{"id":"https://openalex.org/W3028975983","doi":"https://doi.org/10.1111/coin.12348","title":"A robust image steganography using teaching learning based optimization based edge detection model for smart cities","display_name":"A robust image steganography using teaching learning based optimization based edge detection model for smart cities","publication_year":2020,"publication_date":"2020-05-28","ids":{"openalex":"https://openalex.org/W3028975983","doi":"https://doi.org/10.1111/coin.12348","mag":"3028975983"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1111/coin.12348","pdf_url":null,"source":{"id":"https://openalex.org/S56561474","display_name":"Computational Intelligence","issn_l":"0824-7935","issn":["0824-7935","1467-8640"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045820191","display_name":"K. Dhanasekaran","orcid":"https://orcid.org/0000-0002-1667-7804"},"institutions":[],"countries":["IN"],"is_corresponding":true,"raw_author_name":"K. Dhanasekaran","raw_affiliation_strings":["Department of Electronics and Communication Engineering, Mailam Engineering College, Villupuram, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Communication Engineering, Mailam Engineering College, Villupuram, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103029420","display_name":"P. Anandan","orcid":"https://orcid.org/0000-0001-9205-9015"},"institutions":[{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"P. Anandan","raw_affiliation_strings":["Department of Electronics and Communication Engineering, C. Abdul Hakeem College of Engineering and Technology, Vellore, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Communication Engineering, C. Abdul Hakeem College of Engineering and Technology, Vellore, India","institution_ids":["https://openalex.org/I876193797"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074800368","display_name":"N. Kumaratharan","orcid":"https://orcid.org/0000-0002-0097-3385"},"institutions":[],"countries":["IN"],"is_corresponding":false,"raw_author_name":"N. Kumaratharan","raw_affiliation_strings":["Department of Electronics and Communication Engineering, Sri Venkateswara College of Engineering, Chennai, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Communication Engineering, Sri Venkateswara College of Engineering, Chennai, India","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5045820191"],"corresponding_institution_ids":[],"apc_list":{"value":3450,"currency":"USD","value_usd":3450,"provenance":"doaj"},"apc_paid":null,"fwci":0.294,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.512746,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":74,"max":77},"biblio":{"volume":"36","issue":"3","first_page":"1275","last_page":"1289"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9854,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.567227},{"id":"https://openalex.org/keywords/information-embedding","display_name":"Information Embedding","score":0.56496},{"id":"https://openalex.org/keywords/image-encryption","display_name":"Image Encryption","score":0.519026},{"id":"https://openalex.org/keywords/image-authentication","display_name":"Image Authentication","score":0.503619}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.72830296},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.6682596},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5643815},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.56158584},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.53962725},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5224449},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.50346273},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.37582326},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3214933},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.32010773},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1111/coin.12348","pdf_url":null,"source":{"id":"https://openalex.org/S56561474","display_name":"Computational Intelligence","issn_l":"0824-7935","issn":["0824-7935","1467-8640"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/11","display_name":"Sustainable cities and communities","score":0.51}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":17,"referenced_works":["https://openalex.org/W2028197392","https://openalex.org/W2060164286","https://openalex.org/W2102511552","https://openalex.org/W2122942551","https://openalex.org/W2131770186","https://openalex.org/W2146621575","https://openalex.org/W2151346626","https://openalex.org/W2161022751","https://openalex.org/W2218458479","https://openalex.org/W2472619024","https://openalex.org/W2515052291","https://openalex.org/W2610108311","https://openalex.org/W2793384337","https://openalex.org/W2802364841","https://openalex.org/W3008323108","https://openalex.org/W4301198654","https://openalex.org/W93971839"],"related_works":["https://openalex.org/W38533693","https://openalex.org/W3035059915","https://openalex.org/W2969135852","https://openalex.org/W2892069487","https://openalex.org/W2741842698","https://openalex.org/W2521839693","https://openalex.org/W2312145515","https://openalex.org/W2265739152","https://openalex.org/W2188948172","https://openalex.org/W1760333999"],"abstract_inverted_index":{"Abstract":[0],"Recently,":[1],"Internet":[2,55],"becomes":[3],"a":[4,28,82,100,139],"most":[5],"common":[6],"medium":[7],"for":[8,64],"transferring":[9],"critical":[10],"data":[11,18,32],"and":[12,48,69,109,123,145],"the":[13,16,36,40,49,54,72,107,118,121,124,128,131,146,150,154],"security":[14,37],"of":[15,31,39,51,153],"transmitted":[17],"gains":[19],"maximum":[20],"priority.":[21],"Image":[22],"steganography":[23,60,86],"has":[24],"been":[25],"developed":[26],"as":[27],"well\u2010known":[29],"model":[30,61],"hiding":[33],"which":[34,103],"verifies":[35],"level":[38],"transferred":[41],"data.":[42],"The":[43,96,114,133],"images":[44],"offer":[45],"high":[46],"capacity,":[47],"occurrence":[50],"accessibility":[52],"over":[53],"is":[56,62,98,104],"more.":[57],"An":[58],"effective":[59],"required":[63],"achieving":[65],"better":[66],"embedding":[67],"capacity":[68],"also":[70],"maintaining":[71],"other":[73],"variables":[74],"in":[75,112,138],"an":[76],"acceptable":[77],"value.":[78],"This":[79],"article":[80],"introduces":[81],"new":[83],"robust":[84],"image":[85],"using":[87],"Teaching":[88],"Learning":[89],"Based":[90],"Optimization":[91],"(TLBO)":[92],"edge":[93],"detection":[94],"model.":[95,156],"TBLO":[97],"basically":[99],"metaheuristic":[101],"algorithm":[102],"inspired":[105],"from":[106,120],"teaching":[108],"learning":[110,119],"procedure":[111],"classrooms.":[113],"former":[115],"stage":[116],"indicates":[117],"teacher":[122],"latter":[125],"phase":[126],"represents":[127],"interaction":[129],"among":[130],"learners.":[132],"experimental":[134],"validation":[135],"takes":[136],"place":[137],"comprehensive":[140],"way":[141],"under":[142],"several":[143],"views":[144],"outcome":[147],"pointed":[148],"out":[149],"superior":[151],"results":[152],"presented":[155]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3028975983","counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2}],"updated_date":"2024-12-05T19:41:22.341588","created_date":"2020-06-05"}