"Multi-layer security for color image based on five-dimension chaotic system and image steganography algorithm","author":"Ahmed","year":"2022"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"2779","DOI":"10.1109\/TCSVT.2020.3033945","article-title":"Coverless image steganography based on multi-object recognition","volume":"31","author":"Luo","year":"2020","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref34","doi-asserted-by":"crossref","first-page":"16363","DOI":"10.1007\/s11042-018-6975-4","article-title":"Edge based image steganography with variable threshold","volume":"78","author":"Mukherjee","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref35","first-page":"278","article-title":"Image steganography using time and frequency domain","volume":"2","author":"Ahmed","year":"2019","journal-title":"Int. J. Res. Eng., Sci. Manag."},{"key":"ref36","series-title":"2018 Int. Conf. Intell. Circuits Syst. (ICICS)","first-page":"258","article-title":"A video steganography in spatial, discrete wavelet transform and integer wavelet domain","author":"Yadav","year":"Apr. 2018"},{"key":"ref37","article-title":"A novel text steganography technique to Arabic language using reverse Fat5Th5Ta","volume":"1","author":"Memon","year":"2015","journal-title":"Pak. J. Eng., Technol. Sci."},{"key":"ref38","first-page":"32","article-title":"Sharp-edges method in Arabic text steganography","volume":"33","author":"Roslan","year":"2011","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"ref39","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.121452","article-title":"PSO-based image encryption scheme using modular integrated logistic exponential map","volume":"237","author":"Kocak","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"ref40","doi-asserted-by":"crossref","first-page":"57139","DOI":"10.1007\/s11042-023-17745-0","article-title":"Image encryption algorithms based on two-dimensional discrete hyperchaotic systems and parallel compressive sensing","volume":"83","author":"Gao","year":"2024","journal-title":"Multimed. Tools Appl."},{"key":"ref41","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2024.123583","article-title":"Cross-channel color image encryption through 2D hyperchaotic hybrid map of optimization test functions","volume":"249","author":"Toktas","year":"2024, Art. no. 123583","journal-title":"Expert. Syst. Appl."},{"key":"ref42","article-title":"Using chaos to encrypt images with reconstruction through deep learning model for smart healthcare","volume":"114","author":"Baranwal","year":"2024, Art. no. 109089","journal-title":"Comput. Electr. Eng."},{"key":"ref43","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2022.119076","article-title":"2D hyperchaotic system based on Schaffer function for image encryption","volume":"213","author":"Erkan","year":"2023, Art. no. 119076","journal-title":"Expert. Syst. Appl."},{"key":"ref44","doi-asserted-by":"crossref","DOI":"10.1007\/s44196-024-00535-3","article-title":"Lightweight image encryption using a novel chaotic technique for the safe internet of things","volume":"17","author":"Gilmolk","year":"2024","journal-title":"Int. J. Comput. Intell. Syst."},{"key":"ref45","doi-asserted-by":"crossref","first-page":"85150","DOI":"10.1109\/ACCESS.2024.3415083","article-title":"Billiard quantum chaos: A pioneering image encryption scheme in the post-quantum era","volume":"12","author":"Hwang","year":"2024","journal-title":"IEEE Access"},{"key":"ref46","series-title":"2021 8th Int. Conf. Comput. Sustain. Global Dev. (INDIACom)","first-page":"370","article-title":"Double steganography-new algorithm for more security","author":"Alsaawy","year":"Mar. 2021"},{"key":"ref47","unstructured":"A. Al-Mohammad, \u201cSteganography-based secret and reliable communications: Improving steganographic capacity and imperceptibility,\u201d Doctoral dissertation, Brunel Univ., School of Inf. Syst., 2010."},{"key":"ref48","doi-asserted-by":"crossref","DOI":"10.1142\/S0218126620500425","article-title":"Toward a unified performance metric for benchmarking steganography systems","volume":"29","author":"Rabie","year":"2020","journal-title":"J. Circuits, Syst. Comput."},{"key":"ref49","first-page":"37","article-title":"Performance comparison of steganography techniques","volume":"10","author":"Sharma","year":"2018","journal-title":"Int. J. Comput. Netw. Inf. Secur."},{"key":"ref50","doi-asserted-by":"crossref","first-page":"207","DOI":"10.47839\/ijc.18.2.1419","article-title":"Frame selective and dynamic pattern based model for effective and secure video watermarking","volume":"18","author":"Juneja","year":"2019","journal-title":"Int. J. Comput."},{"key":"ref51","doi-asserted-by":"crossref","unstructured":"R. Roselinkiruba, T. S. Sharmila, and J. J. Julina, \u201cA novel pattern-based reversible data hiding technique for video steganography,\u201d 2022. Accessed: Jun. 22, 2024. Available: https:\/\/www.researchsquare.com\/article\/rs-1619375\/v1","DOI":"10.21203\/rs.3.rs-1619375\/v1"},{"key":"ref52","first-page":"1","article-title":"HIDDEn: Robust data hiding for medical images with encryption and local binary pattern","volume":"43","author":"Baranwal","year":"2024","journal-title":"Circuits, Syst., Signal Process."},{"key":"ref53","doi-asserted-by":"crossref","DOI":"10.1016\/j.displa.2022.102268","article-title":"Robust data hiding scheme through distinct keypoint selection exploiting modified Bilateral-Laplacian SIFT with encoding pipeline","volume":"74","author":"Singh","year":"2022","journal-title":"Displays"},{"key":"ref54","doi-asserted-by":"crossref","DOI":"10.3390\/e24070982","article-title":"Rate-distortion-based stego: A large-capacity secure steganography scheme for hiding digital images","volume":"24","author":"Pan","year":"2022","journal-title":"Entropy"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"1909","DOI":"10.1049\/ipr2.12161","article-title":"CSIS: Compressed sensing-based enhanced-embedding capacity image steganography scheme","volume":"15","author":"Agrawal","year":"2021","journal-title":"IET Image Process."},{"key":"ref56","article-title":"An improved RDWT-based image steganography scheme with qr decomposition and double entropy","volume":"11","author":"Ng","year":"2020","journal-title":"Int. J. Adv. Comput. Sci. Appl."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/files\/cmc\/2024\/TSP_CMC-81-2\/TSP_CMC_53706\/TSP_CMC_53706.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T03:59:53Z","timestamp":1741319993000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n2\/58628"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":56,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.053706","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-05-08","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-09-27","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-18","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}