{"id":"https://openalex.org/W2098063201","doi":"https://doi.org/10.1109/lsp.2008.2008947","title":"A Generalization of LSB Matching","display_name":"A Generalization of LSB Matching","publication_year":2009,"publication_date":"2009-01-16","ids":{"openalex":"https://openalex.org/W2098063201","doi":"https://doi.org/10.1109/lsp.2008.2008947","mag":"2098063201"},"language":"en","primary_location":{"id":"doi:10.1109/lsp.2008.2008947","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lsp.2008.2008947","pdf_url":null,"source":{"id":"https://openalex.org/S120629676","display_name":"IEEE Signal Processing Letters","issn_l":"1070-9908","issn":["1070-9908","1558-2361"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Signal Processing Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100371548","display_name":"Xiaolong Li","orcid":"https://orcid.org/0000-0002-6111-9000"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaolong Li","raw_affiliation_strings":["Institute of Computer Science and Technology, Peking University, Beijing, China","[Institute of Computer Science and Technology, Peking University, Beijing]"],"affiliations":[{"raw_affiliation_string":"Institute of Computer Science and Technology, Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]},{"raw_affiliation_string":"[Institute of Computer Science and Technology, Peking University, Beijing]","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101573457","display_name":"Bin Yang","orcid":"https://orcid.org/0000-0002-7304-9118"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Yang","raw_affiliation_strings":["Institute of Computer Science and Technology, Peking University, Beijing, China","[Institute of Computer Science and Technology, Peking University, Beijing]"],"affiliations":[{"raw_affiliation_string":"Institute of Computer Science and Technology, Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]},{"raw_affiliation_string":"[Institute of Computer Science and Technology, Peking University, Beijing]","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000207666","display_name":"Daofang Cheng","orcid":null},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Daofang Cheng","raw_affiliation_strings":["Institute of Computer Science and Technology, Peking University, Beijing, China","[Institute of Computer Science and Technology, Peking University, Beijing]"],"affiliations":[{"raw_affiliation_string":"Institute of Computer Science and Technology, Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]},{"raw_affiliation_string":"[Institute of Computer Science and Technology, Peking University, Beijing]","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059443966","display_name":"Tieyong Zeng","orcid":"https://orcid.org/0000-0002-0688-202X"},"institutions":[{"id":"https://openalex.org/I141568987","display_name":"Hong Kong Baptist University","ror":"https://ror.org/0145fw131","country_code":"HK","type":"education","lineage":["https://openalex.org/I141568987"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Tieyong Zeng","raw_affiliation_strings":["Department of Mathematics, Hong Kong Baptist University, Hong Kong, China","Dept. of Math., Hong Kong Baptist Univ., Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics, Hong Kong Baptist University, Hong Kong, China","institution_ids":["https://openalex.org/I141568987"]},{"raw_affiliation_string":"Dept. of Math., Hong Kong Baptist Univ., Hong Kong","institution_ids":["https://openalex.org/I141568987"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100371548"],"corresponding_institution_ids":["https://openalex.org/I20231570"],"apc_list":null,"apc_paid":null,"fwci":9.4958,"has_fulltext":false,"cited_by_count":127,"citation_normalized_percentile":{"value":0.98368009,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":100},"biblio":{"volume":"16","issue":"2","first_page":"69","last_page":"72"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/least-significant-bit","display_name":"Least significant bit","score":0.9781783819198608},{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.8562688231468201},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.7900478839874268},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.5549755096435547},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.5361561179161072},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.5240721106529236},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.47735026478767395},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.47655728459358215},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.46884357929229736},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3866594135761261},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3827180564403534},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.3307468295097351},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.30670714378356934},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.14973193407058716}],"concepts":[{"id":"https://openalex.org/C4305246","wikidata":"https://www.wikidata.org/wiki/Q3885225","display_name":"Least significant bit","level":2,"score":0.9781783819198608},{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.8562688231468201},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.7900478839874268},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.5549755096435547},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.5361561179161072},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.5240721106529236},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.47735026478767395},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.47655728459358215},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.46884357929229736},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3866594135761261},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3827180564403534},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.3307468295097351},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.30670714378356934},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.14973193407058716},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lsp.2008.2008947","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lsp.2008.2008947","pdf_url":null,"source":{"id":"https://openalex.org/S120629676","display_name":"IEEE Signal Processing Letters","issn_l":"1070-9908","issn":["1070-9908","1558-2361"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Signal Processing Letters","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W84056189","https://openalex.org/W1748609398","https://openalex.org/W1760530029","https://openalex.org/W1867816105","https://openalex.org/W2070912905","https://openalex.org/W2098788570","https://openalex.org/W2124890704","https://openalex.org/W2133161721","https://openalex.org/W2133397787","https://openalex.org/W2148808559","https://openalex.org/W2153615901","https://openalex.org/W2157740551","https://openalex.org/W2158320630","https://openalex.org/W2161022751"],"related_works":["https://openalex.org/W2148973528","https://openalex.org/W2939392096","https://openalex.org/W2205085860","https://openalex.org/W2134958869","https://openalex.org/W2977151837","https://openalex.org/W2059133021","https://openalex.org/W2771684231","https://openalex.org/W2158736088","https://openalex.org/W4297776738","https://openalex.org/W2075420991"],"abstract_inverted_index":{"Recently,":[0],"a":[1,81],"significant":[2,8],"improvement":[3],"of":[4,27,43,74,83,95,131],"the":[5,17,20,24,32,40,57,89,101,107,113,126],"well-known":[6],"least":[7],"bit":[9],"(LSB)":[10],"matching":[11,61],"steganography":[12],"has":[13],"been":[14],"proposed,":[15],"reducing":[16],"changes":[18],"to":[19,50,117,129],"cover":[21],"image":[22],"for":[23,76],"same":[25],"amount":[26],"embedded":[28],"secret":[29],"data.":[30],"When":[31],"embedding":[33],"rate":[34],"is":[35,78,85],"1,":[36],"this":[37,53,66],"method":[38,67],"decreases":[39],"expected":[41],"number":[42],"modification":[44],"per":[45],"pixel":[46],"(ENMPP)":[47],"from":[48],"0.5":[49],"0.375.":[51],"In":[52],"letter,":[54],"we":[55,104],"propose":[56],"so-called":[58],"generalized":[59],"LSB":[60,69],"(G-LSB-M)":[62],"scheme,":[63],"which":[64],"generalizes":[65],"and":[68,80,91,115],"matching.":[70],"The":[71],"lower":[72],"bound":[73],"ENMPP":[75,114],"G-LSB-M":[77,84,109],"investigated,":[79],"construction":[82],"presented":[86],"by":[87],"using":[88],"sum":[90],"difference":[92],"covering":[93],"set":[94],"finite":[96],"cyclic":[97],"group.":[98],"Compared":[99],"with":[100],"previous":[102],"works,":[103],"show":[105],"that":[106],"suitable":[108],"can":[110],"further":[111],"reduce":[112],"lead":[116],"more":[118],"secure":[119],"steganographic":[120],"schemes.":[121],"Experimental":[122],"results":[123],"illustrate":[124],"clearly":[125],"better":[127],"resistance":[128],"steganalysis":[130],"G-LSB-M.":[132]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":9},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":9},{"year":2016,"cited_by_count":8},{"year":2015,"cited_by_count":10},{"year":2014,"cited_by_count":14},{"year":2013,"cited_by_count":14},{"year":2012,"cited_by_count":15}],"updated_date":"2026-03-12T08:34:05.389933","created_date":"2025-10-10T00:00:00"}
