{"id":"https://openalex.org/W2619371765","doi":"https://doi.org/10.1007/978-3-319-59463-7_2","title":"Separable and Three-Dimensional Optical Reversible Data Hiding with Integral Imaging Cryptosystem","display_name":"Separable and Three-Dimensional Optical Reversible Data Hiding with Integral Imaging Cryptosystem","publication_year":2017,"publication_date":"2017-05-26","ids":{"openalex":"https://openalex.org/W2619371765","doi":"https://doi.org/10.1007/978-3-319-59463-7_2","mag":"2619371765"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-59463-7_2","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-59463-7_2","pdf_url":null,"source":{"id":"https://openalex.org/S4210216571","display_name":"Lecture notes on data engineering and communications technologies","issn_l":"2367-4512","issn":["2367-4512","2367-4520"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319972","host_organization_name":"Springer International Publishing","host_organization_lineage":["https://openalex.org/P4310319972","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer International Publishing","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes on Data Engineering and Communications Technologies","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100668127","display_name":"Yiqun Liu","orcid":"https://orcid.org/0009-0005-7882-5672"},"institutions":[{"id":"https://openalex.org/I4210134428","display_name":"Chinese People's Armed Police Force Engineering University","ror":"https://ror.org/031jzbb03","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210134428"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Liu Yiqun","raw_affiliation_strings":["Key Laboratory of CAPF for Cryptology and Information Security, Department of Electronic Technology, Engineering University of Chinese Armed Police Force, Xi\u2019an, Shaanxi, 710086, China","Key Laboratory of CAPF for Cryptology and Information Security, Department of Electronic Technology, Engineering University of Chinese Armed Police Force, Xi\u2019an, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of CAPF for Cryptology and Information Security, Department of Electronic Technology, Engineering University of Chinese Armed Police Force, Xi\u2019an, Shaanxi, 710086, China","institution_ids":["https://openalex.org/I4210134428"]},{"raw_affiliation_string":"Key Laboratory of CAPF for Cryptology and Information Security, Department of Electronic Technology, Engineering University of Chinese Armed Police Force, Xi\u2019an, China","institution_ids":["https://openalex.org/I4210134428"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5100668127"],"corresponding_institution_ids":["https://openalex.org/I4210134428"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07174763,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"13","last_page":"21"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11408","display_name":"Advanced Optical Imaging Technologies","score":0.9908000230789185,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.753014087677002},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7520856857299805},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.7405999898910522},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6484850645065308},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.6414431929588318},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.6325169205665588},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.5552734136581421},{"id":"https://openalex.org/keywords/lossless-compression","display_name":"Lossless compression","score":0.5542485117912292},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4962196946144104},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.39499083161354065},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3070119619369507},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.26365065574645996},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.22200918197631836},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.1734456717967987},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12961065769195557}],"concepts":[{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.753014087677002},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7520856857299805},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.7405999898910522},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6484850645065308},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.6414431929588318},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.6325169205665588},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.5552734136581421},{"id":"https://openalex.org/C81081738","wikidata":"https://www.wikidata.org/wiki/Q55542","display_name":"Lossless compression","level":3,"score":0.5542485117912292},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4962196946144104},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.39499083161354065},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3070119619369507},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.26365065574645996},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.22200918197631836},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.1734456717967987},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12961065769195557},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-319-59463-7_2","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-59463-7_2","pdf_url":null,"source":{"id":"https://openalex.org/S4210216571","display_name":"Lecture notes on data engineering and communications technologies","issn_l":"2367-4512","issn":["2367-4512","2367-4520"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319972","host_organization_name":"Springer International Publishing","host_organization_lineage":["https://openalex.org/P4310319972","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer International Publishing","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes on Data Engineering and Communications Technologies","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1181400376","https://openalex.org/W1635992618","https://openalex.org/W1693290180","https://openalex.org/W1998279455","https://openalex.org/W2015485234","https://openalex.org/W2026625545","https://openalex.org/W2059615500","https://openalex.org/W2107338521","https://openalex.org/W2125437827","https://openalex.org/W2134071212","https://openalex.org/W2162719060","https://openalex.org/W2170269447","https://openalex.org/W2317617666","https://openalex.org/W2375339895","https://openalex.org/W2401768874","https://openalex.org/W2403682575","https://openalex.org/W2407486123","https://openalex.org/W2467511002","https://openalex.org/W2496209904","https://openalex.org/W2508330072","https://openalex.org/W2516873703","https://openalex.org/W2520025484"],"related_works":["https://openalex.org/W1540303950","https://openalex.org/W2584473387","https://openalex.org/W1881812814","https://openalex.org/W3190769222","https://openalex.org/W2468963564","https://openalex.org/W2769668853","https://openalex.org/W4200246887","https://openalex.org/W2969231831","https://openalex.org/W3123484247","https://openalex.org/W2187024223"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
