{"id":"https://openalex.org/W2167424133","doi":"https://doi.org/10.1109/ism.2007.4412383","title":"Quality Compressed Steganography Using Hidden Referenced Halftoning","display_name":"Quality Compressed Steganography Using Hidden Referenced Halftoning","publication_year":2007,"publication_date":"2007-12-01","ids":{"openalex":"https://openalex.org/W2167424133","doi":"https://doi.org/10.1109/ism.2007.4412383","mag":"2167424133"},"language":"en","primary_location":{"id":"doi:10.1109/ism.2007.4412383","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ism.2007.4412383","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Ninth IEEE International Symposium on Multimedia (ISM 2007)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089868194","display_name":"Jing-Ming Guo","orcid":"https://orcid.org/0000-0002-8041-6326"},"institutions":[{"id":"https://openalex.org/I154864474","display_name":"National Taiwan University of Science and Technology","ror":"https://ror.org/00q09pe49","country_code":"TW","type":"education","lineage":["https://openalex.org/I154864474"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Jing-Ming Guo","raw_affiliation_strings":["Department of Electrical Engineering, National Taiwan University of Science and Technology, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, National Taiwan University of Science and Technology, Taiwan","institution_ids":["https://openalex.org/I154864474"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018819205","display_name":"Jen-Ho Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I154864474","display_name":"National Taiwan University of Science and Technology","ror":"https://ror.org/00q09pe49","country_code":"TW","type":"education","lineage":["https://openalex.org/I154864474"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Jen-Ho Chen","raw_affiliation_strings":["Department of Electrical Engineering, National Taiwan University of Science and Technology, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, National Taiwan University of Science and Technology, Taiwan","institution_ids":["https://openalex.org/I154864474"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5089868194"],"corresponding_institution_ids":["https://openalex.org/I154864474"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.18008608,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"6","issue":null,"first_page":"273","last_page":"281"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10901","display_name":"Advanced Data Compression Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10741","display_name":"Video Coding and Compression Technologies","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8286738395690918},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.7504529356956482},{"id":"https://openalex.org/keywords/block-truncation-coding","display_name":"Block Truncation Coding","score":0.7412043213844299},{"id":"https://openalex.org/keywords/grayscale","display_name":"Grayscale","score":0.7346556186676025},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.5154317617416382},{"id":"https://openalex.org/keywords/image-quality","display_name":"Image quality","score":0.47591859102249146},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4492350220680237},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.43983757495880127},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.4189620018005371},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.3643191456794739},{"id":"https://openalex.org/keywords/image-compression","display_name":"Image compression","score":0.36249107122421265},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.35346001386642456},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.23224401473999023},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.23172083497047424},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1310850977897644}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8286738395690918},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.7504529356956482},{"id":"https://openalex.org/C20914364","wikidata":"https://www.wikidata.org/wiki/Q4927178","display_name":"Block Truncation Coding","level":5,"score":0.7412043213844299},{"id":"https://openalex.org/C78201319","wikidata":"https://www.wikidata.org/wiki/Q685727","display_name":"Grayscale","level":3,"score":0.7346556186676025},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.5154317617416382},{"id":"https://openalex.org/C55020928","wikidata":"https://www.wikidata.org/wiki/Q3813865","display_name":"Image