{"id":"https://openalex.org/W1562047373","doi":"https://doi.org/10.1109/cit.2004.1357176","title":"A novel information hiding scheme based on BTC","display_name":"A novel information hiding scheme based on BTC","publication_year":2004,"publication_date":"2004-12-23","ids":{"openalex":"https://openalex.org/W1562047373","doi":"https://doi.org/10.1109/cit.2004.1357176","mag":"1562047373"},"language":"en","primary_location":{"id":"doi:10.1109/cit.2004.1357176","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cit.2004.1357176","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Fourth International Conference onComputer and Information Technology, 2004. CIT '04.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058313652","display_name":"Chia\u2010Chen Lin","orcid":"https://orcid.org/0000-0003-4480-7351"},"institutions":[{"id":"https://openalex.org/I177918364","display_name":"Providence University","ror":"https://ror.org/03fcpsq87","country_code":"TW","type":"education","lineage":["https://openalex.org/I177918364"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Min-Hui Lin","raw_affiliation_strings":["Department of Computer Science and Information Mangement, Providence University, Taichung, Taiwan","Dept. of Comput. Sci. & Inf. Manage., Providence Univ., Taichung, , Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Mangement, Providence University, Taichung, Taiwan","institution_ids":["https://openalex.org/I177918364"]},{"raw_affiliation_string":"Dept. of Comput. Sci. & Inf. Manage., Providence Univ., Taichung, , Taiwan","institution_ids":["https://openalex.org/I177918364"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027171565","display_name":"C. C. Chang","orcid":"https://orcid.org/0000-0001-9345-7728"},"institutions":[{"id":"https://openalex.org/I196272386","display_name":"Providence College","ror":"https://ror.org/00rxpqe74","country_code":"US","type":"education","lineage":["https://openalex.org/I196272386"]},{"id":"https://openalex.org/I148099254","display_name":"National Chung Cheng University","ror":"https://ror.org/0028v3876","country_code":"TW","type":"education","lineage":["https://openalex.org/I148099254"]}],"countries":["TW","US"],"is_corresponding":false,"raw_author_name":"Chin-Chen Chang","raw_affiliation_strings":["Department of Computer Science and Information Engineering, National Chung Cheng University, Chiayi, Taiwan","Providence\u00a0University"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Engineering, National Chung Cheng University, Chiayi, Taiwan","institution_ids":["https://openalex.org/I148099254"]},{"raw_affiliation_string":"Providence\u00a0University","institution_ids":["https://openalex.org/I196272386"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5058313652"],"corresponding_institution_ids":["https://openalex.org/I177918364"],"apc_list":null,"apc_paid":null,"fwci":1.0931,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.78104435,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"16","issue":null,"first_page":"66","last_page":"71"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bitmap","display_name":"Bitmap","score":0.8638035655021667},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7765340805053711},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.6816847324371338},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.6420963406562805},{"id":"https://openalex.org/keywords/block-truncation-coding","display_name":"Block Truncation Coding","score":0.5547941327095032},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5512215495109558},{"id":"https://openalex.org/keywords/image-compression","display_name":"Image compression","score":0.5260555744171143},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5056345462799072},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.4996490478515625},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.468894898891449},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.459911048412323},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.453133761882782},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.4433170557022095},{"id":"https://openalex.org/keywords/lossy-compression","display_name":"Lossy compression","score":0.4223945736885071},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.4041305184364319},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.39778053760528564},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.316112756729126},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2513755261898041},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.16077274084091187}],"concepts":[{"id":"https://openalex.org/C3115412","wikidata":"https://www.wikidata.org/wiki/Q1194708","display_name":"Bitmap","level":2,"score":0.8638035655021667},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7765340805053711},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.6816847324371338},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.6420963406562805},{"id":"https://openalex.org/C20914364","wikidata":"https://www.wikidata.org/wiki/Q4927178","display_name":"Block Truncation Coding","level":5,"score":0.5547941327095032},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5512215495109558},{"id":"https://openalex.org/C13481523","wikidata":"https://www.wikidata.org/wiki/Q412438","display_name":"Image compression","level":4,"score":0.5260555744171143},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5056345462799072},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.4996490478515625},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.468894898891449},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.459911048412323},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.453133761882782},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.4433170557022095},{"id":"https://openalex.org/C165021410","wikidata":"https://www.wikidata.org/wiki/Q55564","display_name":"Lossy compression","level":2,"score":0.4223945736885071},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4041305184364319},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.39778053760528564},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.316112756729126},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2513755261898041},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.16077274084091187},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cit.2004.1357176","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cit.2004.1357176","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Fourth International Conference onComputer and Information Technology, 2004. CIT '04.","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7900000214576721,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1996360405","https://openalex.org/W2069314928","https://openalex.org/W2077535460","https://openalex.org/W2097559935","https://openalex.org/W2122256249","https://openalex.org/W2135879701","https://openalex.org/W2158518777","https://openalex.org/W4232836212"],"related_works":["https://openalex.org/W2384927173","https://openalex.org/W284191091","https://openalex.org/W2282525675","https://openalex.org/W2356654515","https://openalex.org/W2004606152","https://openalex.org/W2400702275","https://openalex.org/W2521120503","https://openalex.org/W2009986702","https://openalex.org/W1520013427","https://openalex.org/W2016567496"],"abstract_inverted_index":{"The":[0,57,87],"general":[1],"hiding":[2],"strategy":[3],"is":[4,63,136],"to":[5,52,64,101,119],"embed":[6,65],"the":[7,34,48,54,66,70,75,82,93,103,110,121,124,127],"confidential":[8],"image":[9,17,68],"such":[10,42,78],"as":[11,43,79],"a":[12,39],"weaponry":[13],"plan,":[14],"called":[15],"secret":[16,67,104,122],"in":[18,50,117],"this":[19,61],"paper,":[20],"into":[21,69],"an":[22],"in-confidential":[23],"image.":[24],"However,":[25],"we":[26],"have":[27,90],"found":[28],"that":[29,92],"sometimes":[30],"people":[31],"also":[32],"transmit":[33],"compression":[35,40,71],"codes":[36,72],"generated":[37,73,129],"by":[38,74,130],"technique,":[41],"VQ":[44],"or":[45],"BTC,":[46],"via":[47],"Internet":[49],"order":[51,118],"save":[53],"transmission":[55],"time.":[56],"key":[58],"point":[59],"of":[60,84],"paper":[62],"BTC":[76,132],"algorithm,":[77],"means":[80,112],"and":[81,113,133],"bitmap":[83],"each":[85],"block.":[86],"experimental":[88],"results":[89],"confirmed":[91],"proposed":[94],"approach":[95],"would":[96],"indeed":[97],"allow":[98],"legal":[99],"receivers":[100],"retrieve":[102],"images":[105],"without":[106],"distorting":[107],"them.":[108],"Although":[109],"original":[111,131],"bitmaps":[114],"are":[115],"modified":[116],"hide":[120],"images,":[123],"difference":[125],"between":[126],"PSNRs":[128],"our":[134],"scheme":[135],"insignificant.":[137]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
