{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,30]],"date-time":"2024-12-30T18:37:22Z","timestamp":1735583842294},"reference-count":93,"publisher":"World Scientific Pub Co Pte Ltd","issue":"02","funder":[{"name":"GPU","award":["2016-00084-109-01"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Info. Tech. Dec. Mak."],"published-print":{"date-parts":[[2024,3]]},"abstract":" This paper presents a new approach based on multi-dimensional evaluation and benchmarking for data hiding techniques, i.e., watermarking and steganography. The novelty claim is the use of evaluation matrix (EM) for performance evaluation of data hiding techniques; however, one major problem with performance evaluation of data hiding techniques is to find reasonable thresholds for performance metrics and the trade-off among them in different data hiding applications. Two experiments are conducted. The first experiment included LSB techniques (eight approaches) based on different payload results and the noise gate approach; a total of nine approaches were used. Five audio samples with different audio styles are tested using each of the nine approaches and considering three evaluation criteria, namely, complexity, payload, and quality, to generate watermarked samples. The second experiment involves the use of various decision-making techniques simple additive weighting (SAW), multiplicative exponential weighting (MEW), hierarchical adaptive weighting (HAW), technique for order of preference by similarity to ideal solution (TOPSIS), weighted sum model (WSM) and weighted product method (WPM) to benchmark the results of the first experiment. Mean, standard deviation (STD), and paired sample t-test are then performed to compare the correlations among different techniques on the basis of ranking results. The findings are as follows: (1) A statistically significant difference is observed among the ranking results of each multi-criteria decision-making (MCDM) technique, (2) TOPSIS-Euclidean is the best technique to solve the benchmarking problem among digital watermarking techniques. (3) Among the decision-making techniques, WSM has the lowest rank in terms of solving the benchmarking problem. (4) Under different circumstances, the noise gate watermarking approach performs better than LSB algorithms. <\/jats:p>","DOI":"10.1142\/s0219622017500183","type":"journal-article","created":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T15:30:59Z","timestamp":1489678259000},"page":"1017-1058","source":"Crossref","is-referenced-by-count":62,"title":["A New Approach Based on Multi-Dimensional Evaluation and Benchmarking for Data Hiding Techniques"],"prefix":"10.1142","volume":"23","author":[{"given":"B.\u00a0B.","family":"Zaidan","sequence":"first","affiliation":[{"name":"Department of Computing, Faculty of Arts, Computing and Creative Industry, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia"}]},{"given":"A. A.","family":"Zaidan","sequence":"additional","affiliation":[{"name":"Department of Computing, Faculty of Arts, Computing and Creative Industry, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia"}]},{"given":"H. Abdul","family":"Karim","sequence":"additional","affiliation":[{"name":"Faculty of Engineering, Multimedia University, Cyberjaya, Selangor Darul Ehsan, Malaysia"}]},{"given":"N. N.","family":"Ahmad","sequence":"additional","affiliation":[{"name":"Faculty of Engineering, Multimedia University, Cyberjaya, Selangor Darul Ehsan, Malaysia"}]}],"member":"219","published-online":{"date-parts":[[2017,4,13]]},"reference":[{"key":"S0219622017500183BIB002","doi-asserted-by":"publisher","DOI":"10.1109\/79.879339"},{"key":"S0219622017500183BIB003","doi-asserted-by":"publisher","DOI":"10.3923\/jas.2010.2094.2100"},{"key":"S0219622017500183BIB004","doi-asserted-by":"publisher","DOI":"10.3923\/jas.2010.1825.1833"},{"key":"S0219622017500183BIB005","doi-asserted-by":"publisher","DOI":"10.3923\/jas.2010.1650.1655"},{"key":"S0219622017500183BIB006","doi-asserted-by":"publisher","DOI":"10.3923\/jas.2010.1644.1649"},{"key":"S0219622017500183BIB007","first-page":"294","volume":"9","author":"Naji