{"id":"https://openalex.org/W2903126033","doi":"https://doi.org/10.1109/access.2018.2882563","title":"Separable and Error-Free Reversible Data Hiding in Encrypted Image Based on Two-Layer Pixel Errors","display_name":"Separable and Error-Free Reversible Data Hiding in Encrypted Image Based on Two-Layer Pixel Errors","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2903126033","doi":"https://doi.org/10.1109/access.2018.2882563","mag":"2903126033"},"language":"en","primary_location":{"id":"doi:10.1109/access.2018.2882563","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2018.2882563","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2018.2882563","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020240117","display_name":"Chunqiang Yu","orcid":"https://orcid.org/0000-0002-7221-0168"},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chunqiang Yu","raw_affiliation_strings":["Guangxi Key Laboratory of Multi-source Information Mining and Security, Guangxi Normal University, Guilin, China"],"raw_orcid":"https://orcid.org/0000-0002-7221-0168","affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Multi-source Information Mining and Security, Guangxi Normal University, Guilin, China","institution_ids":["https://openalex.org/I29739308"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085013836","display_name":"Xianquan Zhang","orcid":"https://orcid.org/0000-0003-3359-117X"},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xianquan Zhang","raw_affiliation_strings":["Guangxi Key Laboratory of Multi-source Information Mining and Security, Guangxi Normal University, Guilin, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Multi-source Information Mining and Security, Guangxi Normal University, Guilin, China","institution_ids":["https://openalex.org/I29739308"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087798028","display_name":"Zhenjun Tang","orcid":"https://orcid.org/0000-0003-3664-1363"},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenjun Tang","raw_affiliation_strings":["Guangxi Key Laboratory of Multi-source Information Mining and Security, Guangxi Normal University, Guilin, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Multi-source Information Mining and Security, Guangxi Normal University, Guilin, China","institution_ids":["https://openalex.org/I29739308"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101674704","display_name":"Xiaojun Xie","orcid":"https://orcid.org/0000-0002-4848-1099"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaojun Xie","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5020240117"],"corresponding_institution_ids":["https://openalex.org/I29739308"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":1.2723,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.85523357,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"6","issue":null,"first_page":"76956","last_page":"76969"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.8198164701461792},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8004191517829895},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.7552884817123413},{"id":"https://openalex.org/keywords/histogram","display_name":"Histogram","score":0.670703649520874},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6446378827095032},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.6387754082679749},{"id":"https://openalex.org/keywords/hilbert-curve","display_name":"Hilbert curve","score":0.6155016422271729},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.5859574675559998},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.47224920988082886},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4652142822742462},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.4417007565498352},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4025418758392334},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.29975295066833496}],"concepts":[{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.8198164701461792},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8004191517829895},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.7552884817123413},{"id":"https://openalex.org/C53533937","wikidata":"https://www.wikidata.org/wiki/Q185020","display_name":"Histogram","level":3,"score":0.670703649520874},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6446378827095032},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.6387754082679749},{"id":"https://openalex.org/C2781142347","wikidata":"https://www.wikidata.org/wiki/Q1366592","display_name":"Hilbert curve","level":2,"score":0.6155016422271729},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.5859574675559998},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.47224920988082886},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4652142822742462},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4417007565498352},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4025418758392334},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.29975295066833496},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2018.2882563","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2018.2882563","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:0525b36f7490474689d1709e6d4f0bdc","is_oa":true,"landing_page_url":"https://doaj.org/article/0525b36f7490474689d1709e6d4f0bdc","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 6, Pp 76956-76969 (2018)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2018.2882563","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2018.2882563","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1305624689","display_name":null,"funder_award_id":"81701780","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5360352562","display_name":null,"funder_award_id":"2017GXNSFBA198221","funder_id":"https://openalex.org/F4320322768","funder_display_name":"Natural Science Foundation of Guangxi Province"},{"id":"https://openalex.org/G6093109367","display_name":null,"funder_award_id":"2017GXNSFAA198222","funder_id":"https://openalex.org/F4320322768","funder_display_name":"Natural Science Foundation of Guangxi Province"},{"id":"https://openalex.org/G6349116989","display_name":null,"funder_award_id":"61363034","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7551183568","display_name":null,"funder_award_id":"2015GXNSFDA139040","funder_id":"https://openalex.org/F4320322768","funder_display_name":"Natural Science Foundation of Guangxi Province"},{"id":"https://openalex.org/G8361878693","display_name":null,"funder_award_id":"61562007","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8805662163","display_name":null,"funder_award_id":"61762017","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321135","display_name":"Chongqing University","ror":"https://ror.org/023rhb549"},{"id":"https://openalex.org/F4320322768","display_name":"Natural Science Foundation of Guangxi Province","ror":null},{"id":"https://openalex.org/F4320325559","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65"},{"id":"https://openalex.org/F4320327522","display_name":"Guangxi University","ror":"https://ror.org/02c9qn167"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":52,"referenced_works":["https://openalex.org/W790982447","https://openalex.org/W1598104023","https://openalex.org/W1959190975","https://openalex.org/W1998279455","https://openalex.org/W2007591979","https://openalex.org/W2010380519","https://openalex.org/W2029438024","https://openalex.org/W2035735873","https://openalex.org/W2038658236","https://openalex.org/W2056515392","https://openalex.org/W2074253957","https://openalex.org/W2075965608","https://openalex.org/W2076501742","https://openalex.org/W2084994317","https://openalex.org/W2105145864","https://openalex.org/W2107359544","https://openalex.org/W2115924904","https://openalex.org/W2118296934","https://openalex.org/W2121036560","https://openalex.org/W2121393355","https://openalex.org/W2123218196","https://openalex.org/W2132172731","https://openalex.org/W2135459805","https://openalex.org/W2137288380","https://openalex.org/W2142181334","https://openalex.org/W2144622095","https://openalex.org/W2158807150","https://openalex.org/W2170269447","https://openalex.org/W2183964636","https://openalex.org/W2186686525","https://openalex.org/W2217927510","https://openalex.org/W2329615500","https://openalex.org/W2335243071","https://openalex.org/W2339430579","https://openalex.org/W2342152533","https://openalex.org/W2403682575","https://openalex.org/W2470053147","https://openalex.org/W2508330072","https://openalex.org/W2553731080","https://openalex.org/W2558527387","https://openalex.org/W2586175702","https://openalex.org/W2619884664","https://openalex.org/W2759097583","https://openalex.org/W2768703772","https://openalex.org/W2774059843","https://openalex.org/W2790928171","https://openalex.org/W2792958464","https://openalex.org/W2889049822","https://openalex.org/W2892067509","https://openalex.org/W3209866323","https://openalex.org/W4248031590","https://openalex.org/W6749397403"],"related_works":["https://openalex.org/W3155443874","https://openalex.org/W2052838852","https://openalex.org/W2167554674","https://openalex.org/W2168959081","https://openalex.org/W2052231930","https://openalex.org/W3127228990","https://openalex.org/W2301878849","https://openalex.org/W2054082132","https://openalex.org/W2092582715","https://openalex.org/W3101977789"],"abstract_inverted_index":{"Reversible":[0],"data":[1,8,19,76,113,144],"hiding":[2,20,145],"is":[3,53,85],"an":[4,22],"important":[5],"topic":[6],"of":[7,41,67,81,104],"hiding.":[9],"This":[10],"paper":[11],"proposes":[12],"a":[13,39,49,61,94,119,137],"novel":[14],"separable":[15],"and":[16,44,117,128,140],"error-free":[17],"reversible":[18,143],"in":[21,87,147],"encrypted":[23,71,83,96,107,121,149],"image":[24,37,84],"based":[25],"on":[26],"two-layer":[27,105],"pixel":[28,63,97,108],"errors.":[29],"Specifically,":[30],"the":[31,35,68,82,88,102,129,133,148],"proposed":[32,134],"scheme":[33,135],"divides":[34],"original":[36],"into":[38],"series":[40],"non-overlapped":[42,79],"blocks":[43],"permutes":[45],"these":[46],"blocks.":[47],"Then,":[48],"closed":[50,89],"Hilbert":[51,90],"curve":[52],"used":[54],"for":[55],"scanning":[56],"each":[57,78],"block":[58,80],"to":[59,92,110],"obtain":[60],"one-dimensional":[62,95],"sequence.":[64,98],"The":[65],"pixels":[66],"sequence":[69],"are":[70,125],"with":[72],"key":[73],"transmission.":[74],"During":[75],"hiding,":[77],"scanned":[86],"order":[91],"generate":[93,118],"Finally,":[99],"it":[100],"exploits":[101],"histogram":[103,115],"adjacent":[106],"errors":[109],"embed":[111],"secret":[112],"by":[114],"shifting":[116],"marked":[120],"image.":[122,150],"Many":[123],"experiments":[124],"carried":[126],"out,":[127],"results":[130],"demonstrate":[131],"that":[132],"reaches":[136],"high":[138],"payload":[139],"outperforms":[141],"some":[142],"schemes":[146]},"counts_by_year":[{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":3}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
