{"id":"https://openalex.org/W4323065867","doi":"https://doi.org/10.1109/lsp.2023.3252403","title":"Secret Image Restoration With Convex Hull and Elite Opposition-Based Learning Strategy","display_name":"Secret Image Restoration With Convex Hull and Elite Opposition-Based Learning Strategy","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4323065867","doi":"https://doi.org/10.1109/lsp.2023.3252403"},"language":"en","primary_location":{"id":"doi:10.1109/lsp.2023.3252403","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lsp.2023.3252403","pdf_url":null,"source":{"id":"https://openalex.org/S120629676","display_name":"IEEE Signal Processing Letters","issn_l":"1070-9908","issn":["1070-9908","1558-2361"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Signal Processing Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102835232","display_name":"Dong Yu","orcid":"https://orcid.org/0000-0003-2874-5795"},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yu Dong","raw_affiliation_strings":["Guangxi Key Lab of Multi-source Information Mining and Security, Guangxi Normal University, Guilin, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Guangxi Key Lab of Multi-source Information Mining and Security, Guangxi Normal University, Guilin, China","institution_ids":["https://openalex.org/I29739308"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085013836","display_name":"Xianquan Zhang","orcid":"https://orcid.org/0000-0003-3359-117X"},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xianquan Zhang","raw_affiliation_strings":["Guangxi Key Lab of Multi-source Information Mining and Security, Guangxi Normal University, Guilin, China"],"raw_orcid":"https://orcid.org/0000-0003-3359-117X","affiliations":[{"raw_affiliation_string":"Guangxi Key Lab of Multi-source Information Mining and Security, Guangxi Normal University, Guilin, China","institution_ids":["https://openalex.org/I29739308"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020240117","display_name":"Chunqiang Yu","orcid":"https://orcid.org/0000-0002-7221-0168"},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunqiang Yu","raw_affiliation_strings":["Guangxi Key Lab of Multi-source Information Mining and Security, Guangxi Normal University, Guilin, China"],"raw_orcid":"https://orcid.org/0000-0002-7221-0168","affiliations":[{"raw_affiliation_string":"Guangxi Key Lab of Multi-source Information Mining and Security, Guangxi Normal University, Guilin, China","institution_ids":["https://openalex.org/I29739308"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087798028","display_name":"Zhenjun Tang","orcid":"https://orcid.org/0000-0003-3664-1363"},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenjun Tang","raw_affiliation_strings":["Guangxi Key Lab of Multi-source Information Mining and Security, Guangxi Normal University, Guilin, China"],"raw_orcid":"https://orcid.org/0000-0003-3664-1363","affiliations":[{"raw_affiliation_string":"Guangxi Key Lab of Multi-source Information Mining and Security, Guangxi Normal University, Guilin, China","institution_ids":["https://openalex.org/I29739308"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5102835232"],"corresponding_institution_ids":["https://openalex.org/I29739308"],"apc_list":null,"apc_paid":null,"fwci":0.471,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.62553836,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":97},"biblio":{"volume":"30","issue":null,"first_page":"195","last_page":"199"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10688","display_name":"Image and Signal Denoising Methods","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.8766785264015198},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6161900162696838},{"id":"https://openalex.org/keywords/convex-hull","display_name":"Convex hull","score":0.5926606059074402},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.5401550531387329},{"id":"https://openalex.org/keywords/image-restoration","display_name":"Image restoration","score":0.5084758996963501},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.47416985034942627},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.4623931646347046},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.402976393699646},{"id":"https://openalex.org/keywords/regular-polygon","display_name":"Regular polygon","score":0.30144017934799194},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.22153356671333313}],"concepts":[{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.8766785264015198},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6161900162696838},{"id":"https://openalex.org/C206194317","wikidata":"https://www.wikidata.org/wiki/Q1138624","display_name":"Convex hull","level":3,"score":0.5926606059074402},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.5401550531387329},{"id":"https://openalex.org/C106430172","wikidata":"https://www.wikidata.org/wiki/Q6002272","display_name":"Image restoration","level":4,"score":0.5084758996963501},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.47416985034942627},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.4623931646347046},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.402976393699646},{"id":"https://openalex.org/C112680207","wikidata":"https://www.wikidata.org/wiki/Q714886","display_name":"Regular polygon","level":2,"score":0.30144017934799194},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.22153356671333313},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lsp.2023.3252403","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lsp.2023.3252403","pdf_url":null,"source":{"id":"https://openalex.org/S120629676","display_name":"IEEE Signal Processing Letters","issn_l":"1070-9908","issn":["1070-9908","1558-2361"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Signal Processing Letters","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/11","display_name":"Sustainable cities and communities","score":0.800000011920929}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W22271197","https://openalex.org/W2001030941","https://openalex.org/W2030423445","https://openalex.org/W2056183905","https://openalex.org/W2124139674","https://openalex.org/W2148358298","https://openalex.org/W2698421310","https://openalex.org/W2751457520","https://openalex.org/W2798278116","https://openalex.org/W2963567776","https://openalex.org/W2968927372","https://openalex.org/W2986193159","https://openalex.org/W3024161983","https://openalex.org/W3134277469","https://openalex.org/W3134369321","https://openalex.org/W3209881937","https://openalex.org/W4226094323","https://openalex.org/W4293192427"],"related_works":["https://openalex.org/W2085033728","https://openalex.org/W4285411112","https://openalex.org/W2171299904","https://openalex.org/W1647606319","https://openalex.org/W4390494008","https://openalex.org/W2053596378","https://openalex.org/W2922442631","https://openalex.org/W2168523118","https://openalex.org/W2365681766","https://openalex.org/W2393963626"],"abstract_inverted_index":{"Digital":[0],"images":[1],"are":[2,56,113],"easily":[3],"corrupted":[4,22,53],"during":[5],"transmission.":[6],"Most":[7],"image":[8,18,35,55,135],"denoising":[9],"methods":[10,131],"cannot":[11],"perform":[12],"well":[13],"on":[14],"restoring":[15],"the":[16,47,52,62,86,96,102,106,125],"secret":[17,34,54,134],"extracted":[19],"from":[20],"a":[21,32,74],"stego":[23],"image.":[24],"To":[25],"deal":[26],"with":[27,38],"this":[28],"issue,":[29],"we":[30],"propose":[31],"new":[33],"restoration":[36],"method":[37,127],"convex":[39,75,97,107],"hull":[40,76,98],"and":[41,58],"elite":[42,116],"opposition-based":[43,117],"learning":[44,118],"strategy.":[45,119],"Specifically,":[46],"pixel":[48,94],"distortion":[49],"values":[50],"of":[51,89],"calculated":[57],"used":[59],"to":[60,85],"classify":[61],"pixels":[63,66,83,104,112],"into":[64],"trustable":[65,82,90,103],"or":[67],"untrusted":[68,72,93,111],"pixels.":[69,91],"For":[70],"an":[71],"pixel,":[73],"is":[77,99],"generated":[78],"by":[79,101],"its":[80],"context":[81],"due":[84],"irregular":[87],"distribution":[88],"The":[92,109,120],"in":[95],"restored":[100,114],"within":[105],"hull.":[108],"other":[110],"using":[115],"experimental":[121],"results":[122],"show":[123],"that":[124],"proposed":[126],"outperforms":[128],"some":[129],"state-of-the-art":[130],"regarding":[132],"recovered":[133],"quality.":[136]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
