Click to open the HelpDesk interface
AECE - Front page banner



JCR Impact Factor: 1.102
JCR 5-Year IF: 0.734
SCOPUS CiteScore: 2.5
Issues per year: 4
Current issue: May 2021
Next issue: Aug 2021
Avg review time: 74 days


Stefan cel Mare
University of Suceava
Faculty of Electrical Engineering and
Computer Science
13, Universitatii Street
Suceava - 720229

Print ISSN: 1582-7445
Online ISSN: 1844-7600
WorldCat: 643243560
doi: 10.4316/AECE


1,652,622 unique visits
Since November 1, 2009

Robots online now


SCImago Journal & Country Rank


Anycast DNS Hosting

 Volume 21 (2021)
     »   Issue 2 / 2021
     »   Issue 1 / 2021
 Volume 20 (2020)
     »   Issue 4 / 2020
     »   Issue 3 / 2020
     »   Issue 2 / 2020
     »   Issue 1 / 2020
 Volume 19 (2019)
     »   Issue 4 / 2019
     »   Issue 3 / 2019
     »   Issue 2 / 2019
     »   Issue 1 / 2019
 Volume 18 (2018)
     »   Issue 4 / 2018
     »   Issue 3 / 2018
     »   Issue 2 / 2018
     »   Issue 1 / 2018
 Volume 17 (2017)
     »   Issue 4 / 2017
     »   Issue 3 / 2017
     »   Issue 2 / 2017
     »   Issue 1 / 2017
  View all issues  


SCOPUS published the CiteScore for 2020, computed by using an improved methodology, counting the citations received in 2017-2020 and dividing the sum by the number of papers published in the same time frame. The CiteScore of Advances in Electrical and Computer Engineering in 2020 is 2.5, better than all our previous results.

Release of the v3 version of AECE Journal website. We moved to a new server and implemented the latest cryptographic protocols to assure better compatibility with the most recent browsers. Our website accepts now only TLS 1.2 and TLS 1.3 secure connections.

Clarivate Analytics published the InCites Journal Citations Report for 2019. The InCites JCR Impact Factor of Advances in Electrical and Computer Engineering is 1.102 (1.023 without Journal self-cites), and the InCites JCR 5-Year Impact Factor is 0.734.

Starting on the 15th of June 2020 we wiil introduce a new policy for reviewers. Reviewers who provide timely and substantial comments will receive a discount voucher entitling them to an APC reduction. Vouchers (worth of 25 EUR or 50 EUR, depending on the review quality) will be assigned to reviewers after the final decision of the reviewed paper is given. Vouchers issued to specific individuals are not transferable.

Starting on the 15th of December 2019 all paper authors are required to enter their SCOPUS IDs. You may use the free SCOPUS ID lookup form to find yours in case you don't remember it.

Read More »


  3/2018 - 3


Adaptive LSB Steganography Based on Chaos Theory and Random Distortion

TUTUNCU, K. See more information about TUTUNCU, K. on SCOPUS See more information about TUTUNCU, K. on IEEExplore See more information about TUTUNCU, K. on Web of Science, DEMIRCI, B. See more information about DEMIRCI, B. on SCOPUS See more information about DEMIRCI, B. on SCOPUS See more information about DEMIRCI, B. on Web of Science
Click to see author's profile in See more information about the author on SCOPUS SCOPUS, See more information about the author on IEEE Xplore IEEE Xplore, See more information about the author on Web of Science Web of Science

Download PDF pdficon (1,291 KB) | Citation | Downloads: 706 | Views: 1,418

Author keywords
ciphers, chaos, data encapsulation, data security, digital images

References keywords
image(17), steganography(15), chaotic(11), hiding(10), steganographic(9), information(8), algorithm(8), communications(7), signal(5), security(5)
Blue keywords are present in both the references section and the paper title.

