{"id":"https://openalex.org/W2588671948","doi":"https://doi.org/10.1007/978-3-319-53465-7_35","title":"Separable Multiple Bits Reversible Data Hiding in Encrypted Domain","display_name":"Separable Multiple Bits Reversible Data Hiding in Encrypted Domain","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2588671948","doi":"https://doi.org/10.1007/978-3-319-53465-7_35","mag":"2588671948"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-53465-7_35","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-53465-7_35","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101734443","display_name":"Yan Ke","orcid":"https://orcid.org/0000-0002-6229-9998"},"institutions":[{"id":"https://openalex.org/I4210134428","display_name":"Chinese People's Armed Police Force Engineering University","ror":"https://ror.org/031jzbb03","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210134428"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yan Ke","raw_affiliation_strings":["Key Laboratory of Network and Information Security Under the Chinese People Armed Police Force, Department of Electronic Technology, Engineering University of PAP, Xi\u2019an, China","Key Laboratory of Network and Information Security Under the Chinese People Armed Police Force, Department of Electronic Technology, Engineering University of PAP, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Network and Information Security Under the Chinese People Armed Police Force, Department of Electronic Technology, Engineering University of PAP, Xi\u2019an, China","institution_ids":["https://openalex.org/I4210134428"]},{"raw_affiliation_string":"Key Laboratory of Network and Information Security Under the Chinese People Armed Police Force, Department of Electronic Technology, Engineering University of PAP, Xi'an, China","institution_ids":["https://openalex.org/I4210134428"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056157124","display_name":"Minqing Zhang","orcid":"https://orcid.org/0000-0002-8783-3608"},"institutions":[{"id":"https://openalex.org/I4210134428","display_name":"Chinese People's Armed Police Force Engineering University","ror":"https://ror.org/031jzbb03","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210134428"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Minqing Zhang","raw_affiliation_strings":["Key Laboratory of Network and Information Security Under the Chinese People Armed Police Force, Department of Electronic Technology, Engineering University of PAP, Xi\u2019an, China","Key Laboratory of Network and Information Security Under the Chinese People Armed Police Force, Department of Electronic Technology, Engineering University of PAP, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Network and Information Security Under the Chinese People Armed Police Force, Department of Electronic Technology, Engineering University of PAP, Xi\u2019an, China","institution_ids":["https://openalex.org/I4210134428"]},{"raw_affiliation_string":"Key Laboratory of Network and Information Security Under the Chinese People Armed Police Force, Department of Electronic Technology, Engineering University of PAP, Xi'an, China","institution_ids":["https://openalex.org/I4210134428"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109146719","display_name":"Jia Liu","orcid":"https://orcid.org/0000-0001-8104-0079"},"institutions":[{"id":"https://openalex.org/I4210134428","display_name":"Chinese People's Armed Police Force Engineering University","ror":"https://ror.org/031jzbb03","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210134428"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jia Liu","raw_affiliation_strings":["Key Laboratory of Network and Information Security Under the Chinese People Armed Police Force, Department of Electronic Technology, Engineering University of PAP, Xi\u2019an, China","Key Laboratory of Network and Information Security Under the Chinese People Armed Police Force, Department of Electronic Technology, Engineering University of PAP, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Network and Information Security Under the Chinese People Armed Police Force, Department of Electronic Technology, Engineering University of PAP, Xi\u2019an, China","institution_ids":["https://openalex.org/I4210134428"]},{"raw_affiliation_string":"Key Laboratory of Network and Information Security Under the Chinese People Armed Police Force, Department of Electronic Technology, Engineering University of PAP, Xi'an, China","institution_ids":["https://openalex.org/I4210134428"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101734443"],"corresponding_institution_ids":["https://openalex.org/I4210134428"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":2.3314,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.90185418,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"470","last_page":"484"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.7960571050643921},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7518143653869629},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.721625566482544},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.702531635761261},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.6670593619346619},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.522919774055481},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.46547219157218933},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.43661946058273315},{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.4122644066810608},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.37905848026275635},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.15357360243797302},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.11559480428695679}],"concepts":[{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.7960571050643921},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7518143653869629},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.721625566482544},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.702531635761261},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.6670593619346619},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.522919774055481},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.46547219157218933},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.43661946058273315},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.4122644066810608},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.37905848026275635},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.15357360243797302},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.11559480428695679},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-319-53465-7_35","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-53465-7_35","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6600000262260437,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1874108923","https://openalex.org/W1989953416","https://openalex.org/W2007466965","https://openalex.org/W2007747739","https://openalex.org/W2010380519","https://openalex.org/W2012711090","https://openalex.org/W2017365570","https://openalex.org/W2021595839","https://openalex.org/W2056515392","https://openalex.org/W2057876259","https://openalex.org/W2059615500","https://openalex.org/W2064133182","https://openalex.org/W2107338521","https://openalex.org/W2111233756","https://openalex.org/W2111809688","https://openalex.org/W2120884963","https://openalex.org/W2134071212","https://openalex.org/W2135459805","https://openalex.org/W2158807150","https://openalex.org/W2162719060","https://openalex.org/W2167436768","https://openalex.org/W2170269447","https://openalex.org/W2185859814","https://openalex.org/W2317617666","https://openalex.org/W2375339895","https://openalex.org/W3209866323"],"related_works":["https://openalex.org/W3008339103","https://openalex.org/W2404647514","https://openalex.org/W1667647204","https://openalex.org/W3119814709","https://openalex.org/W2018477250","https://openalex.org/W3190769222","https://openalex.org/W2769668853","https://openalex.org/W2152435249","https://openalex.org/W2969231831","https://openalex.org/W3123484247"],"abstract_inverted_index":null,"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
