{"id":"https://openalex.org/W2792054008","doi":"https://doi.org/10.1109/ipta.2017.8310143","title":"Reversible data hiding in encrypted images based on adaptive local entropy analysis","display_name":"Reversible data hiding in encrypted images based on adaptive local entropy analysis","publication_year":2017,"publication_date":"2017-11-01","ids":{"openalex":"https://openalex.org/W2792054008","doi":"https://doi.org/10.1109/ipta.2017.8310143","mag":"2792054008"},"language":"en","primary_location":{"id":"doi:10.1109/ipta.2017.8310143","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ipta.2017.8310143","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 Seventh International Conference on Image Processing Theory, Tools and Applications (IPTA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://hal-lirmm.ccsd.cnrs.fr/lirmm-01889962","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030535204","display_name":"Pauline Puteaux","orcid":"https://orcid.org/0000-0002-3236-4664"},"institutions":[{"id":"https://openalex.org/I19894307","display_name":"Universit\u00e9 de Montpellier","ror":"https://ror.org/051escj72","country_code":"FR","type":"education","lineage":["https://openalex.org/I19894307"]},{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I4210101743","display_name":"Laboratoire d'Informatique, de Robotique et de Micro\u00e9lectronique de Montpellier","ror":"https://ror.org/013yean28","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I151295451","https://openalex.org/I19894307","https://openalex.org/I4210101743","https://openalex.org/I4210159245","https://openalex.org/I4412460525"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Pauline Puteaux","raw_affiliation_strings":["LIRMM Laboratory, UMR 5506 CNRS, Univ. Montpellier, Montpellier, France"],"affiliations":[{"raw_affiliation_string":"LIRMM Laboratory, UMR 5506 CNRS, Univ. Montpellier, Montpellier, France","institution_ids":["https://openalex.org/I4210101743","https://openalex.org/I19894307","https://openalex.org/I1294671590"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067164546","display_name":"William Puech","orcid":"https://orcid.org/0000-0001-9383-2401"},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I4210101743","display_name":"Laboratoire d'Informatique, de Robotique et de Micro\u00e9lectronique de Montpellier","ror":"https://ror.org/013yean28","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I151295451","https://openalex.org/I19894307","https://openalex.org/I4210101743","https://openalex.org/I4210159245","https://openalex.org/I4412460525"]},{"id":"https://openalex.org/I19894307","display_name":"Universit\u00e9 de Montpellier","ror":"https://ror.org/051escj72","country_code":"FR","type":"education","lineage":["https://openalex.org/I19894307"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"William Puech","raw_affiliation_strings":["LIRMM Laboratory, UMR 5506 CNRS, Univ. Montpellier, Montpellier, France"],"affiliations":[{"raw_affiliation_string":"LIRMM Laboratory, UMR 5506 CNRS, Univ. Montpellier, Montpellier, France","institution_ids":["https://openalex.org/I4210101743","https://openalex.org/I19894307","https://openalex.org/I1294671590"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5030535204"],"corresponding_institution_ids":["https://openalex.org/I1294671590","https://openalex.org/I19894307","https://openalex.org/I4210101743"],"apc_list":null,"apc_paid":null,"fwci":0.5461,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.76978153,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":"16","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8738422393798828},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.760356068611145},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.7480761408805847},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.6648346781730652},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.5264041423797607},{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.49855852127075195},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4835038483142853},{"id":"https://openalex.org/keywords/advanced-encryption-standard","display_name":"Advanced Encryption Standard","score":0.4548708200454712},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.4326637387275696},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.43139445781707764},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3435032367706299},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.29569804668426514},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2834208011627197},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.147276371717453},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.07569959759712219}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8738422393798828},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.760356068611145},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.7480761408805847},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.6648346781730652},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.5264041423797607},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.49855852127075195},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4835038483142853},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.4548708200454712},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.4326637387275696},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.43139445781707764},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3435032367706299},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.29569804668426514},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2834208011627197},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.147276371717453},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.07569959759712219},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/ipta.2017.8310143","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ipta.2017.8310143","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 