{"id":"https://openalex.org/W4398163667","doi":"https://doi.org/10.1109/dcc58796.2024.00052","title":"Light-weight Steganography for HPC Lossy Compression","display_name":"Light-weight Steganography for HPC Lossy Compression","publication_year":2024,"publication_date":"2024-03-19","ids":{"openalex":"https://openalex.org/W4398163667","doi":"https://doi.org/10.1109/dcc58796.2024.00052"},"language":"en","primary_location":{"id":"doi:10.1109/dcc58796.2024.00052","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/dcc58796.2024.00052","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 Data Compression Conference (DCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007288400","display_name":"Ruiwen Shan","orcid":null},"institutions":[{"id":"https://openalex.org/I8078737","display_name":"Clemson University","ror":"https://ror.org/037s24f05","country_code":"US","type":"education","lineage":["https://openalex.org/I8078737"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ruiwen Shan","raw_affiliation_strings":["Clemson University,Holcombe Department of Electrical and Computer Engineering,Clemson,SC,USA,29634"],"affiliations":[{"raw_affiliation_string":"Clemson University,Holcombe Department of Electrical and Computer Engineering,Clemson,SC,USA,29634","institution_ids":["https://openalex.org/I8078737"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003772863","display_name":"Jon C. Calhoun","orcid":"https://orcid.org/0000-0001-7191-4422"},"institutions":[{"id":"https://openalex.org/I8078737","display_name":"Clemson University","ror":"https://ror.org/037s24f05","country_code":"US","type":"education","lineage":["https://openalex.org/I8078737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jon C. Calhoun","raw_affiliation_strings":["Clemson University,Holcombe Department of Electrical and Computer Engineering,Clemson,SC,USA,29634"],"affiliations":[{"raw_affiliation_string":"Clemson University,Holcombe Department of Electrical and Computer Engineering,Clemson,SC,USA,29634","institution_ids":["https://openalex.org/I8078737"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5007288400"],"corresponding_institution_ids":["https://openalex.org/I8078737"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.06409199,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"442","last_page":"451"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/lossy-compression","display_name":"Lossy compression","score":0.9295945167541504},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8295338153839111},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.6742664575576782},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.5902822613716125},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5476809740066528},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.543828010559082},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5312682390213013},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.4824410080909729},{"id":"https://openalex.org/keywords/data-transmission","display_name":"Data transmission","score":0.4507187008857727},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.41195154190063477},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3998333811759949},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.37841761112213135},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3052224814891815},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2575465738773346},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.14124253392219543},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.1188713014125824},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1184922456741333}],"concepts":[{"id":"https://openalex.org/C165021410","wikidata":"https://www.wikidata.org/wiki/Q55564","display_name":"Lossy compression","level":2,"score":0.9295945167541504},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8295338153839111},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.6742664575576782},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.5902822613716125},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5476809740066528},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.543828010559082},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5312682390213013},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.4824410080909729},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.4507187008857727},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.41195154190063477},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3998333811759949},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.37841761112213135},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3052224814891815},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2575465738773346},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.14124253392219543},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.1188713014125824},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1184922456741333}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dcc58796.2024.00052","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/dcc58796.2024.00052","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 Data Compression Conference (DCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1504695911","https://openalex.org/W1528999146","https://openalex.org/W2052440657","https://openalex.org/W2086748522","https://openalex.org/W2749566333","https://openalex.org/W2752929869","https://openalex.org/W2959531572","https://openalex.org/W3134876667","https://openalex.org/W3173451050","https://openalex.org/W4224868718","https://openalex.org/W4226076355","https://openalex.org/W4312687723","https://openalex.org/W4318147817","https://openalex.org/W4380591142","https://openalex.org/W6685010111","https://openalex.org/W6888055016"],"related_works":["https://openalex.org/W3203504906","https://openalex.org/W2497446005","https://openalex.org/W2171676767","https://openalex.org/W4312890355","https://openalex.org/W2189589914","https://openalex.org/W83713408","https://openalex.org/W4293373802","https://openalex.org/W4318577714","https://openalex.org/W1716757876","https://openalex.org/W4285356283"],"abstract_inverted_index":{"The":[0,132],"explosive":[1],"data":[2,17,26,30,51,59,71,82,105],"growth":[3],"in":[4],"high-performance":[5],"computing":[6],"(HPC)":[7],"puts":[8],"pressure":[9],"on":[10,93,113],"systems":[11],"to":[12,21,56,80,167],"process":[13],"huge":[14],"amounts":[15],"of":[16,24,45,64,128,141,150],"and":[18,146],"poses":[19],"threats":[20],"the":[22,62,94,114,118,129,142,174],"security":[23],"important":[25],"during":[27],"transmission.":[28],"Traditional":[29],"protection":[31],"methods":[32],"such":[33],"as":[34],"encryption":[35],"inevitably":[36],"attracts":[37],"intermediate":[38],"intercepting":[39],"entities'":[40],"attention.":[41],"As":[42],"a":[43,70,89,148,169],"means":[44],"hiding":[46],"information":[47],"within":[48],"other":[49],"irrelevant":[50],"(carrier),":[52],"steganography":[53,90,102],"is":[54,69],"used":[55],"transmit":[57],"critical":[58],"without":[60],"arousing":[61],"attention":[63],"regulators.":[65],"Error-bounded":[66],"lossy":[67,95],"compression":[68,144,161,171],"reduction":[72],"technique":[73],"that":[74],"effectively":[75],"alleviates":[76],"system":[77],"pressures":[78],"due":[79],"large":[81],"volumes.":[83],"In":[84],"this":[85],"paper,":[86],"we":[87],"propose":[88],"scheme":[91],"based":[92,112],"compressor":[96],"SZ":[97],"named":[98],"StegaZ.":[99],"StegaZ":[100,120,136],"performs":[101],"while":[103],"compressing":[104],"by":[106,117],"selecting":[107,153],"random":[108],"bits":[109],"for":[110],"insertion":[111],"password":[115],"entered":[116],"user.":[119],"does":[121],"not":[122],"affect":[123],"unaware":[124],"users'":[125],"normal":[126],"usage":[127],"decompressed":[130],"dataset.":[131,156],"experimental":[133],"results":[134],"show":[135],"preserves":[137],"more":[138],"than":[139,173],"99.6%":[140],"original":[143],"ratio":[145],"achieves":[147],"PSNR":[149],"100%":[151],"when":[152],"an":[154],"appropriate":[155],"Additionally,":[157],"it":[158],"imposes":[159],"minimal":[160],"bandwidth":[162,172],"overhead,":[163],"sometimes":[164],"even":[165],"able":[166],"obtain":[168],"higher":[170],"original.":[175]},"counts_by_year":[],"updated_date":"2025-12-22T23:10:17.713674","created_date":"2025-10-10T00:00:00"}
