{"id":"https://openalex.org/W4416429196","doi":"https://doi.org/10.1109/jiot.2025.3635284","title":"Progressive Secret Sharing Through the Integration of Deep Learning and Reversible Data Hiding in Encrypted Images","display_name":"Progressive Secret Sharing Through the Integration of Deep Learning and Reversible Data Hiding in Encrypted Images","publication_year":2025,"publication_date":"2025-11-20","ids":{"openalex":"https://openalex.org/W4416429196","doi":"https://doi.org/10.1109/jiot.2025.3635284"},"language":null,"primary_location":{"id":"doi:10.1109/jiot.2025.3635284","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3635284","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036392399","display_name":"Mingze He","orcid":"https://orcid.org/0000-0002-0611-0767"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Mingze He","raw_affiliation_strings":["Department of Computer Science and Technology, Sichuan Police College, Luzhou, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Sichuan Police College, Luzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101736803","display_name":"Xiao\u2010Zhu Xie","orcid":"https://orcid.org/0000-0002-5480-8908"},"institutions":[{"id":"https://openalex.org/I75867142","display_name":"Xiamen University of Technology","ror":"https://ror.org/01285e189","country_code":"CN","type":"education","lineage":["https://openalex.org/I75867142"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaozhu Xie","raw_affiliation_strings":["College of Computer and Information Engineering, Xiamen University of Technology, Xiamen, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Information Engineering, Xiamen University of Technology, Xiamen, China","institution_ids":["https://openalex.org/I75867142"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100407800","display_name":"Xu Wang","orcid":"https://orcid.org/0000-0001-6705-4888"},"institutions":[{"id":"https://openalex.org/I34949971","display_name":"University of Jinan","ror":"https://ror.org/02mjz6f26","country_code":"CN","type":"education","lineage":["https://openalex.org/I34949971"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xu Wang","raw_affiliation_strings":["Shandong Key Laboratory of Ubiquitous Intelligent Computing, University of Jinan, Jinan, China"],"affiliations":[{"raw_affiliation_string":"Shandong Key Laboratory of Ubiquitous Intelligent Computing, University of Jinan, Jinan, China","institution_ids":["https://openalex.org/I34949971"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100379643","display_name":"Liangliang Zhang","orcid":"https://orcid.org/0000-0001-8673-1135"},"institutions":[{"id":"https://openalex.org/I34949971","display_name":"University of Jinan","ror":"https://ror.org/02mjz6f26","country_code":"CN","type":"education","lineage":["https://openalex.org/I34949971"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liangliang Zhang","raw_affiliation_strings":["Quancheng Laboratory, Jinan, China","Shandong Key Laboratory of Ubiquitous Intelligent Computing, University of Jinan, Jinan, China"],"affiliations":[{"raw_affiliation_string":"Quancheng Laboratory, Jinan, China","institution_ids":[]},{"raw_affiliation_string":"Shandong Key Laboratory of Ubiquitous Intelligent Computing, University of Jinan, Jinan, China","institution_ids":["https://openalex.org/I34949971"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5036392399"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.38639963,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"3","first_page":"4564","last_page":"4577"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.8481000065803528,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.8481000065803528,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.09709999710321426,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.012600000016391277,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.7290999889373779},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7170000076293945},{"id":"https://openalex.org/keywords/image-sharing","display_name":"Image sharing","score":0.6256999969482422},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.6064000129699707},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5861999988555908},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5582000017166138},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.5443999767303467},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5295000076293945},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.4447000026702881}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8055999875068665},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.7290999889373779},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7170000076293945},{"id":"https://openalex.org/C2780639701","wikidata":"https://www.wikidata.org/wiki/Q354869","display_name":"Image