{"id":"https://openalex.org/W3012008737","doi":"https://doi.org/10.1109/apsipaasc47483.2019.9023310","title":"Reversible Data Hiding in PDF Document Exploiting Prefix Zeros in Glyph Coordinates","display_name":"Reversible Data Hiding in PDF Document Exploiting Prefix Zeros in Glyph Coordinates","publication_year":2019,"publication_date":"2019-11-01","ids":{"openalex":"https://openalex.org/W3012008737","doi":"https://doi.org/10.1109/apsipaasc47483.2019.9023310","mag":"3012008737"},"language":"en","primary_location":{"id":"doi:10.1109/apsipaasc47483.2019.9023310","is_oa":false,"landing_page_url":"https://doi.org/10.1109/apsipaasc47483.2019.9023310","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038615139","display_name":"Neelesh Nursiah","orcid":null},"institutions":[{"id":"https://openalex.org/I11662577","display_name":"Monash University Malaysia","ror":"https://ror.org/00yncr324","country_code":"MY","type":"education","lineage":["https://openalex.org/I11662577"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Neelesh Nursiah","raw_affiliation_strings":["School of Information Technology Monash University Malaysia, Malaysia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology Monash University Malaysia, Malaysia","institution_ids":["https://openalex.org/I11662577"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069916756","display_name":"KokSheik Wong","orcid":"https://orcid.org/0000-0002-4893-2291"},"institutions":[{"id":"https://openalex.org/I11662577","display_name":"Monash University Malaysia","ror":"https://ror.org/00yncr324","country_code":"MY","type":"education","lineage":["https://openalex.org/I11662577"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"KokSheik Wong","raw_affiliation_strings":["School of Information Technology Monash University Malaysia, Malaysia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology Monash University Malaysia, Malaysia","institution_ids":["https://openalex.org/I11662577"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024721011","display_name":"Minoru Kuribayashi","orcid":"https://orcid.org/0000-0003-4844-2652"},"institutions":[{"id":"https://openalex.org/I163770644","display_name":"Okayama University","ror":"https://ror.org/02pc6pc55","country_code":"JP","type":"education","lineage":["https://openalex.org/I163770644"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Minoru Kuribayashi","raw_affiliation_strings":["Graduate School of Natural Science and Technology Okayama University, Okayama, Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Natural Science and Technology Okayama University, Okayama, Japan","institution_ids":["https://openalex.org/I163770644"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5038615139"],"corresponding_institution_ids":["https://openalex.org/I11662577"],"apc_list":null,"apc_paid":null,"fwci":0.2024,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.56986774,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1298","last_page":"1302"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8230056762695312},{"id":"https://openalex.org/keywords/byte","display_name":"Byte","score":0.7923729419708252},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.5885748267173767},{"id":"https://openalex.org/keywords/file-format","display_name":"File format","score":0.5532752275466919},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.544150710105896},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.4347274899482727},{"id":"https://openalex.org/keywords/copying","display_name":"Copying","score":0.42563366889953613},{"id":"https://openalex.org/keywords/file-size","display_name":"File size","score":0.4106713533401489},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3961685597896576},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.38744720816612244},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.3424416184425354},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.24406516551971436},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1776457130908966},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.15840956568717957}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8230056762695312},{"id":"https://openalex.org/C43364308","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Byte","level":2,"score":0.7923729419708252},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.5885748267173767},{"id":"https://openalex.org/C97250363","wikidata":"https://www.wikidata.org/wiki/Q235557","display_name":"File format","level":2,"score":0.5532752275466919},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.544150710105896},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.4347274899482727},{"id":"https://openalex.org/C2779151265","wikidata":"https://www.wikidata.org/wiki/Q1156791","display_name":"Copying","level":2,"score":0.42563366889953613},{"id":"https://openalex.org/C2776029614","wikidata":"https://www.wikidata.org/wiki/Q1146367","display_name":"File size","level":2,"score":0.4106713533401489},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3961685597896576},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.38744720816612244},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3424416184425354},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.24406516551971436},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1776457130908966},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.15840956568717957},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/apsipaasc47483.2019.9023310","is_oa":false,"landing_page_url":"https://doi.org/10.1109/apsipaasc47483.2019.9023310","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1830858140","https://openalex.org/W2030884779","https://openalex.org/W2096186241","https://openalex.org/W2107465879","https://openalex.org/W2218483915","https://openalex.org/W2734937580","https://openalex.org/W2908320930","https://openalex.org/W4298014075","https://openalex.org/W6638789522","https://openalex.org/W6688839600","https://openalex.org/W6740533295"],"related_works":["https://openalex.org/W2373574911","https://openalex.org/W2054351791","https://openalex.org/W3203504906","https://openalex.org/W2497446005","https://openalex.org/W4221140504","https://openalex.org/W2171676767","https://openalex.org/W4312890355","https://openalex.org/W2189589914","https://openalex.org/W1716757876","https://openalex.org/W83713408"],"abstract_inverted_index":{"In":[0,138],"the":[1,13,32,55,71,75,99,105,116,129,133,139,154,166],"contemporary":[2],"world":[3],"of":[4,52,78,101,132,145,153],"information":[5],"technology,":[6],"PDF":[7,30,43,85,155,168],"(Portable":[8],"Document":[9],"Format)":[10],"has":[11,44,86],"become":[12,87],"de":[14],"facto":[15],"document":[16,36],"standard":[17],"which":[18],"allows":[19],"users":[20],"to":[21,61,73,93,127,164],"exchange":[22],"and":[23],"view":[24],"electronic":[25],"documents":[26],"across":[27],"various":[28],"platforms.":[29],"is":[31,58,122],"most":[33],"widely":[34],"exchanged":[35],"format":[37,57],"since":[38],"Internet":[39,72],"gained":[40],"popularity.":[41],"Although":[42],"a":[45,79,88],"good":[46],"authenticity":[47],"system":[48],"by":[49],"making":[50],"use":[51],"digital":[53,76],"signatures,":[54],"file":[56],"still":[59],"susceptible":[60],"copyright":[62],"infringement":[63],"as":[64],"there":[65],"are":[66,125],"many":[67],"libraries":[68],"available":[69],"on":[70],"bypass":[74],"signature":[77],"PDF.":[80],"Therefore,":[81],"claiming":[82],"ownership":[83],"for":[84],"paramount":[89],"issue":[90],"that":[91],"needs":[92],"be":[94,148,162],"addressed.":[95],"This":[96],"paper":[97],"proposes":[98],"idea":[100],"hiding":[102,136],"data":[103,135,146],"in":[104],"glyph":[106],"positioning":[107],"coordinate":[108],"value.":[109],"To":[110],"suppress":[111],"bit":[112],"stream":[113],"size":[114],"increment,":[115],"reverse":[117],"zero-run":[118],"length":[119],"coding":[120],"technique":[121],"adopted.":[123],"Experiments":[124],"conducted":[126],"verify":[128],"basic":[130],"performance":[131],"proposed":[134],"method.":[137],"best":[140],"case":[141],"scenario,":[142],"0.62":[143],"bits":[144],"can":[147,161],"embedded":[149],"into":[150],"each":[151],"Byte":[152],"file.":[156,169],"The":[157],"injected":[158],"leading":[159],"zeros":[160],"removed":[163],"restore":[165],"original":[167]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