About this article
Date of Publication: 2018-08-31
Volume 18, Issue 3, Year 2018, On page(s): 15 - 22
ISSN: 1582-7445, e-ISSN: 1844-7600
Digital Object Identifier: 10.4316/AECE.2018.03003
Web of Science Accession Number: 000442420900003
SCOPUS ID: 85052105181

Quick view
Full text preview
Image steganography is a technique to hide secret information in an image without leaving any apparent evidence of image alteration. Hiding capacity, perceptual transparency, robustness, and resistance against attack must be considered as characteristics of the image steganography algorithms. In this study, Improved Chaos Based Bit Embedding has been proposed as a new steganography algorithm. It is based on two basic principles. One of them is determining the bits in which the secret data will be embedded by logistic map and the other one is embedding the secret data into only one of the three color channels that is chosen randomly. It distorts the other remaining channels so that it is harder to obtain the text within the image by an unwanted person. The proposed algorithm has been tested on 10 sample images along with the four basic steganography algorithms: Least Significant Bit Embedding, Pseudo Random Least Significant Bit Embedding, EzStego, and F5. It has been seen that generating unpredictable indexes by the chaotic random number generators, and embedding the secret data into only one of the three channels (distorting remaining channels) increased resistance against attacks. Perceptual transparencies and capacity ratio of the proposed algorithm are compatible with the other four algorithms.

References | Cited By

Cited-By Clarivate Web of Science

Web of Science® Times Cited: 6 [View]
View record in Web of Science® [View]
View Related Records® [View]

Updated today


SCOPUS® Times Cited: 8
View record in SCOPUS®
[Free preview]
View citations in SCOPUS® [Free preview]

Updated today

Cited-By CrossRef

[1] Improved Edge Refinement Filter with Entropy Feedback Measurement for Retrieving Region of Interest and Blind Image Deconvolution, MOHD SHAPRI, A. H., ABDULLAH, M. Z., Advances in Electrical and Computer Engineering, ISSN 1582-7445, Issue 1, Volume 20, 2020.
Digital Object Identifier: 10.4316/AECE.2020.01010
[CrossRef] [Full text]

[2] Shared memory implementation and performance analysis of LSB steganography based on chaotic tent map, Gambhir, Gaurav, Mandal, Jyotsna Kumar, Innovations in Systems and Software Engineering, ISSN 1614-5046, 2021.
Digital Object Identifier: 10.1007/s11334-021-00385-8

[3] Multicore implementation and performance analysis of a chaos based LSB steganography technique, Gambhir, Gaurav, Mandal, Jyotsna Kumar, Microsystem Technologies, ISSN 0946-7076, 2020.
Digital Object Identifier: 10.1007/s00542-020-04762-4

[4] Medical image steganographic algorithm via modified LSB method and chaotic map, Karawia, A. A., IET Image Processing, ISSN 1751-9659, 2021.
Digital Object Identifier: 10.1049/ipr2.12246

[5] An efficient steganographic technique for hiding data, Nashat, Dalia, Mamdouh, Loay, Journal of the Egyptian Mathematical Society, ISSN 2090-9128, Issue 1, Volume 27, 2019.
Digital Object Identifier: 10.1186/s42787-019-0061-6

[6] A Modified Hash Based Least Significant Bits Algorithm for Steganography, Muyco, Stella D., Hernandez, Alexander A., Proceedings of the 2019 4th International Conference on Big Data and Computing - ICBDC 2019, ISBN 9781450362788, 2019.
Digital Object Identifier: 10.1145/3335484.3335514

Updated today

Disclaimer: All information displayed above was retrieved by using remote connections to respective databases. For the best user experience, we update all data by using background processes, and use caches in order to reduce the load on the servers we retrieve the information from. As we have no control on the availability of the database servers and sometimes the Internet connectivity may be affected, we do not guarantee the information is correct or complete. For the most accurate data, please always consult the database sites directly. Some external links require authentication or an institutional subscription.

Web of Science® is a registered trademark of Clarivate Analytics, Scopus® is a registered trademark of Elsevier B.V., other product names, company names, brand names, trademarks and logos are the property of their respective owners.

Copyright ©2001-2021
Faculty of Electrical Engineering and Computer Science
Stefan cel Mare University of Suceava, Romania

All rights reserved: Advances in Electrical and Computer Engineering is a registered trademark of the Stefan cel Mare University of Suceava. No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from the Editor. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Faculty of Electrical Engineering and Computer Science, Stefan cel Mare University of Suceava, Romania, if and only if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.

Permission for other use: The copyright owner's consent does not extend to copying for general distribution, for promotion, for creating new works, or for resale. Specific written permission must be obtained from the Editor for such copying. Direct linking to files hosted on this website is strictly prohibited.

Disclaimer: Whilst every effort is made by the publishers and editorial board to see that no inaccurate or misleading data, opinions or statements appear in this journal, they wish to make it clear that all information and opinions formulated in the articles, as well as linguistic accuracy, are the sole responsibility of the author.

Website loading speed and performance optimization powered by: