{"id":"https://openalex.org/W2997837529","doi":"https://doi.org/10.1109/access.2019.2961764","title":"A Hybrid Reversible Data Hiding for Multiple Images With High Embedding Capacity","display_name":"A Hybrid Reversible Data Hiding for Multiple Images With High Embedding Capacity","publication_year":2019,"publication_date":"2019-12-23","ids":{"openalex":"https://openalex.org/W2997837529","doi":"https://doi.org/10.1109/access.2019.2961764","mag":"2997837529"},"language":"en","primary_location":{"id":"doi:10.1109/access.2019.2961764","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2961764","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/08939415.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/08939415.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101736803","display_name":"Xiao\u2010Zhu Xie","orcid":"https://orcid.org/0000-0002-5480-8908"},"institutions":[{"id":"https://openalex.org/I4880106","display_name":"Feng Chia University","ror":"https://ror.org/05vhczg54","country_code":"TW","type":"education","lineage":["https://openalex.org/I4880106"]},{"id":"https://openalex.org/I75867142","display_name":"Xiamen University of Technology","ror":"https://ror.org/01285e189","country_code":"CN","type":"education","lineage":["https://openalex.org/I75867142"]}],"countries":["CN","TW"],"is_corresponding":true,"raw_author_name":"Xiao-Zhu Xie","raw_affiliation_strings":["Department of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan","Department of Information Engineering and Computer Science, Xiamen University of Technology, Xiamen, China","Engineering Research Center for Software Testing and Evaluation of Fujian Province, Xiamen University of Technology, Xiamen, China"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan","institution_ids":["https://openalex.org/I4880106"]},{"raw_affiliation_string":"Department of Information Engineering and Computer Science, Xiamen University of Technology, Xiamen, China","institution_ids":["https://openalex.org/I75867142"]},{"raw_affiliation_string":"Engineering Research Center for Software Testing and Evaluation of Fujian Province, Xiamen University of Technology, Xiamen, China","institution_ids":["https://openalex.org/I75867142"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038550838","display_name":"Chin\u2010Chen Chang","orcid":"https://orcid.org/0000-0002-7319-5780"},"institutions":[{"id":"https://openalex.org/I4880106","display_name":"Feng Chia University","ror":"https://ror.org/05vhczg54","country_code":"TW","type":"education","lineage":["https://openalex.org/I4880106"]},{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN","TW"],"is_corresponding":false,"raw_author_name":"Chin-Chen Chang","raw_affiliation_strings":["Department of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan","School of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan","institution_ids":["https://openalex.org/I4880106"]},{"raw_affiliation_string":"School of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058313652","display_name":"Chia\u2010Chen Lin","orcid":"https://orcid.org/0000-0003-4480-7351"},"institutions":[{"id":"https://openalex.org/I177918364","display_name":"Providence University","ror":"https://ror.org/03fcpsq87","country_code":"TW","type":"education","lineage":["https://openalex.org/I177918364"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Chia-Chen Lin","raw_affiliation_strings":["Department of Computer Science and Information Management, Providence University, Taichung, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Management, Providence University, Taichung, Taiwan","institution_ids":["https://openalex.org/I177918364"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101736803"],"corresponding_institution_ids":["https://openalex.org/I4880106","https://openalex.org/I75867142"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.4049,"has_fulltext":true,"cited_by_count":9,"citation_normalized_percentile":{"value":0.66660277,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"8","issue":null,"first_page":"37","last_page":"52"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.856200098991394},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8271673917770386},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.8061800003051758},{"id":"https://openalex.org/keywords/histogram","display_name":"Histogram","score":0.7740494012832642},{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.7688277959823608},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6637385487556458},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.6261944770812988},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5425281524658203},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5024027824401855},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4684866666793823},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4419609010219574},{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.43237701058387756},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.41426950693130493},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3421539068222046}],"concepts":[{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.856200098991394},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8271673917770386},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.8061800003051758},{"id":"https://openalex.org/C53533937","wikidata":"https://www.wikidata.org/wiki/Q185020","display_name":"Histogram","level":3,"score":0.7740494012832642},{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.7688277959823608},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6637385487556458},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.6261944770812988},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5425281524658203},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5024027824401855},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4684866666793823},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4419609010219574},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.43237701058387756},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.41426950693130493},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3421539068222046},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2019.2961764","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2961764","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/08939415.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:71c53387e13f4c25a8027d40c4cfbd2e","is_oa":true,"landing_page_url":"https://doaj.org/article/71c53387e13f4c25a8027d40c4cfbd2e","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 8, Pp 37-52 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2019.2961764","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2961764","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/08939415.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2997837529.pdf","grobid_xml":"https://content.openalex.org/works/W2997837529.grobid-xml"},"referenced_works_count":34,"referenced_works":["https://openalex.org/W767418378","https://openalex.org/W1979815644","https://openalex.org/W1980644670","https://openalex.org/W1990337861","https://openalex.org/W1990962661","https://openalex.org/W1993364002","https://openalex.org/W1996360405","https://openalex.org/W1998058925","https://openalex.org/W2015650256","https://openalex.org/W2052131022","https://openalex.org/W2058135112","https://openalex.org/W2082978919","https://openalex.org/W2086909871","https://openalex.org/W2107270044","https://openalex.org/W2107300816","https://openalex.org/W2121036560","https://openalex.org/W2121393355","https://openalex.org/W2130752051","https://openalex.org/W2135459805","https://openalex.org/W2137010171","https://openalex.org/W2155613307","https://openalex.org/W2156497968","https://openalex.org/W2163868069","https://openalex.org/W2166143274","https://openalex.org/W2312292273","https://openalex.org/W2344320947","https://openalex.org/W2502488580","https://openalex.org/W2565527502","https://openalex.org/W2584043662","https://openalex.org/W2760859501","https://openalex.org/W2762823399","https://openalex.org/W2969901329","https://openalex.org/W4232836212","https://openalex.org/W6684096771"],"related_works":["https://openalex.org/W2148973528","https://openalex.org/W2939392096","https://openalex.org/W4243922849","https://openalex.org/W2930153478","https://openalex.org/W2106726851","https://openalex.org/W4309385482","https://openalex.org/W3154843532","https://openalex.org/W2068740952","https://openalex.org/W2182496537","https://openalex.org/W1716757876"],"abstract_inverted_index":{"This":[0],"paper":[1],"proposed":[2,116],"a":[3,126],"high":[4],"capacity":[5],"reversible":[6],"data":[7,32],"hiding":[8],"(RDH)":[9],"scheme":[10,117],"using":[11],"three":[12,17,35,50,83],"steganographic":[13],"images,":[14],"on":[15],"which":[16],"successive":[18],"embedding":[19,24,33],"phases":[20],"are":[21,38],"performed.":[22],"An":[23],"rule":[25],"is":[26,58,75,90,94,103],"elaborately":[27],"designed":[28],"to":[29,105],"guide":[30],"the":[31,41,47,52,61,65,68,79,92,115,121],"and":[34,111,124],"alike":[36],"stego-images":[37],"generated":[39],"in":[40,60,108],"first":[42],"phase.":[43,63],"In":[44,64],"view":[45],"of":[46,49],"similarity":[48],"stego-images,":[51],"pixel":[53],"value":[54],"ordering":[55],"(PVO)":[56],"strategy":[57,74],"utilized":[59],"second":[62],"third":[66],"phase,":[67],"prediction":[69],"error":[70],"histogram":[71],"shifting":[72],"(PEHS)":[73],"employed":[76],"by":[77],"exploiting":[78],"slight":[80],"difference":[81],"among":[82],"temporary":[84],"stego-images.":[85],"Since":[86],"no":[87],"complex":[88],"operation":[89],"involved,":[91],"algorithm":[93],"efficient.":[95],"The":[96],"experimental":[97],"results":[98],"verify":[99],"that":[100],"our":[101],"method":[102],"superior":[104],"other":[106],"schemes":[107],"both":[109],"EC":[110],"image":[112],"quality.":[113],"Moreover,":[114],"can":[118],"successfully":[119],"resist":[120],"RS":[122],"steganalysis":[123],"provide":[125],"secure":[127],"secret":[128],"transmission.":[129]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
