{"id":"https://openalex.org/W3005605506","doi":"https://doi.org/10.1109/icce-tw46550.2019.8991814","title":"Framework for Cloud Database Protection by Using Reversible Data Hiding Methods","display_name":"Framework for Cloud Database Protection by Using Reversible Data Hiding Methods","publication_year":2019,"publication_date":"2019-05-01","ids":{"openalex":"https://openalex.org/W3005605506","doi":"https://doi.org/10.1109/icce-tw46550.2019.8991814","mag":"3005605506"},"language":"en","primary_location":{"id":"doi:10.1109/icce-tw46550.2019.8991814","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icce-tw46550.2019.8991814","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102364216","display_name":"Guan-Yu Wu","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Guan-Yu Wu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5035592858","display_name":"Che-Wei Lee","orcid":"https://orcid.org/0000-0002-8926-244X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Che-Wei Lee","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5102364216"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.2044,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.57087452,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"2019","issue":null,"first_page":"1","last_page":"2"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.777464747428894},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7104607820510864},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.5541062355041504},{"id":"https://openalex.org/keywords/cloud-database","display_name":"Cloud database","score":0.485689252614975},{"id":"https://openalex.org/keywords/data-protection-act-1998","display_name":"Data Protection Act 1998","score":0.4213332533836365},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.36438608169555664},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16012951731681824}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.777464747428894},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7104607820510864},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.5541062355041504},{"id":"https://openalex.org/C2778974508","wikidata":"https://www.wikidata.org/wiki/Q2499178","display_name":"Cloud database","level":3,"score":0.485689252614975},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.4213332533836365},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36438608169555664},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16012951731681824}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/icce-tw46550.2019.8991814","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icce-tw46550.2019.8991814","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW)","raw_type":"proceedings-article"},{"id":"mag:3041272658","is_oa":false,"landing_page_url":"https://jglobal.jst.go.jp/en/detail?JGLOBAL_ID=202002219643279002","pdf_url":null,"source":{"id":"https://openalex.org/S4306512817","display_name":"IEEE Conference Proceedings","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":"IEEE Conference Proceedings","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.8199999928474426,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1973369466","https://openalex.org/W2053934947","https://openalex.org/W2060971784","https://openalex.org/W2100913369","https://openalex.org/W2107270044","https://openalex.org/W2135459805","https://openalex.org/W2136078037","https://openalex.org/W2900459057"],"related_works":["https://openalex.org/W2973190448","https://openalex.org/W2308871417","https://openalex.org/W4312274205","https://openalex.org/W1187916458","https://openalex.org/W2884115854","https://openalex.org/W3199753225","https://openalex.org/W3135740393","https://openalex.org/W4285687366","https://openalex.org/W2525741943","https://openalex.org/W2126420512"],"abstract_inverted_index":{"A":[0],"new":[1],"framework":[2],"of":[3,43,51,82,95],"data":[4,9,13,22,33,54,68,86],"security":[5],"for":[6,36],"database":[7],"numeric":[8,32,53,67,85],"by":[10,90],"using":[11],"reversible":[12,21],"hiding":[14,23,37],"method":[15],"is":[16],"proposed.":[17],"In":[18],"the":[19,30,41,44,49,58,65,71,75,79,83,92,96],"framework,":[20,46],"(RDH)":[24],"methods":[25],"are":[26,55],"recommended":[27],"to":[28,69],"encode":[29],"to-be-protected":[31],"in":[34],"databases":[35],"copyright":[38,59],"information.":[39],"Via":[40],"use":[42],"proposed":[45],"not":[47],"only":[48],"values":[50,81],"leaked":[52,66,84],"unreal":[56],"but":[57],"information":[60],"can":[61,87],"be":[62,88],"extracted":[63],"from":[64],"assert":[70],"ownership":[72],"and":[73],"disclose":[74],"illegal":[76],"behavior.":[77],"Furthermore,":[78],"real":[80],"regained":[89],"performing":[91],"reverse":[93],"process":[94],"RDH":[97],"method.":[98]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
