{"id":"https://openalex.org/W4414603514","doi":"https://doi.org/10.1109/jiot.2025.3615138","title":"QR: Modular Arithmetic-Enhanced Virtual Bit Plane Construction for High-Capacity Image Steganography","display_name":"QR: Modular Arithmetic-Enhanced Virtual Bit Plane Construction for High-Capacity Image Steganography","publication_year":2025,"publication_date":"2025-09-29","ids":{"openalex":"https://openalex.org/W4414603514","doi":"https://doi.org/10.1109/jiot.2025.3615138"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2025.3615138","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3615138","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111923175","display_name":"Chang-Joon Chae","orcid":null},"institutions":[{"id":"https://openalex.org/I193352282","display_name":"Daegu Gyeongbuk Institute of Science and Technology","ror":"https://ror.org/03frjya69","country_code":"KR","type":"education","lineage":["https://openalex.org/I193352282"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Chuck Chae","raw_affiliation_strings":["Department of Electrical Engineering and Computer Science, DGIST, Daegu, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Computer Science, DGIST, Daegu, Republic of Korea","institution_ids":["https://openalex.org/I193352282"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029145965","display_name":"Wonje Heo","orcid":"https://orcid.org/0000-0003-1753-8977"},"institutions":[{"id":"https://openalex.org/I193352282","display_name":"Daegu Gyeongbuk Institute of Science and Technology","ror":"https://ror.org/03frjya69","country_code":"KR","type":"education","lineage":["https://openalex.org/I193352282"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Wonje Heo","raw_affiliation_strings":["Department of Electrical Engineering and Computer Science, DGIST, Daegu, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Computer Science, DGIST, Daegu, Republic of Korea","institution_ids":["https://openalex.org/I193352282"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057860737","display_name":"Donghoon Shin","orcid":"https://orcid.org/0009-0004-7088-3846"},"institutions":[{"id":"https://openalex.org/I193352282","display_name":"Daegu Gyeongbuk Institute of Science and Technology","ror":"https://ror.org/03frjya69","country_code":"KR","type":"education","lineage":["https://openalex.org/I193352282"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Donghoon Shin","raw_affiliation_strings":["Department of Electrical Engineering and Computer Science, DGIST, Daegu, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Computer Science, DGIST, Daegu, Republic of Korea","institution_ids":["https://openalex.org/I193352282"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5111923175"],"corresponding_institution_ids":["https://openalex.org/I193352282"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.27975987,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"12","issue":"23","first_page":"51483","last_page":"51496"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12923","display_name":"Digital Image Processing Techniques","score":0.9851999878883362,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10688","display_name":"Image and Signal Denoising Methods","score":0.9797000288963318,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8669000267982483},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.7657999992370605},{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.6771000027656555},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.5644000172615051},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.5444999933242798},{"id":"https://openalex.org/keywords/chinese-remainder-theorem","display_name":"Chinese remainder theorem","score":0.4106000065803528},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.3772999942302704},{"id":"https://openalex.org/keywords/least-significant-bit","display_name":"Least significant bit","score":0.3747999966144562},{"id":"https://openalex.org/keywords/modulo-operation","display_name":"Modulo operation","score":0.36399999260902405}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8669000267982483},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7709000110626221},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.7657999992370605},{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.6771000027656555},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.5644000172615051},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.5444999933242798},{"id":"https://openalex.org/C151635116","wikidata":"https://www.wikidata.org/wiki/Q193878","display_name":"Chinese remainder theorem","level":2,"score":0.4106000065803528},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.3772999942302704},{"id":"https://openalex.org/C4305246","wikidata":"https://www.wikidata.org/wiki/Q3885225","display_name":"Least significant bit","level":2,"score":0.3747999966144562},{"id":"https://openalex.org/C183448482","wikidata":"https://www.wikidata.org/wiki/Q1799665","display_name":"Modulo operation","level":2,"score":0.36399999260902405},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.3637999892234802},{"id":"https://openalex.org/C42355184","wikidata":"https://www.wikidata.org/wiki/Q1361088","display_name":"Matrix decomposition","level":3,"score":0.35670000314712524},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3476000130176544},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3400000035762787},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.3357999920845032},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.33399999141693115},{"id":"https://openalex.org/C199422724","wikidata":"https://www.wikidata.org/wiki/Q41118","display_name":"Quotient","level":2,"score":0.3301999866962433},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3294000029563904},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.32109999656677246},{"id":"https://openalex.org/C32022120","wikidata":"https://www.wikidata.org/wiki/Q797225","display_name":"Interference (communication)","level":3,"score":0.29600000381469727},{"id":"https://openalex.org/C39613435","wikidata":"https://www.wikidata.org/wiki/Q846677","display_name":"Remainder","level":2,"score":0.2953000068664551},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.2854999899864197},{"id":"https://openalex.org/C19275194","wikidata":"https://www.wikidata.org/wiki/Q222903","display_name":"Multiplexing","level":2,"score":0.2799000144004822},{"id":"https://openalex.org/C134765980","wikidata":"https://www.wikidata.org/wiki/Q879126","display_name":"Bitwise operation","level":2,"score":0.27649998664855957},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.2700999975204468},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.26840001344680786},{"id":"https://openalex.org/C169805256","wikidata":"https://www.wikidata.org/wiki/Q1361381","display_name":"Transform coding","level":4,"score":0.2653000056743622},{"id":"https://openalex.org/C136695289","wikidata":"https://www.wikidata.org/wiki/Q415568","display_name":"Bitstream","level":3,"score":0.26109999418258667},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.25859999656677246},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.25440001487731934}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3615138","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3615138","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W1557125125","https://openalex.org/W2031865175","https://openalex.org/W2041560266","https://openalex.org/W2046119925","https://openalex.org/W2092264651","https://openalex.org/W2114318320","https://openalex.org/W2127066114","https://openalex.org/W2134460122","https://openalex.org/W2144660425","https://openalex.org/W2161022751","https://openalex.org/W2592784016","https://openalex.org/W2633511728","https://openalex.org/W2811265779","https://openalex.org/W2904288768","https://openalex.org/W2962785568","https://openalex.org/W2967157508","https://openalex.org/W3017228165","https://openalex.org/W3031923968","https://openalex.org/W3086149171","https://openalex.org/W3126555365","https://openalex.org/W3131272436","https://openalex.org/W3133560326","https://openalex.org/W3197205161","https://openalex.org/W3210301271","https://openalex.org/W3214679662","https://openalex.org/W4214703277","https://openalex.org/W4285239600","https://openalex.org/W4312549659","https://openalex.org/W4313419234","https://openalex.org/W4385457752","https://openalex.org/W4385636787","https://openalex.org/W4390145439","https://openalex.org/W4390551497","https://openalex.org/W4392976075","https://openalex.org/W4400229723","https://openalex.org/W4401111032","https://openalex.org/W4401495795","https://openalex.org/W4401592329","https://openalex.org/W4403297530","https://openalex.org/W4408568411","https://openalex.org/W4410869068"],"related_works":[],"abstract_inverted_index":{"Conventional":[0],"steganography":[1,41],"techniques":[2],"based":[3],"on":[4],"Pixel":[5,65],"Intensity":[6],"Decomposition":[7],"(PID)":[8],"suffer":[9],"from":[10],"a":[11,22,37,52,73,87],"critical":[12],"\u2018pixel":[13],"jump\u2019":[14],"problem":[15],"that":[16,134],"severely":[17],"limits":[18],"payload":[19,113,188],"capacity,":[20],"creating":[21],"major":[23],"obstacle":[24],"to":[25],"achieving":[26],"high-capacity":[27,39],"data":[28,108],"hiding.":[29],"To":[30],"address":[31],"this":[32,34,99],"challenge,":[33],"paper":[35],"proposes":[36],"novel":[38,88],"image":[40],"technique,":[42],"termed":[43],"the":[44,135],"Quotient":[45],"and":[46,96,106,110,131,144,152,167,180,190],"Remainder":[47],"(QR)":[48],"method,":[49],"which":[50],"provides":[51],"unified":[53],"framework":[54,172],"for":[55,124,182],"robust":[56,175],"k-LSB":[57],"embedding":[58,102,147],"by":[59],"integrating":[60],"PID":[61],"with":[62,86],"an":[63,80,139],"advanced":[64],"Indicator":[66],"Technique":[67],"(PIT).":[68],"The":[69,170],"proposed":[70,171],"method":[71,137],"introduces":[72],"dynamic":[74],"virtual":[75],"bit":[76],"plane":[77],"construction":[78],"using":[79],"optimized":[81],"integer":[82],"sequence":[83],"in":[84,119],"conjunction":[85],"bit-plane":[89],"congruence":[90],"matrix":[91],"(BPCM).":[92],"By":[93],"leveraging":[94],"quotient":[95],"remainder":[97],"operations,":[98],"approach":[100],"minimizes":[101],"distortion,":[103],"enables":[104],"unique":[105],"accurate":[107],"extraction,":[109],"significantly":[111],"enhances":[112],"capacity":[114,143],"while":[115,159],"preserving":[116],"high":[117,187],"imperceptibility":[118],"stego":[120],"images.":[121],"Experimental":[122],"results":[123],"<italic":[125],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[126],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">k</i>":[127],"=":[128],"3,":[129],"4,":[130],"5":[132],"demonstrate":[133],"QR":[136],"achieves":[138],"outstanding":[140],"balance":[141],"between":[142],"imperceptibility,":[145],"yielding":[146],"capacities":[148],"of":[149,164],"6,":[150],"8,":[151],"10":[153],"bits":[154],"per":[155],"pixel":[156],"(bpp),":[157],"respectively,":[158],"maintaining":[160],"excellent":[161],"PSNR":[162],"values":[163],"44.68,":[165],"40.48,":[166],"35.37":[168],"dB.":[169],"is":[173],"also":[174],"against":[176],"common":[177],"steganalysis":[178],"attacks":[179],"well-suited":[181],"secure":[183],"IoT":[184],"applications":[185],"where":[186],"efficiency":[189],"visual":[191],"fidelity":[192],"are":[193],"essential.":[194]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
