{"id":"https://openalex.org/W4414212173","doi":"https://doi.org/10.1007/s00034-025-03248-w","title":"ConcealNet: A Deep Learning Framework for Image Encryption and High-Capacity Data Embedding Using Denoising Diffusion Implicit Models","display_name":"ConcealNet: A Deep Learning Framework for Image Encryption and High-Capacity Data Embedding Using Denoising Diffusion Implicit Models","publication_year":2025,"publication_date":"2025-09-09","ids":{"openalex":"https://openalex.org/W4414212173","doi":"https://doi.org/10.1007/s00034-025-03248-w"},"language":"en","primary_location":{"id":"doi:10.1007/s00034-025-03248-w","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s00034-025-03248-w","pdf_url":null,"source":{"id":"https://openalex.org/S20109229","display_name":"Circuits Systems and Signal Processing","issn_l":"0278-081X","issn":["0278-081X","1531-5878"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320186","host_organization_name":"Birkh\u00e4user","host_organization_lineage":["https://openalex.org/P4310320186","https://openalex.org/P4310319900"],"host_organization_lineage_names":["Birkh\u00e4user","Springer Science+Business Media"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Circuits, Systems, and Signal Processing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080288399","display_name":"Yi-Hui Chen","orcid":"https://orcid.org/0000-0002-9932-0594"},"institutions":[{"id":"https://openalex.org/I141243467","display_name":"Chang Gung University of Science and Technology","ror":"https://ror.org/009knm296","country_code":"TW","type":"education","lineage":["https://openalex.org/I141243467"]},{"id":"https://openalex.org/I173093425","display_name":"Chang Gung University","ror":"https://ror.org/00d80zx46","country_code":"TW","type":"education","lineage":["https://openalex.org/I173093425"]},{"id":"https://openalex.org/I4210093821","display_name":"Kaohsiung Chang Gung Memorial Hospital","ror":"https://ror.org/00k194y12","country_code":"TW","type":"healthcare","lineage":["https://openalex.org/I4210093821"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Yi-Hui Chen","raw_affiliation_strings":["Department of Digital Financial Technology, Chang Gung University, Wenhua 1st Rd. Guishan Dist., Taoyuan, 33302, Taiwan","Department of Information Management, Chang Gung University, Wenhua 1st Rd. Guishan Dist., Taoyuan, 33302, Taiwan","Kawasaki Disease Center, Kaohsiung Chang Gung Memorial Hospital, Dapi Road, Niaosong District, Kaohsiung, 833401, Taiwan"],"raw_orcid":"https://orcid.org/0000-0002-9932-0594","affiliations":[{"raw_affiliation_string":"Department of Digital Financial Technology, Chang Gung University, Wenhua 1st Rd. Guishan Dist., Taoyuan, 33302, Taiwan","institution_ids":["https://openalex.org/I141243467","https://openalex.org/I173093425"]},{"raw_affiliation_string":"Department of Information Management, Chang Gung University, Wenhua 1st Rd. Guishan Dist., Taoyuan, 33302, Taiwan","institution_ids":["https://openalex.org/I173093425"]},{"raw_affiliation_string":"Kawasaki Disease Center, Kaohsiung Chang Gung Memorial Hospital, Dapi Road, Niaosong District, Kaohsiung, 833401, Taiwan","institution_ids":["https://openalex.org/I4210093821"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102144400","display_name":"Meng\u2010Yu Tsai","orcid":null},"institutions":[{"id":"https://openalex.org/I173093425","display_name":"Chang Gung University","ror":"https://ror.org/00d80zx46","country_code":"TW","type":"education","lineage":["https://openalex.org/I173093425"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Meng-Yu Tsai","raw_affiliation_strings":["Department of Information Management, Chang Gung University, Wenhua 1st Rd. Guishan Dist., Taoyuan, 33302, Taiwan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information Management, Chang Gung University, Wenhua 1st Rd. Guishan Dist., Taoyuan, 33302, Taiwan","institution_ids":["https://openalex.org/I173093425"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5080288399"],"corresponding_institution_ids":["https://openalex.org/I141243467","https://openalex.org/I173093425","https://openalex.org/I4210093821"],"apc_list":null,"apc_paid":null,"fwci":1.1332,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.82494058,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"45","issue":"3","first_page":"1934","last_page":"1957"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7592999935150146},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.6868000030517578},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.6362000107765198},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5695000290870667},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5681999921798706},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.491100013256073},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.4819999933242798},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