{"id":"https://openalex.org/W2186924496","doi":"https://doi.org/10.1007/s11432-012-4598-3","title":"Efficient construction of provably secure steganography under ordinary covert channels","display_name":"Efficient construction of provably secure steganography under ordinary covert channels","publication_year":2012,"publication_date":"2012-05-09","ids":{"openalex":"https://openalex.org/W2186924496","doi":"https://doi.org/10.1007/s11432-012-4598-3","mag":"2186924496"},"language":"en","primary_location":{"id":"doi:10.1007/s11432-012-4598-3","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11432-012-4598-3","pdf_url":null,"source":{"id":"https://openalex.org/S4210218743","display_name":"Science China Information Sciences","issn_l":"1674-733X","issn":["1674-733X","1869-1919"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Science China Information Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039641353","display_name":"Yan Zhu","orcid":"https://orcid.org/0000-0002-9159-745X"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yan Zhu","raw_affiliation_strings":["Beijing Key Laboratory of Internet Security Technology, Peking University, Beijing, 100871, China","Institute of Computer Science and Technology, Peking University, Beijing, 100871, China","Institute of Computer Science and Technology, Peking University, Beijing, China","Beijing Key Laboratory of Internet Security Technology, Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Internet Security Technology, Peking University, Beijing, 100871, China","institution_ids":["https://openalex.org/I20231570"]},{"raw_affiliation_string":"Institute of Computer Science and Technology, Peking University, Beijing, 100871, China","institution_ids":["https://openalex.org/I20231570"]},{"raw_affiliation_string":"Institute of Computer Science and Technology, Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]},{"raw_affiliation_string":"Beijing Key Laboratory of Internet Security Technology, Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071361681","display_name":"Mengyang Yu","orcid":null},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"MengYang Yu","raw_affiliation_strings":["School of Mathematical Sciences, Peking University, Beijing, 100871, China","School of Mathematical Sciences, Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematical Sciences, Peking University, Beijing, 100871, China","institution_ids":["https://openalex.org/I20231570"]},{"raw_affiliation_string":"School of Mathematical Sciences, Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056657952","display_name":"Hongxin Hu","orcid":"https://orcid.org/0000-0001-8710-247X"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"HongXin Hu","raw_affiliation_strings":["School of Computing, Informatics, and Decision Systems Engineering, Arizona State University, Tempe, AZ, 85287, USA","School of Computing, Informatics, and Decision Systems Engineering, Arizona State University, Tempe, USA"],"affiliations":[{"raw_affiliation_string":"School of Computing, Informatics, and Decision Systems Engineering, Arizona State University, Tempe, AZ, 85287, USA","institution_ids":["https://openalex.org/I55732556"]},{"raw_affiliation_string":"School of Computing, Informatics, and Decision Systems Engineering, Arizona State University, Tempe, USA","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025770693","display_name":"Gail\u2010Joon Ahn","orcid":"https://orcid.org/0000-0002-4271-1666"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gail-Joon Ahn","raw_affiliation_strings":["School of Computing, Informatics, and Decision Systems Engineering, Arizona State University, Tempe, AZ, 85287, USA","School of Computing, Informatics, and Decision Systems Engineering, Arizona State University, Tempe, USA"],"affiliations":[{"raw_affiliation_string":"School of Computing, Informatics, and Decision Systems Engineering, Arizona State University, Tempe, AZ, 85287, USA","institution_ids":["https://openalex.org/I55732556"]},{"raw_affiliation_string":"School of Computing, Informatics, and Decision Systems Engineering, Arizona State University, Tempe, USA","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084143787","display_name":"Hong-Jia Zhao","orcid":null},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"HongJia Zhao","raw_affiliation_strings":["Beijing Key Laboratory of Internet Security Technology, Peking University, Beijing, 100871, China","Institute of Computer Science and Technology, Peking University, Beijing, 100871, China","Institute of Computer Science and Technology, Peking University, Beijing, China","Beijing Key Laboratory of Internet Security Technology, Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Internet Security Technology, Peking University, Beijing, 100871, China","institution_ids":["https://openalex.org/I20231570"]},{"raw_affiliation_string":"Institute of Computer Science and Technology, Peking University, Beijing, 100871, China","institution_ids":["https://openalex.org/I20231570"]},{"raw_affiliation_string":"Institute of Computer Science and Technology, Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]},{"raw_affiliation_string":"Beijing Key Laboratory of Internet Security