{"id":"https://openalex.org/W2112440746","doi":"https://doi.org/10.1109/iihmsp.2007.4457671","title":"Complementary Steganography in Error-Diffused Block Truncation Coding Images","display_name":"Complementary Steganography in Error-Diffused Block Truncation Coding Images","publication_year":2007,"publication_date":"2007-11-01","ids":{"openalex":"https://openalex.org/W2112440746","doi":"https://doi.org/10.1109/iihmsp.2007.4457671","mag":"2112440746"},"language":"en","primary_location":{"id":"doi:10.1109/iihmsp.2007.4457671","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iihmsp.2007.4457671","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089868194","display_name":"Jing-Ming Guo","orcid":"https://orcid.org/0000-0002-8041-6326"},"institutions":[{"id":"https://openalex.org/I154864474","display_name":"National Taiwan University of Science and Technology","ror":"https://ror.org/00q09pe49","country_code":"TW","type":"education","lineage":["https://openalex.org/I154864474"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Jing-Ming Guo","raw_affiliation_strings":["Department of Electrical Engineering, National Taiwan University of Science and Technology, Taipei, Taiwan","National Taiwan University of Science and Technology, Taipei"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, National Taiwan University of Science and Technology, Taipei, Taiwan","institution_ids":["https://openalex.org/I154864474"]},{"raw_affiliation_string":"National Taiwan University of Science and Technology, Taipei","institution_ids":["https://openalex.org/I154864474"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5089868194"],"corresponding_institution_ids":["https://openalex.org/I154864474"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14294712,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"1666","issue":null,"first_page":"134","last_page":"140"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10901","display_name":"Advanced Data Compression Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10741","display_name":"Video Coding and Compression Technologies","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/block-truncation-coding","display_name":"Block Truncation Coding","score":0.9044167995452881},{"id":"https://openalex.org/keywords/grayscale","display_name":"Grayscale","score":0.790915846824646},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7210771441459656},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.5511224269866943},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.5481727719306946},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.4860899746417999},{"id":"https://openalex.org/keywords/color-cell-compression","display_name":"Color Cell Compression","score":0.4626868963241577},{"id":"https://openalex.org/keywords/image-quality","display_name":"Image quality","score":0.45657020807266235},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.43053263425827026},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.4289824366569519},{"id":"https://openalex.org/keywords/block-size","display_name":"Block size","score":0.41489097476005554},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.39401012659072876},{"id":"https://openalex.org/keywords/image-compression","display_name":"Image compression","score":0.3939438760280609},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3844606876373291},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.31563377380371094},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.21922028064727783},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.19849789142608643},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.182430237531662},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.16317960619926453},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.0889466404914856}],"concepts":[{"id":"https://openalex.org/C20914364","wikidata":"https://www.wikidata.org/wiki/Q4927178","display_name":"Block Truncation Coding","level":5,"score":0.9044167995452881},{"id":"https://openalex.org/C78201319","wikidata":"https://www.wikidata.org/wiki/Q685727","display_name":"Grayscale","level":3,"score":0.790915846824646},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7210771441459656},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.5511224269866943},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.5481727719306946},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.4860899746417999},{"id":"https://openalex.org/C82804729","wikidata":"https://www.wikidata.org/wiki/Q5148551","display_name":"Color Cell Compression","level":5,"score":0.4626868963241577},{"id":"https://openalex.org/C55020928","wikidata":"https://www.wikidata.org/wiki/Q3813865","display_name":"Image quality","level":3,"score":0.45657020807266235},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.43053263425827026},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.4289824366569519},{"id":"https://openalex.org/C41431624","wikidata":"https://www.wikidata.org/wiki/Q1053357","display_name":"Block size","level":3,"score":0.41489097476005554},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.39401012659072876},{"id":"https://openalex.org/C13481523","wikidata":"https://www.wikidata.org/wiki/Q412438","display_name":"Image compression","level":4,"score":0.3939438760280609},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3844606876373291},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.31563377380371094},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.21922028064727783},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.19849789142608643},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.182430237531662},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.16317960619926453},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0889466404914856},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iihmsp.2007.4457671","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iihmsp.2007.4457671","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1562047373","https://openalex.org/W1973461919","https://openalex.org/W1980608980","https://openalex.org/W1997805064","https://openalex.org/W2000683976","https://openalex.org/W2005047329","https://openalex.org/W2013261981","https://openalex.org/W2051582985","https://openalex.org/W2053717006","https://openalex.org/W2102495953","https://openalex.org/W2105443992","https://openalex.org/W2135879701","https://openalex.org/W2144085591","https://openalex.org/W2169292146","https://openalex.org/W2208958634","https://openalex.org/W4236789552","https://openalex.org/W6633619750"],"related_works":["https://openalex.org/W2166772955","https://openalex.org/W2399878029","https://openalex.org/W2138711137","https://openalex.org/W3145908995","https://openalex.org/W2571376830","https://openalex.org/W2088460309","https://openalex.org/W191579501","https://openalex.org/W2025287167","https://openalex.org/W3162651033","https://openalex.org/W2189539745"],"abstract_inverted_index":{"Block":[0],"truncation":[1,35,121],"coding":[2,36,122],"is":[3,38,68,152],"an":[4,32],"efficient":[5],"compression":[6,26],"technique":[7],"while":[8],"offering":[9],"good":[10,149],"image":[11,150],"quality.":[12],"Nonetheless,":[13],"the":[14,46,48,52,55,61,71,76,86,93,96,114,131,142],"blocking":[15],"effect":[16],"inherent":[17],"in":[18,24,92,100,117,136,141],"BTC":[19,137],"causes":[20],"severe":[21],"perceptual":[22],"artifact":[23],"high":[25,63],"ratio":[27],"applications.":[28],"In":[29,83,109],"this":[30,42,110],"paper,":[31,111],"error-diffused":[33],"block":[34,120],"(EDBTC)":[37],"proposed":[39],"to":[40,45,70,129],"solve":[41],"problem.":[43],"According":[44],"EDBTC,":[47],"error":[49,127],"caused":[50],"by":[51],"difference":[53],"between":[54],"original":[56],"grayscale":[57,78],"pixel":[58],"value":[59],"and":[60,74],"correspondingly":[62],"or":[64],"low":[65,146],"mean":[66],"substitute":[67],"diffused":[69,119],"predefined":[72],"neighborhood,":[73],"hence":[75],"average":[77],"will":[79],"be":[80],"maintained":[81],"invariably.":[82],"addition,":[84],"since":[85],"compressed":[87],"data":[88],"are":[89],"widely":[90],"distributed":[91],"Internet":[94],"transmission,":[95],"extra":[97],"message":[98],"conveying":[99],"a":[101,145],"secret":[102,134],"way":[103],"also":[104],"highly":[105],"raises":[106],"attention":[107],"recently.":[108],"we":[112],"propose":[113],"complementary":[115],"steganography":[116],"error-":[118],"(CSEDBTC),":[123],"which":[124],"cooperates":[125],"with":[126,148],"diffusion":[128],"achieve":[130],"objective":[132],"of":[133],"communication":[135],"images.":[138],"As":[139],"documented":[140],"experimental":[143],"results,":[144],"complexity":[147],"quality":[151],"obtained.":[153]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