Seventh International Conference on Image Processing Theory, Tools and Applications (IPTA)","raw_type":"proceedings-article"},{"id":"pmh:oai:HAL:lirmm-01889962v1","is_oa":true,"landing_page_url":"https://hal-lirmm.ccsd.cnrs.fr/lirmm-01889962","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.ipta-conference.com/ipta17/","raw_type":"Conference papers"}],"best_oa_location":{"id":"pmh:oai:HAL:lirmm-01889962v1","is_oa":true,"landing_page_url":"https://hal-lirmm.ccsd.cnrs.fr/lirmm-01889962","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.ipta-conference.com/ipta17/","raw_type":"Conference papers"},"sustainable_development_goals":[{"score":0.5,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1578679998","https://openalex.org/W1992546115","https://openalex.org/W1995875735","https://openalex.org/W1998279455","https://openalex.org/W2010380519","https://openalex.org/W2012711090","https://openalex.org/W2052836530","https://openalex.org/W2054082132","https://openalex.org/W2063045808","https://openalex.org/W2074253957","https://openalex.org/W2075965608","https://openalex.org/W2118296934","https://openalex.org/W2121393355","https://openalex.org/W2135459805","https://openalex.org/W2137288380","https://openalex.org/W2139849636","https://openalex.org/W2158986121","https://openalex.org/W2170269447","https://openalex.org/W2322525404","https://openalex.org/W2342152533","https://openalex.org/W2359175208","https://openalex.org/W2508330072","https://openalex.org/W3209866323","https://openalex.org/W4247934040","https://openalex.org/W4255514781","https://openalex.org/W6634470314"],"related_works":["https://openalex.org/W2158491338","https://openalex.org/W3155443874","https://openalex.org/W2167554674","https://openalex.org/W2389373291","https://openalex.org/W3127228990","https://openalex.org/W2301878849","https://openalex.org/W2054082132","https://openalex.org/W3101977789","https://openalex.org/W2184946989","https://openalex.org/W2294670702"],"abstract_inverted_index":{"With":[0],"the":[1,6,48,62,72,76,79,86,94,103,113,138,141,148,179,194,205,208,213,217],"development":[2],"of":[3,22,31,78,102,129,193,207],"cloud":[4],"computing,":[5],"growth":[7],"in":[8,27,35,47,71,92,126],"information":[9],"technology":[10],"has":[11],"led":[12],"to":[13,42,57,85,116,122,161],"serious":[14],"security":[15,202],"issues.":[16],"For":[17],"this":[18,155,162],"reason,":[19],"a":[20,174],"lot":[21],"multimedia":[23],"files":[24],"are":[25,186],"stored":[26],"encrypted":[28,36,49,56,73],"forms.":[29],"Methods":[30],"reversible":[32],"data":[33],"hiding":[34],"images":[37],"(RDHEI)":[38],"have":[39],"been":[40],"designed":[41],"provide":[43],"authentication":[44],"and":[45,100,121,189],"integrity":[46],"domain.":[50],"The":[51,89],"original":[52,119,142],"image":[53,120,143,181],"is":[54,68,144],"firstly":[55],"ensure":[58],"confidentiality,":[59],"by":[60,146,164,216],"making":[61],"content":[63],"unreadable.":[64],"A":[65],"secret":[66],"message":[67],"then":[69],"embedded":[70],"image,":[74],"without":[75,177],"need":[77],"encryption":[80,214],"key":[81],"or":[82],"any":[83],"access":[84],"clear":[87],"content.":[88],"challenge":[90],"lies":[91],"finding":[93],"best":[95],"trade-off":[96],"between":[97],"embedding":[98],"capacity":[99],"quality":[101],"reconstructed":[104,145],"image.":[105],"In":[106,154],"2008,":[107],"Puech":[108],"et":[109],"al.":[110],"suggested":[111],"using":[112],"AES":[114,209],"algorithm":[115],"encrypt":[117],"an":[118,159,166,200],"embed":[123],"one":[124],"bit":[125],"each":[127,152],"block":[128],"16":[130],"pixels":[131],"(payload":[132],"=":[133],"0.0625":[134],"bpp)":[135],"[12].":[136],"During":[137],"decryption":[139],"phase,":[140],"measuring":[147],"standard":[149,215],"deviation":[150],"into":[151],"block.":[153],"paper,":[156],"we":[157],"propose":[158],"improvement":[160],"method,":[163],"performing":[165],"adaptive":[167],"local":[168],"entropy":[169],"measurement.":[170],"We":[171],"can":[172],"achieve":[173],"larger":[175],"payload":[176],"altering":[178],"recovered":[180],"quality.":[182],"Our":[183],"obtained":[184],"results":[185],"very":[187],"good":[188],"better":[190],"than":[191],"most":[192],"modern":[195],"state-of-the-art":[196],"methods,":[197],"whilst":[198],"offering":[199],"improved":[201],"level":[203],"with":[204],"use":[206],"algorithm,":[210],"defined":[211],"as":[212],"NIST.":[218]},"counts_by_year":[{"year":2022,"cited_by_count":4},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