sharing","level":3,"score":0.6256999969482422},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.6064000129699707},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6011999845504761},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5861999988555908},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5582000017166138},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.5443999767303467},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5295000076293945},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.46950000524520874},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.4447000026702881},{"id":"https://openalex.org/C113954288","wikidata":"https://www.wikidata.org/wiki/Q186885","display_name":"Timestamp","level":2,"score":0.4401000142097473},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4375},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.39579999446868896},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.37529999017715454},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.36890000104904175},{"id":"https://openalex.org/C2777466982","wikidata":"https://www.wikidata.org/wiki/Q5227287","display_name":"Data extraction","level":3,"score":0.31470000743865967},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.3052000105381012},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.29600000381469727},{"id":"https://openalex.org/C132161212","wikidata":"https://www.wikidata.org/wiki/Q5891458","display_name":"Homomorphic secret sharing","level":4,"score":0.2948000133037567},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.2904999852180481},{"id":"https://openalex.org/C205372480","wikidata":"https://www.wikidata.org/wiki/Q210521","display_name":"Image resolution","level":2,"score":0.2858000099658966},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.2694000005722046},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.2630000114440918},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.26019999384880066}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3635284","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3635284","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W22271197","https://openalex.org/W790982447","https://openalex.org/W1885185971","https://openalex.org/W1989953416","https://openalex.org/W2010380519","https://openalex.org/W2012711090","https://openalex.org/W2029411311","https://openalex.org/W2066178754","https://openalex.org/W2075965608","https://openalex.org/W2103459202","https://openalex.org/W2121393355","https://openalex.org/W2135459805","https://openalex.org/W2141420453","https://openalex.org/W2152185406","https://openalex.org/W2170269447","https://openalex.org/W2322525404","https://openalex.org/W2403682575","https://openalex.org/W2508016950","https://openalex.org/W2535009048","https://openalex.org/W2755498902","https://openalex.org/W2779077998","https://openalex.org/W2793696846","https://openalex.org/W2806483402","https://openalex.org/W2866634454","https://openalex.org/W2901602009","https://openalex.org/W2942420070","https://openalex.org/W2942903479","https://openalex.org/W2950377098","https://openalex.org/W2962531843","https://openalex.org/W2969448873","https://openalex.org/W3015356587","https://openalex.org/W3043547428","https://openalex.org/W3045939081","https://openalex.org/W3135976016","https://openalex.org/W3173484368","https://openalex.org/W4200254490","https://openalex.org/W4200554442","https://openalex.org/W4206100086","https://openalex.org/W4282842122","https://openalex.org/W4367276775","https://openalex.org/W4385257690","https://openalex.org/W4401644391","https://openalex.org/W4410359298"],"related_works":[],"abstract_inverted_index":{"Progressive":[0],"secret":[1],"image":[2,19,69,81,90,120,136,164],"sharing":[3,52],"(PSS)":[4],"can":[5,61,102,129],"progressively":[6,62],"recover":[7],"different":[8,12,53],"resolution":[9],"images":[10],"or":[11],"parts":[13,54],"of":[14,39,55,86],"an":[15,32],"image.":[16],"To":[17],"protect":[18],"privacy":[20],"on":[21,109,161],"the":[22,37,56,59,71,79,84,110,114,126,147],"cloud":[23,111],"and":[24,44,78,89,100,131,146],"IoT":[25],"application":[26],"scenarios,":[27],"this":[28],"paper":[29],"first":[30],"presents":[31],"efficient":[33],"PSS":[34],"scheme":[35,128,139],"through":[36],"integration":[38],"two":[40],"deep":[41],"learning":[42],"networks":[43],"reversible":[45],"data":[46,95,115],"hiding":[47],"in":[48],"encrypted":[49],"images.":[50],"After":[51],"original":[57,80],"image,":[58,66],"receiver":[60],"recover:":[63],"a":[64,67,134,142,153,162],"low-resolution":[65],"mask":[68],"where":[70],"most":[72],"sensitive":[73],"area":[74],"is":[75,117],"peeled":[76],"off,":[77],"according":[82],"to":[83,158],"number":[85],"holding":[87],"shares":[88],"encryption":[91],"keys.":[92],"Some":[93],"additional":[94],"such":[96],"as":[97,113],"signatures,":[98],"fingerprints,":[99],"timestamps":[101],"be":[103],"also":[104,140],"embedded":[105],"into":[106],"each":[107],"share":[108],"server,":[112],"extraction":[116],"separate":[118],"from":[119],"recovery.":[121],"Experimental":[122],"results":[123],"demonstrate":[124],"that":[125],"proposed":[127],"uniquely":[130],"efficiently":[132],"obtain":[133],"recovered":[135],"progressively.":[137],"Our":[138],"has":[141],"higher":[143],"security":[144],"level,":[145],"average":[148],"embedding":[149],"rate":[150],"achieves":[151],"almost":[152],"1":[154],"bpp":[155],"improvement":[156],"compared":[157],"state-of-the-art":[159],"schemes":[160],"larger-scale":[163],"dataset.":[165]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-20T00:00:00"}
