{"id":"https://openalex.org/W3128861226","doi":"https://doi.org/10.1007/978-3-030-68884-4_22","title":"Who Distributes It? Privacy-Preserving Image Sharing Scheme with Illegal Distribution Detection","display_name":"Who Distributes It? Privacy-Preserving Image Sharing Scheme with Illegal Distribution Detection","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3128861226","doi":"https://doi.org/10.1007/978-3-030-68884-4_22","mag":"3128861226"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-68884-4_22","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-68884-4_22","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086221261","display_name":"Tianpeng Deng","orcid":"https://orcid.org/0000-0002-3082-2684"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tianpeng Deng","raw_affiliation_strings":["College of Mathematics and Informatics, Fujian Normal University, Fuzhou, 350117, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Informatics, Fujian Normal University, Fuzhou, 350117, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106943653","display_name":"Xuan Li","orcid":"https://orcid.org/0000-0002-4013-8480"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I4210120389","display_name":"Fujian Polytechnic of Information Technology","ror":"https://ror.org/02j5qn328","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210120389"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xuan Li","raw_affiliation_strings":["College of Mathematics and Informatics, Fujian Normal University, Fuzhou, 350117, China","Digital Fujian Big Data Security Technology Institute, Fuzhou, 350117, China","Fujian Provincial Key Laboratory of Network Security and Cryptology, Fuzhou, 350117, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Informatics, Fujian Normal University, Fuzhou, 350117, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"Digital Fujian Big Data Security Technology Institute, Fuzhou, 350117, China","institution_ids":["https://openalex.org/I4210120389"]},{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, Fuzhou, 350117, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018642252","display_name":"Biao Jin","orcid":"https://orcid.org/0000-0003-3401-1691"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Biao Jin","raw_affiliation_strings":["College of Mathematics and Informatics, Fujian Normal University, Fuzhou, 350117, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Informatics, Fujian Normal University, Fuzhou, 350117, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060659901","display_name":"Jinbo Xiong","orcid":"https://orcid.org/0000-0001-9985-1953"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinbo Xiong","raw_affiliation_strings":["College of Mathematics and Informatics, Fujian Normal University, Fuzhou, 350117, China","Fujian Provincial Key Laboratory of Network Security and Cryptology, Fuzhou, 350117, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Informatics, Fujian Normal University, Fuzhou, 350117, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, Fuzhou, 350117, China","institution_ids":["https://openalex.org/I4210132990"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5106943653"],"corresponding_institution_ids":["https://openalex.org/I111753288","https://openalex.org/I4210120389","https://openalex.org/I4210132990"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.7017,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.65292523,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":93,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"257","last_page":"268"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10627","display_name":"Advanced Image and Video Retrieval Techniques","score":0.9807000160217285,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.86723792552948},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.7390720248222351},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5554526448249817},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.48617619276046753},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.4292111396789551},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.4173767566680908},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3549386262893677},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.2920758128166199},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.269278883934021},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.06531375646591187}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.86723792552948},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.7390720248222351},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5554526448249817},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.48617619276046753},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.4292111396789551},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.4173767566680908},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3549386262893677},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.2920758128166199},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.269278883934021},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.06531375646591187},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-030-68884-4_22","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-68884-4_22","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7300000190734863}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W756028442","https://openalex.org/W1610649526","https://openalex.org/W1928483324","https://openalex.org/W1998279455","https://openalex.org/W2012711090","https://openalex.org/W2146916812","https://openalex.org/W2170269447","https://openalex.org/W2322525404","https://openalex.org/W2342152533","https://openalex.org/W2397414227","https://openalex.org/W2469486851","https://openalex.org/W2605606249","https://openalex.org/W2623856551","https://openalex.org/W2782363563","https://openalex.org/W2793696846","https://openalex.org/W2914770479","https://openalex.org/W2972270478","https://openalex.org/W3034614954"],"related_works":["https://openalex.org/W2006088653","https://openalex.org/W4255148435","https://openalex.org/W1574442789","https://openalex.org/W2223862429","https://openalex.org/W3191196563","https://openalex.org/W1975289146","https://openalex.org/W1994257264","https://openalex.org/W1984242286","https://openalex.org/W1492970794","https://openalex.org/W3128194758"],"abstract_inverted_index":null,"counts_by_year":[{"year":2021,"cited_by_count":2}],"updated_date":"2026-01-15T23:16:33.117629","created_date":"2025-10-10T00:00:00"}