4456000030040741},{"id":"https://openalex.org/keywords/adaptability","display_name":"Adaptability","score":0.39730000495910645}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7592999935150146},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7159000039100647},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.6868000030517578},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.6362000107765198},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5695000290870667},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5681999921798706},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5519999861717224},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.491100013256073},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.4819999933242798},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4456000030040741},{"id":"https://openalex.org/C177606310","wikidata":"https://www.wikidata.org/wiki/Q5674297","display_name":"Adaptability","level":2,"score":0.39730000495910645},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.3853999972343445},{"id":"https://openalex.org/C55020928","wikidata":"https://www.wikidata.org/wiki/Q3813865","display_name":"Image quality","level":3,"score":0.3822000026702881},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.37869998812675476},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.37299999594688416},{"id":"https://openalex.org/C163294075","wikidata":"https://www.wikidata.org/wiki/Q581861","display_name":"Noise reduction","level":2,"score":0.3582000136375427},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3508000075817108},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3391000032424927},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.3343999981880188},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.32280001044273376},{"id":"https://openalex.org/C2780639701","wikidata":"https://www.wikidata.org/wiki/Q354869","display_name":"Image sharing","level":3,"score":0.3206999897956848},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3127000033855438},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.30640000104904175},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.302700012922287},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.28769999742507935},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.2809000015258789},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.27649998664855957},{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.2759000062942505},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.2705000042915344},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.26899999380111694},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.25850000977516174}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s00034-025-03248-w","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s00034-025-03248-w","pdf_url":null,"source":{"id":"https://openalex.org/S20109229","display_name":"Circuits Systems and Signal Processing","issn_l":"0278-081X","issn":["0278-081X","1531-5878"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320186","host_organization_name":"Birkh\u00e4user","host_organization_lineage":["https://openalex.org/P4310320186","https://openalex.org/P4310319900"],"host_organization_lineage_names":["Birkh\u00e4user","Springer Science+Business Media"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Circuits, Systems, and Signal Processing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3269519235","display_name":null,"funder_award_id":"1142221E182061","funder_id":"https://openalex.org/F2461203286","funder_display_name":"National Science and Technology Council"},{"id":"https://openalex.org/G8875113064","display_name":null,"funder_award_id":"1132221E182064","funder_id":"https://openalex.org/F2461203286","funder_display_name":"National Science and Technology Council"}],"funders":[{"id":"https://openalex.org/F2461203286","display_name":"National Science and Technology Council","ror":"https://ror.org/02kv4zf79"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W2170269447","https://openalex.org/W2335243071","https://openalex.org/W2342152533","https://openalex.org/W2400363826","https://openalex.org/W2533598788","https://openalex.org/W2806483402","https://openalex.org/W2919023666","https://openalex.org/W2950377098","https://openalex.org/W2962531843","https://openalex.org/W2969448873","https://openalex.org/W2985045609","https://openalex.org/W3109641655","https://openalex.org/W3134369321","https://openalex.org/W3199558812","https://openalex.org/W3204271358","https://openalex.org/W4205588087","https://openalex.org/W4214543711","https://openalex.org/W4214949917","https://openalex.org/W4226058778","https://openalex.org/W4312933868"],"related_works":[],"abstract_inverted_index":null,"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-03-28T06:11:35.319607","created_date":"2025-10-10T00:00:00"}
