{"id":"https://openalex.org/W2768180314","doi":"https://doi.org/10.1007/978-3-319-68505-2_7","title":"Improved CMD Adaptive Image Steganography Method","display_name":"Improved CMD Adaptive Image Steganography Method","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2768180314","doi":"https://doi.org/10.1007/978-3-319-68505-2_7","mag":"2768180314"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-68505-2_7","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-68505-2_7","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067863576","display_name":"Yingbo Yu","orcid":null},"institutions":[{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yingbo Yu","raw_affiliation_strings":["College of Computer Science and Electronic Engineering, Hunan University, Changsha, 410082, China","College of Computer Science and Electronic Engineering, Hunan University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, 410082, China","institution_ids":["https://openalex.org/I16609230"]},{"raw_affiliation_string":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, China","institution_ids":["https://openalex.org/I16609230"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100716299","display_name":"Xin Liao","orcid":"https://orcid.org/0000-0002-9131-0578"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]},{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xin Liao","raw_affiliation_strings":["College of Computer Science and Electronic Engineering, Hunan University, Changsha, 410082, China","Shenzhen Key Laboratory of Media Security, Shenzhen University, Shenzhen, 518060, China","College of Computer Science and Electronic Engineering, Hunan University, Changsha, China","Shenzhen Key Laboratory of Media Security, Shenzhen University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, 410082, China","institution_ids":["https://openalex.org/I16609230"]},{"raw_affiliation_string":"Shenzhen Key Laboratory of Media Security, Shenzhen University, Shenzhen, 518060, China","institution_ids":["https://openalex.org/I180726961"]},{"raw_affiliation_string":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, China","institution_ids":["https://openalex.org/I16609230"]},{"raw_affiliation_string":"Shenzhen Key Laboratory of Media Security, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100716299"],"corresponding_institution_ids":["https://openalex.org/I16609230","https://openalex.org/I180726961"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.19235064,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"74","last_page":"84"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8733001947402954},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8371254205703735},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.6847529411315918},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5965286493301392},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.5827574729919434},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.5576822757720947},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5365626215934753},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.5340461134910583},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.49883389472961426},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.453232079744339},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.43720507621765137},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4223138391971588},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.4197726845741272},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.4111385941505432},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3649497330188751},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3448973298072815},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.25509148836135864},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09491428732872009}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8733001947402954},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8371254205703735},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.6847529411315918},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5965286493301392},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.5827574729919434},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.5576822757720947},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5365626215934753},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.5340461134910583},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.49883389472961426},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.453232079744339},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.43720507621765137},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4223138391971588},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.4197726845741272},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.4111385941505432},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3649497330188751},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3448973298072815},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.25509148836135864},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09491428732872009},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-319-68505-2_7","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-68505-2_7","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W22271197","https://openalex.org/W1604614341","https://openalex.org/W1938616531","https://openalex.org/W1955882805","https://openalex.org/W1976570511","https://openalex.org/W2009130368","https://openalex.org/W2056515392","https://openalex.org/W2064353916","https://openalex.org/W2065135852","https://openalex.org/W2069443469","https://openalex.org/W2096050104","https://openalex.org/W2124664712","https://openalex.org/W2134527668","https://openalex.org/W2170598445","https://openalex.org/W2293451228","https://openalex.org/W2419438884","https://openalex.org/W2461933982","https://openalex.org/W2469486851","https://openalex.org/W2474846563","https://openalex.org/W2475932160","https://openalex.org/W2481800796","https://openalex.org/W2518058967","https://openalex.org/W2525788160","https://openalex.org/W2542290803","https://openalex.org/W2563363534"],"related_works":["https://openalex.org/W3203504906","https://openalex.org/W2497446005","https://openalex.org/W3190769222","https://openalex.org/W2171676767","https://openalex.org/W4312890355","https://openalex.org/W2189589914","https://openalex.org/W83713408","https://openalex.org/W4293373802","https://openalex.org/W4318577714","https://openalex.org/W1716757876"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