Technology, Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5039641353"],"corresponding_institution_ids":["https://openalex.org/I20231570"],"apc_list":{"value":2390,"currency":"EUR","value_usd":2990},"apc_paid":null,"fwci":1.67,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.867102,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"55","issue":"7","first_page":"1639","last_page":"1649"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8445362448692322},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.7022980451583862},{"id":"https://openalex.org/keywords/pseudorandom-function-family","display_name":"Pseudorandom function family","score":0.6995443105697632},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.6821088194847107},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6467944383621216},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5838494896888733},{"id":"https://openalex.org/keywords/pseudorandom-number-generator","display_name":"Pseudorandom number generator","score":0.5693670511245728},{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.5105234384536743},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.4865823984146118},{"id":"https://openalex.org/keywords/steganography-tools","display_name":"Steganography tools","score":0.4367560148239136},{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.4141552150249481},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41356411576271057},{"id":"https://openalex.org/keywords/sampling","display_name":"Sampling (signal processing)","score":0.41330277919769287},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.37096238136291504},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3217964768409729},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.30542394518852234},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.28200095891952515},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.07710948586463928},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.07460501790046692},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.0725243091583252}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8445362448692322},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.7022980451583862},{"id":"https://openalex.org/C178774983","wikidata":"https://www.wikidata.org/wiki/Q734896","display_name":"Pseudorandom function family","level":3,"score":0.6995443105697632},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.6821088194847107},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6467944383621216},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5838494896888733},{"id":"https://openalex.org/C140642157","wikidata":"https://www.wikidata.org/wiki/Q1623338","display_name":"Pseudorandom number generator","level":2,"score":0.5693670511245728},{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.5105234384536743},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.4865823984146118},{"id":"https://openalex.org/C13179402","wikidata":"https://www.wikidata.org/wiki/Q7606662","display_name":"Steganography tools","level":4,"score":0.4367560148239136},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.4141552150249481},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41356411576271057},{"id":"https://openalex.org/C140779682","wikidata":"https://www.wikidata.org/wiki/Q210868","display_name":"Sampling (signal processing)","level":3,"score":0.41330277919769287},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.37096238136291504},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3217964768409729},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.30542394518852234},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.28200095891952515},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.07710948586463928},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.07460501790046692},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0725243091583252},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.0},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s11432-012-4598-3","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11432-012-4598-3","pdf_url":null,"source":{"id":"https://openalex.org/S4210218743","display_name":"Science China Information Sciences","issn_l":"1674-733X","issn":["1674-733X","1869-1919"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Science China Information Sciences","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.49000000953674316,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W124337392","https://openalex.org/W1479681406","https://openalex.org/W1484798037","https://openalex.org/W1520041135","https://openalex.org/W1527181506","https://openalex.org/W1537331768","https://openalex.org/W1548880861","https://openalex.org/W1583946412","https://openalex.org/W1835586838","https://openalex.org/W1878459630","https://openalex.org/W2039837665","https://openalex.org/W2056659062","https://openalex.org/W2061106457","https://openalex.org/W2104446175","https://openalex.org/W2112139527","https://openalex.org/W2134195444","https://openalex.org/W2497843319","https://openalex.org/W2619633776","https://openalex.org/W2753819115","https://openalex.org/W6743860123"],"related_works":["https://openalex.org/W2154118756","https://openalex.org/W2148555789","https://openalex.org/W2166431153","https://openalex.org/W129330134","https://openalex.org/W1965991389","https://openalex.org/W1484296207","https://openalex.org/W2158736088","https://openalex.org/W1974279004","https://openalex.org/W2370747589","https://openalex.org/W4367185560"],"abstract_inverted_index":null,"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