A. W.","year":"2009","journal-title":"International Journal of Computer Science and Network Security"},{"key":"S0219622017500183BIB008","first-page":"185","volume":"2","author":"Zaidoon K. A.","year":"2010","journal-title":"Journal of Computing"},{"key":"S0219622017500183BIB009","doi-asserted-by":"publisher","DOI":"10.1109\/IACSIT-SC.2009.103"},{"key":"S0219622017500183BIB010","doi-asserted-by":"publisher","DOI":"10.1109\/IACSIT-SC.2009.105"},{"key":"S0219622017500183BIB011","first-page":"1796","volume":"11","author":"Zaidan B. B.","year":"2010","journal-title":"International Journal of Physical Sciences"},{"key":"S0219622017500183BIB012","first-page":"482","volume":"19","author":"Zaidan A. A.","year":"2009","journal-title":"Int. Conf. Computer Engineering and Applications, Telecom Technology and Applications"},{"key":"S0219622017500183BIB013","first-page":"1","author":"Zaidan A. A.","year":"2009","journal-title":"Proceedings of the World Congress on Engineering"},{"key":"S0219622017500183BIB014","first-page":"672","volume-title":"Int. Conf. on Future Computer and Communication","author":"Eltahir M. E.","year":"2009"},{"issue":"5","key":"S0219622017500183BIB015","first-page":"294","volume":"9","author":"Khalifa O.-O.","year":"2010","journal-title":"International Journal of Computer Science and Network Security (IJCSNS)"},{"key":"S0219622017500183BIB016","doi-asserted-by":"crossref","first-page":"63","DOI":"10.7763\/IJET.2009.V1.11","volume":"1","author":"Anas M.","year":"2009","journal-title":"International Journal of Engineering Technology"},{"key":"S0219622017500183BIB017","first-page":"3254","volume":"5","author":"Alam G. M.","year":"2010","journal-title":"Scientific Research and Essays"},{"key":"S0219622017500183BIB018","first-page":"493","volume":"56","author":"Naji A. W.","year":"2009","journal-title":"World Academy of Science Engineering and Technology"},{"key":"S0219622017500183BIB019","first-page":"1","volume":"1","author":"Zaidan A. A.","year":"2009","journal-title":"International Journal of Computer and Network Security"},{"key":"S0219622017500183BIB020","first-page":"273","volume":"7","author":"Islam R.","year":"2010","journal-title":"International Journal of Computer Science and Information Security"},{"key":"S0219622017500183BIB021","doi-asserted-by":"publisher","DOI":"10.7763\/IJET.2010.V2.103"},{"key":"S0219622017500183BIB022","first-page":"108","volume":"1","author":"Jalab H.","year":"2009","journal-title":"Journal of Computing"},{"key":"S0219622017500183BIB023","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2009.890.897"},{"key":"S0219622017500183BIB024","first-page":"425","volume-title":"Int. Conf. IACSIT Spring Conference","author":"Zaidan A. A.","year":"2009"},{"key":"S0219622017500183BIB025","doi-asserted-by":"publisher","DOI":"10.7763\/IJCEE.2009.V1.88"},{"issue":"7","key":"S0219622017500183BIB026","first-page":"343","volume":"3","author":"Zaidan B. B.","year":"2009","journal-title":"IPCV"},{"key":"S0219622017500183BIB027","first-page":"1776","volume":"5","author":"Zaidan A. A.","year":"2010","journal-title":"International Journal of the Physical Sciences"},{"key":"S0219622017500183BIB028","first-page":"84","volume-title":"Proc. European Signal Processing Conference","author":"Cvejic N.","year":"2005"},{"key":"S0219622017500183BIB029","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIT.2004.1412455"},{"key":"S0219622017500183BIB030","first-page":"468","volume":"54","author":"Zaidan A. A.","year":"2009","journal-title":"World Academy of Science Engineering and Technology"},{"key":"S0219622017500183BIB031","doi-asserted-by":"publisher","DOI":"10.7763\/IJCEE.2009.V1.100"},{"key":"S0219622017500183BIB032","doi-asserted-by":"publisher","DOI":"10.7763\/IJCEE.2009.V1.87"},{"key":"S0219622017500183BIB033","first-page":"73","volume":"3","author":"Naji A. W.","year":"2010","journal-title":"International Journal of Computer Science and Information Security"},{"key":"S0219622017500183BIB034","first-page":"74","volume-title":"AIKED\u201906 Proc. of the 5th WSEAS International Conf. Artificial Intelligence, Knowledge Engineering and Data Bases","author":"Augustine R.