{"id":"https://openalex.org/W2620237695","doi":"https://doi.org/10.1109/iwbf.2017.7935100","title":"Reversible data hiding in encrypted images using reformed JPEG compression","display_name":"Reversible data hiding in encrypted images using reformed JPEG compression","publication_year":2017,"publication_date":"2017-04-01","ids":{"openalex":"https://openalex.org/W2620237695","doi":"https://doi.org/10.1109/iwbf.2017.7935100","mag":"2620237695"},"language":"en","primary_location":{"id":"doi:10.1109/iwbf.2017.7935100","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwbf.2017.7935100","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101736803","display_name":"Xiao\u2010Zhu Xie","orcid":"https://orcid.org/0000-0002-5480-8908"},"institutions":[{"id":"https://openalex.org/I75867142","display_name":"Xiamen University of Technology","ror":"https://ror.org/01285e189","country_code":"CN","type":"education","lineage":["https://openalex.org/I75867142"]},{"id":"https://openalex.org/I4880106","display_name":"Feng Chia University","ror":"https://ror.org/05vhczg54","country_code":"TW","type":"education","lineage":["https://openalex.org/I4880106"]}],"countries":["CN","TW"],"is_corresponding":true,"raw_author_name":"Xiaozhu Xie","raw_affiliation_strings":["China Department of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan","Department of Computer Science, Xiamen University of Technology, Xiamen"],"affiliations":[{"raw_affiliation_string":"China Department of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan","institution_ids":["https://openalex.org/I4880106"]},{"raw_affiliation_string":"Department of Computer Science, Xiamen University of Technology, Xiamen","institution_ids":["https://openalex.org/I75867142"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038550838","display_name":"Chin\u2010Chen Chang","orcid":"https://orcid.org/0000-0002-7319-5780"},"institutions":[{"id":"https://openalex.org/I4880106","display_name":"Feng Chia University","ror":"https://ror.org/05vhczg54","country_code":"TW","type":"education","lineage":["https://openalex.org/I4880106"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Chin-Chen Chang","raw_affiliation_strings":["China Department of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan"],"affiliations":[{"raw_affiliation_string":"China Department of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan","institution_ids":["https://openalex.org/I4880106"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101736803"],"corresponding_institution_ids":["https://openalex.org/I4880106","https://openalex.org/I75867142"],"apc_list":null,"apc_paid":null,"fwci":0.182,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.55049635,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8788895606994629},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.8464210629463196},{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.7406291365623474},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.6481884717941284},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.6317358613014221},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.5950647592544556},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5878719091415405},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5824657678604126},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5792028307914734},{"id":"https://openalex.org/keywords/transform-coding","display_name":"Transform coding","score":0.5465547442436218},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.4716721475124359},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4394381642341614},{"id":"https://openalex.org/keywords/image-quality","display_name":"Image quality","score":0.4208134412765503},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.34298795461654663},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09598013758659363},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.06252330541610718}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8788895606994629},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.8464210629463196},{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.7406291365623474},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.6481884717941284},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.6317358613014221},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.5950647592544556},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5878719091415405},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5824657678604126},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5792028307914734},{"id":"https://openalex.org/C169805256","wikidata":"https://www.wikidata.org/wiki/Q1361381","display_name":"Transform coding","level":4,"score":0.5465547442436218},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4716721475124359},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4394381642341614},{"id":"https://openalex.org/C55020928","wikidata":"https://www.wikidata.org/wiki/Q3813865","display_name":"Image quality","level":3,"score":0.4208134412765503},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34298795461654663},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09598013758659363},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.06252330541610718},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwbf.2017.7935100","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwbf.2017.7935100","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1998279455","https://openalex.org/W2010380519","https://openalex.org/W2065449792","https://openalex.org/W2075965608","https://openalex.org/W2101647944","https://openalex.org/W2101677434","https://openalex.org/W2138256990","https://openalex.org/W2170269447","https://openalex.org/W2342152533","https://openalex.org/W2407786055","https://openalex.org/W2470053147"],"related_works":["https://openalex.org/W1597187555","https://openalex.org/W2614249221","https://openalex.org/W2997133669","https://openalex.org/W2108294500","https://openalex.org/W1975188435","https://openalex.org/W2158017498","https://openalex.org/W2094583657","https://openalex.org/W1594300462","https://openalex.org/W2158009109","https://openalex.org/W1830945637"],"abstract_inverted_index":{"A":[0],"scheme":[1,95],"of":[2,55],"reversible":[3],"data":[4],"hiding":[5],"in":[6,16,52],"encrypted":[7,36,40,50,65],"image":[8,21,51,69,107],"(RDH-EI)":[9],"with":[10],"high":[11,99],"embedding":[12,86,100],"capacity":[13],"is":[14,22,46],"proposed":[15,94],"this":[17],"paper.":[18],"First,":[19],"cover":[20],"transformed":[23],"to":[24,37,61],"the":[25,39,43,49,53,63,75,85,93,105],"quantized":[26],"discrete":[27],"cosine":[28],"transform":[29],"(DCT)":[30],"coefficients,":[31],"which":[32],"are":[33],"reformed":[34],"and":[35],"generate":[38,62],"image.":[41,66],"Then":[42],"secret":[44,79],"message":[45,80],"embedded":[47],"into":[48],"location":[54],"zero":[56],"alternating":[57],"current":[58],"(ac)":[59],"coefficients":[60],"marked":[64],"The":[67,78,88],"JPEG":[68],"can":[70,81,96],"be":[71,82],"recovered":[72,106],"by":[73],"using":[74,84],"encryption":[76],"key.":[77,87],"extracted":[83],"experimental":[89],"results":[90],"showed":[91],"that":[92,104],"obtain":[97],"a":[98],"ratio":[101],"while":[102],"ensuring":[103],"will":[108],"have":[109],"good":[110],"quality.":[111]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