quality","level":3,"score":0.47591859102249146},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4492350220680237},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.43983757495880127},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.4189620018005371},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.3643191456794739},{"id":"https://openalex.org/C13481523","wikidata":"https://www.wikidata.org/wiki/Q412438","display_name":"Image compression","level":4,"score":0.36249107122421265},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.35346001386642456},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.23224401473999023},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.23172083497047424},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1310850977897644},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ism.2007.4412383","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ism.2007.4412383","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Ninth IEEE International Symposium on Multimedia (ISM 2007)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W4587778","https://openalex.org/W1562047373","https://openalex.org/W1973461919","https://openalex.org/W1980608980","https://openalex.org/W1990631152","https://openalex.org/W1997805064","https://openalex.org/W2005047329","https://openalex.org/W2013261981","https://openalex.org/W2051582985","https://openalex.org/W2053717006","https://openalex.org/W2102495953","https://openalex.org/W2105443992","https://openalex.org/W2117008804","https://openalex.org/W2135879701","https://openalex.org/W2144085591","https://openalex.org/W2148035608","https://openalex.org/W2159978942","https://openalex.org/W2163677385","https://openalex.org/W2169057201","https://openalex.org/W2169292146","https://openalex.org/W2208958634","https://openalex.org/W2487933172","https://openalex.org/W2616163540","https://openalex.org/W2919099581","https://openalex.org/W4236789552","https://openalex.org/W6633619750"],"related_works":["https://openalex.org/W3203504906","https://openalex.org/W2497446005","https://openalex.org/W2171676767","https://openalex.org/W4312890355","https://openalex.org/W83713408","https://openalex.org/W1716757876","https://openalex.org/W4285356283","https://openalex.org/W4293373802","https://openalex.org/W4318577714","https://openalex.org/W2768694202"],"abstract_inverted_index":{"Block":[0],"truncation":[1,35],"coding":[2,36],"is":[3,38,68,154,158,171,187],"an":[4,32,203],"efficient":[5],"compression":[6,26],"technique":[7],"while":[8],"offering":[9],"good":[10,150],"image":[11,151],"quality.":[12],"Nonetheless,":[13],"the":[14,46,48,52,55,61,71,76,86,93,96,114,132,143,183],"blocking":[15],"effect":[16],"inherent":[17],"in":[18,24,92,100,137,142],"BTC":[19,138],"causes":[20],"severe":[21],"perceptual":[22],"artifact":[23],"high":[25,63,208],"ratio":[27],"applications.":[28],"In":[29,83,109],"this":[30,42,110],"paper,":[31,111],"error-diffused":[33],"block":[34],"(EDBTC)":[37],"proposed":[39],"to":[40,45,70,130,160,173,189],"solve":[41],"problem.":[43],"According":[44],"EDBTC,":[47],"error":[49,125],"caused":[50],"by":[51],"difference":[53],"between":[54],"original":[56],"grayscale":[57,78],"pixel":[58],"value":[59],"and":[60,74,127,164,180],"correspondingly":[62],"or":[64],"low":[65,147],"mean":[66],"substitute":[67],"diffused":[69],"predefined":[72],"neighborhood,":[73],"hence":[75,181],"average":[77],"will":[79],"be":[80],"maintained":[81],"invariably.":[82],"addition,":[84],"since":[85],"compressed":[87,115],"data":[88],"are":[89,200],"widely":[90],"distributed":[91],"internet":[94],"transmission,":[95],"extra":[97,204],"message":[98,175,192,210],"delivering":[99],"a":[101,146],"secret":[102,135],"way":[103],"also":[104,201],"highly":[105],"raises":[106],"attention":[107],"recently.":[108],"we":[112],"propose":[113],"steganography":[116,162,167],"using":[117],"Hidden":[118],"Referenced":[119],"Halftoning":[120],"(CSHRH),":[121],"which":[122],"cooperates":[123],"with":[124,149,202],"diffusion":[126],"ordered":[128],"dithering":[129],"achieve":[131],"objective":[133],"of":[134,206],"communication":[136],"images.":[139],"As":[140],"documented":[141],"experimental":[144],"results,":[145],"complexity":[148],"quality":[152],"approach":[153],"obtained.":[155],"Moreover,":[156],"CSHRH":[157,196],"extended":[159],"secret-sharing":[161],"(SSS)":[163],"color":[165,194],"extension":[166],"(CES).":[168],"The":[169,185],"SSS":[170],"able":[172,188],"distribute":[174],"into":[176],"multiple":[177],"host":[178],"images":[179],"improves":[182],"security.":[184],"CES":[186],"deliver":[190],"secure":[191],"via":[193],"embedded":[195],"image.":[197],"Both":[198],"extensions":[199],"benefit":[205],"achieving":[207],"capacity":[209],"convection.":[211]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