-J.","year":"2006"},{"key":"S0219622017500183BIB035","first-page":"1","volume":"1","author":"Bandyopadhyay S.-K.","year":"2012","journal-title":"International Journal of Advanced Research in Computer and Communication Engineering"},{"key":"S0219622017500183BIB036","first-page":"1965","volume":"5","author":"Zaidan A. A.","year":"2010","journal-title":"Scientific Research and Essays"},{"key":"S0219622017500183BIB037","doi-asserted-by":"publisher","DOI":"10.7763\/IJCTE.2010.V2.143"},{"key":"S0219622017500183BIB038","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2008.10.035"},{"key":"S0219622017500183BIB039","first-page":"1","volume":"46","author":"Kather S.-A.","year":"2012","journal-title":"International Journal of Computer Applications"},{"key":"S0219622017500183BIB040","first-page":"3837","volume":"6","author":"Kiah M. L.","year":"2011","journal-title":"International Journal of Physicial Sciences"},{"key":"S0219622017500183BIB041","first-page":"198","volume":"1","author":"Lashkari A.-H.","year":"2012","journal-title":"International Journal of New Computer Architectures and Their Applications"},{"key":"S0219622017500183BIB042","first-page":"1","volume":"1","author":"Patil M.-M.","year":"2012","journal-title":"International Journal of Engineering"},{"key":"S0219622017500183BIB043","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2008.4517963"},{"key":"S0219622017500183BIB044","first-page":"25","volume":"6","author":"Singla K.","year":"2012","journal-title":"Research Cell: An International Journal of Engineering Sciences"},{"key":"S0219622017500183BIB045","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOM.2007.4550357"},{"key":"S0219622017500183BIB046","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-010-0714-9"},{"key":"S0219622017500183BIB047","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLC.2007.4370824"},{"key":"S0219622017500183BIB048","first-page":"498","volume":"56","author":"Naji A. W.","year":"2010","journal-title":"World Academy of Science Engineering and Technology"},{"key":"S0219622017500183BIB049","doi-asserted-by":"publisher","DOI":"10.3923\/jas.2010.1834.1840"},{"key":"S0219622017500183BIB050","first-page":"67","volume-title":"Second Int. Conf. on Advances in Multimedia","author":"Ngan-Le T.-H.","year":"2010"},{"key":"S0219622017500183BIB051","doi-asserted-by":"publisher","DOI":"10.1117\/12.526714"},{"key":"S0219622017500183BIB053","first-page":"1","volume-title":"Proc. of Electronic Imaging and the Visual Arts","author":"Nikolaidis N.","year":"2002"},{"key":"S0219622017500183BIB054","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2020362"},{"key":"S0219622017500183BIB055","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2009.5413522"},{"key":"S0219622017500183BIB056","first-page":"5067","volume":"8","author":"Emami M.-S.","year":"2012","journal-title":"International Journal of Innovative Computing Information and Control"},{"key":"S0219622017500183BIB057","first-page":"1","volume":"7245","author":"Conotter V.","year":"2009","journal-title":"International Society for Optics and Photonics"},{"key":"S0219622017500183BIB058","first-page":"12","volume-title":"Proc. 2nd WAVILA Challenge","author":"Lang A.","year":"2007"},{"key":"S0219622017500183BIB059","volume-title":"Proc. 2nd WAVILA Challenge","author":"Kraetzer C.","year":"2007"},{"key":"S0219622017500183BIB060","first-page":"5389","volume":"7","author":"Lin S.-T.","year":"2011","journal-title":"International Journal of Innovative Computing, Information and Control"},{"key":"S0219622017500183BIB061","doi-asserted-by":"publisher","DOI":"10.3923\/jas.2010.59.64"},{"key":"S0219622017500183BIB062","doi-asserted-by":"publisher","DOI":"10.1117\/12.584201"},{"key":"S0219622017500183BIB063","doi-asserted-by":"publisher","DOI":"10.22452\/mjcs.vol22no1.5"},{"key":"S0219622017500183BIB064","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2004.1286660"},{"key":"S0219622017500183BIB065","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(02)00402-6"},{"key":"S0219622017500183BIB066","doi-asserted-by":"publisher","DOI":"10.1109\/5.286196"},{"key":"S0219622017500183BIB067","doi-asserted-by":"publisher","DOI":"10.1109\/26.477498"},{"key":"S0219622017500183BIB068","doi-asserted-by":"publisher","DOI":"10.1109\/AMS.2008.10"},{"key":"S0219622017500183BIB069","first-page":"1","volume":"1653","author":"Lee