{"id":"https://openalex.org/W2125329004","doi":"https://doi.org/10.1109/icmlc.2010.5580795","title":"A near reversible image watermarking algorithm","display_name":"A near reversible image watermarking algorithm","publication_year":2010,"publication_date":"2010-07-01","ids":{"openalex":"https://openalex.org/W2125329004","doi":"https://doi.org/10.1109/icmlc.2010.5580795","mag":"2125329004"},"language":"en","primary_location":{"id":"doi:10.1109/icmlc.2010.5580795","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icmlc.2010.5580795","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 International Conference on Machine Learning and Cybernetics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100392947","display_name":"Bin Zhang","orcid":"https://orcid.org/0009-0008-7206-144X"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Bin Zhang","raw_affiliation_strings":["Key Laboratory of network and information attack & defence technology of MOE, Beijing University of Posts and Telecommunications, Beijing, China","Key Laboratory of network and information attack & defence technology of MOE, Beijing University of Posts and, Telecommunications, Beijing 100086, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of network and information attack & defence technology of MOE, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"Key Laboratory of network and information attack & defence technology of MOE, Beijing University of Posts and, Telecommunications, Beijing 100086, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089827558","display_name":"Yang Xin","orcid":"https://orcid.org/0000-0002-9706-3950"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Xin","raw_affiliation_strings":["Key Laboratory of network and information attack & defence technology of MOE, Beijing University of Posts and Telecommunications, Beijing, China","Key Laboratory of network and information attack & defence technology of MOE, Beijing University of Posts and, Telecommunications, Beijing 100086, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of network and information attack & defence technology of MOE, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"Key Laboratory of network and information attack & defence technology of MOE, Beijing University of Posts and, Telecommunications, Beijing 100086, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103099146","display_name":"Xinxin Niu","orcid":"https://orcid.org/0000-0002-8143-0189"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin-Xin Niu","raw_affiliation_strings":["Key Laboratory of network and information attack & defence technology of MOE, Beijing University of Posts and Telecommunications, Beijing, China","Key Laboratory of network and information attack & defence technology of MOE, Beijing University of Posts and, Telecommunications, Beijing 100086, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of network and information attack & defence technology of MOE, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"Key Laboratory of network and information attack & defence technology of MOE, Beijing University of Posts and, Telecommunications, Beijing 100086, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024537966","display_name":"Kaiguo Yuan","orcid":"https://orcid.org/0009-0003-0685-295X"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kai-Guo Yuan","raw_affiliation_strings":["Key Laboratory of network and information attack & defence technology of MOE, Beijing University of Posts and Telecommunications, Beijing, China","Key Laboratory of network and information attack & defence technology of MOE, Beijing University of Posts and, Telecommunications, Beijing 100086, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of network and information attack & defence technology of MOE, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"Key Laboratory of network and information attack & defence technology of MOE, Beijing University of Posts and, Telecommunications, Beijing 100086, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078870086","display_name":"Hui-Bai Jiang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hui-Bai Jiang","raw_affiliation_strings":["Beijing Safe-Code Technology Company Limited, Beijing, China","Beijing Safe-Code Technology CO., LTD. Beijing 100086, China"],"affiliations":[{"raw_affiliation_string":"Beijing Safe-Code Technology Company Limited, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"Beijing Safe-Code Technology CO., LTD. Beijing 100086, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100392947"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":1.2749,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.82349384,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"5020","issue":null,"first_page":"2824","last_page":"2828"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9868000149726868,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.9681534171104431},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.9063116312026978},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.6821069717407227},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.6777727603912354},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6589438915252686},{"id":"https://openalex.org/keywords/computational-complexity-theory","display_name":"Computational complexity theory","score":0.5293527245521545},{"id":"https://openalex.org/keywords/least-significant-bit","display_name":"Least significant bit","score":0.5072119235992432},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4472339451313019},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.30693894624710083}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.9681534171104431},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.9063116312026978},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.6821069717407227},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.6777727603912354},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6589438915252686},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.5293527245521545},{"id":"https://openalex.org/C4305246","wikidata":"https://www.wikidata.org/wiki/Q3885225","display_name":"Least significant bit","level":2,"score":0.5072119235992432},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4472339451313019},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.30693894624710083},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icmlc.2010.5580795","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icmlc.2010.5580795","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 International Conference on Machine Learning and Cybernetics","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1829653235","https://openalex.org/W2004425531","https://openalex.org/W2036117290","https://openalex.org/W2098599422","https://openalex.org/W2105770740","https://openalex.org/W2107175348","https://openalex.org/W2110796399","https://openalex.org/W2123218196","https://openalex.org/W2132283765","https://openalex.org/W4247934040","https://openalex.org/W6676621694","https://openalex.org/W6678225182"],"related_works":["https://openalex.org/W2163290991","https://openalex.org/W2361184779","https://openalex.org/W3174961728","https://openalex.org/W2474386553","https://openalex.org/W2125329004","https://openalex.org/W2141752560","https://openalex.org/W2383287948","https://openalex.org/W4288057808","https://openalex.org/W2379234696","https://openalex.org/W3134175397"],"abstract_inverted_index":{"Being":[0],"a":[1,60,78],"novel":[2],"category":[3],"of":[4],"watermarking":[5,8,29,63],"schemes,":[6],"reversible":[7,28,62],"algorithms":[9,30,42],"were":[10],"developed":[11],"in":[12],"recent":[13],"years.":[14],"As":[15],"it":[16],"can":[17,70],"recover":[18,73],"the":[19,24,74],"watermarked":[20],"data":[21,76],"back":[22],"to":[23,77],"original":[25,75],"host":[26],"signal,":[27],"are":[31],"suitable":[32],"for":[33],"medical,":[34],"military":[35],"and":[36,53,86],"other":[37],"special":[38],"fields.":[39],"However,":[40],"these":[41],"have":[43,83],"their":[44],"defects,":[45],"such":[46],"as":[47],"weak":[48],"robustness,":[49],"low":[50,87],"embedding":[51],"capacity":[52],"high":[54,79],"calculating":[55,88],"complexity.":[56,89],"This":[57],"paper":[58],"proposes":[59],"near":[61],"algorithm":[64],"based":[65],"on":[66],"LSB":[67],"replacement.":[68],"It":[69],"not":[71],"only":[72],"extent,":[80],"but":[81],"also":[82],"strong":[84],"robustness":[85]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