H.","year":"1992","journal-title":"Image Capture, Formatting, and Display"},{"key":"S0219622017500183BIB070","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2010.5652239"},{"key":"S0219622017500183BIB071","doi-asserted-by":"publisher","DOI":"10.1109\/QOMEX.2009.5246952"},{"key":"S0219622017500183BIB072","first-page":"1745","volume-title":"IEEE Int. Conf. Acoustics, Speech and Signal Processing","author":"Yiqing L.","year":"2008"},{"key":"S0219622017500183BIB073","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"S0219622017500183BIB074","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2004.10.003"},{"key":"S0219622017500183BIB075","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s40064-015-1659-2","volume":"5","author":"Belal N.-A.","year":"2016","journal-title":"SpringerPlus"},{"key":"S0219622017500183BIB076","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-0114(97)00377-1"},{"key":"S0219622017500183BIB077","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2006.03.023"},{"key":"S0219622017500183BIB078","doi-asserted-by":"publisher","DOI":"10.3846\/20294913.2016.1210694"},{"key":"S0219622017500183BIB079","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.02.137"},{"key":"S0219622017500183BIB080","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622012500095"},{"key":"S0219622017500183BIB081","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2013.10.019"},{"key":"S0219622017500183BIB082","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2013.11.035"},{"key":"S0219622017500183BIB083","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622008003204"},{"key":"S0219622017500183BIB084","doi-asserted-by":"publisher","DOI":"10.1016\/j.omega.2011.01.009"},{"key":"S0219622017500183BIB085","doi-asserted-by":"publisher","DOI":"10.1057\/jors.2015.1"},{"key":"S0219622017500183BIB086","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(02)00227-8"},{"issue":"1","key":"S0219622017500183BIB087","first-page":"31","volume":"1","author":"Aruldoss M.","year":"2013","journal-title":"American Journal of Infectious Diseases"},{"key":"S0219622017500183BIB088","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(97)00147-1"},{"key":"S0219622017500183BIB089","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2015.07.002"},{"key":"S0219622017500183BIB090","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2014.11.012"},{"key":"S0219622017500183BIB091","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2010.07.014"},{"key":"S0219622017500183BIB092","first-page":"1","volume":"32","author":"Qahtan M.-Y.","year":"2017","journal-title":"International Journal of Pattern Recognition and Artificial Intelligence"},{"key":"S0219622017500183BIB093","doi-asserted-by":"publisher","DOI":"10.15388\/Informatica.2009.252"},{"key":"S0219622017500183BIB094","volume-title":"Software: Practice and Experience","author":"Zaidan B. B.","year":"2017"},{"issue":"6","key":"S0219622017500183BIB095","first-page":"1","volume":"26","author":"Zaidan B. B.","year":"2017","journal-title":"Journal of Circuits, Systems and Computers"}],"container-title":["International Journal of Information Technology & Decision Making"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0219622017500183","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,16]],"date-time":"2024-04-16T07:35:06Z","timestamp":1713252906000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0219622017500183"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,13]]},"references-count":93,"journal-issue":{"issue":"02","published-print":{"date-parts":[[2024,3]]}},"alternative-id":["10.1142\/S0219622017500183"],"URL":"https:\/\/doi.org\/10.1142\/s0219622017500183","relation":{},"ISSN":["0219-6220","1793-6845"],"issn-type":[{"value":"0219-6220","type":"print"},{"value":"1793-6845","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4,13]]}}}