{"id":"https://openalex.org/W2832441265","doi":"https://doi.org/10.1109/tcsvt.2018.2852702","title":"Secure Binary Image Steganography Based on Fused Distortion Measurement","display_name":"Secure Binary Image Steganography Based on Fused Distortion Measurement","publication_year":2018,"publication_date":"2018-07-03","ids":{"openalex":"https://openalex.org/W2832441265","doi":"https://doi.org/10.1109/tcsvt.2018.2852702","mag":"2832441265"},"language":"en","primary_location":{"id":"doi:10.1109/tcsvt.2018.2852702","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsvt.2018.2852702","pdf_url":null,"source":{"id":"https://openalex.org/S115173108","display_name":"IEEE Transactions on Circuits and Systems for Video Technology","issn_l":"1051-8215","issn":["1051-8215","1558-2205"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Circuits and Systems for Video Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083054357","display_name":"Wei Lu","orcid":"https://orcid.org/0000-0002-4068-1766"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wei Lu","raw_affiliation_strings":["Guangdong Key Laboratory of Information Security Technology, School of Data and Computer Science, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Guangdong Key Laboratory of Information Security Technology, School of Data and Computer Science, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101785334","display_name":"Liyu He","orcid":"https://orcid.org/0000-0001-9276-9914"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liyu He","raw_affiliation_strings":["School of Electronics and Information Technology, Sun Yat-sen University, Guangzhou, China","School of Electronics and Information Technology Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Electronics and Information Technology, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]},{"raw_affiliation_string":"School of Electronics and Information Technology Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059268306","display_name":"Yuileong Yeung","orcid":"https://orcid.org/0000-0002-5592-1494"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuileong Yeung","raw_affiliation_strings":["Guangdong Key Laboratory of Information Security Technology, School of Data and Computer Science, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Guangdong Key Laboratory of Information Security Technology, School of Data and Computer Science, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031912520","display_name":"Yingjie Xue","orcid":"https://orcid.org/0000-0003-1421-5427"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yingjie Xue","raw_affiliation_strings":["School of Electronics and Information Technology, Sun Yat-sen University, Guangzhou, China","School of Electronics and Information Technology Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Electronics and Information Technology, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]},{"raw_affiliation_string":"School of Electronics and Information Technology Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100377013","display_name":"Hongmei Liu","orcid":"https://orcid.org/0000-0002-9091-7992"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongmei Liu","raw_affiliation_strings":["Guangdong Key Laboratory of Information Security Technology, School of Data and Computer Science, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Guangdong Key Laboratory of Information Security Technology, School of Data and Computer Science, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072124687","display_name":"Bingwen Feng","orcid":"https://orcid.org/0000-0003-1402-4663"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bingwen Feng","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, China","College of Information Science and Technology, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]},{"raw_affiliation_string":"College of Information Science and Technology, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5083054357"],"corresponding_institution_ids":["https://openalex.org/I157773358"],"apc_list":null,"apc_paid":null,"fwci":4.1783,"has_fulltext":false,"cited_by_count":53,"citation_normalized_percentile":{"value":0.95824963,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"29","issue":"6","first_page":"1608","last_page":"1618"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.8238106369972229},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.7971253395080566},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.7531431913375854},{"id":"https://openalex.org/keywords/distortion","display_name":"Distortion (music)","score":0.6853103637695312},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6673848032951355},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6377747058868408},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.4921781122684479},{"id":"https://openalex.org/keywords/image-quality","display_name":"Image quality","score":0.461905300617218},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.42028146982192993},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.3690730035305023},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.3159078359603882},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.10527676343917847},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.07314670085906982}],"concepts":[{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.8238106369972229},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.7971253395080566},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.7531431913375854},{"id":"https://openalex.org/C126780896","wikidata":"https://www.wikidata.org/wiki/Q899871","display_name":"Distortion (music)","level":4,"score":0.6853103637695312},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6673848032951355},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6377747058868408},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4921781122684479},{"id":"https://openalex.org/C55020928","wikidata":"https://www.wikidata.org/wiki/Q3813865","display_name":"Image quality","level":3,"score":0.461905300617218},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.42028146982192993},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.3690730035305023},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.3159078359603882},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.10527676343917847},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.07314670085906982},{"id":"https://openalex.org/C194257627","wikidata":"https://www.wikidata.org/wiki/Q211554","display_name":"Amplifier","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcsvt.2018.2852702","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsvt.2018.2852702","pdf_url":null,"source":{"id":"https://openalex.org/S115173108","display_name":"IEEE Transactions on Circuits and Systems for Video Technology","issn_l":"1051-8215","issn":["1051-8215","1558-2205"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Circuits and Systems for Video Technology","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2222041904","display_name":null,"funder_award_id":"2016KZ010103","funder_id":"https://openalex.org/F4320324202","funder_display_name":"Guangdong Science and Technology Department"},{"id":"https://openalex.org/G3071496763","display_name":null,"funder_award_id":"201804020068","funder_id":"https://openalex.org/F4320334898","funder_display_name":"Guangzhou Science and Technology Program key projects"},{"id":"https://openalex.org/G5641777001","display_name":null,"funder_award_id":"U1736118","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5806232392","display_name":null,"funder_award_id":"2016A030313350","funder_id":"https://openalex.org/F4320321921","funder_display_name":"Natural Science Foundation of Guangdong Province"},{"id":"https://openalex.org/G7204306248","display_name":null,"funder_award_id":"17lgjc45","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G7267316459","display_name":null,"funder_award_id":"16lgjc83","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321921","display_name":"Natural Science Foundation of Guangdong Province","ror":null},{"id":"https://openalex.org/F4320324202","display_name":"Guangdong Science and Technology Department","ror":"https://ror.org/00tjzgn92"},{"id":"https://openalex.org/F4320334898","display_name":"Guangzhou Science and Technology Program key projects","ror":"https://ror.org/00tjzgn92"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1767888319","https://openalex.org/W1979088303","https://openalex.org/W2001358514","https://openalex.org/W2001375358","https://openalex.org/W2010867994","https://openalex.org/W2015865004","https://openalex.org/W2048398911","https://openalex.org/W2068656974","https://openalex.org/W2101307524","https://openalex.org/W2112215040","https://openalex.org/W2120293227","https://openalex.org/W2130667149","https://openalex.org/W2133722030","https://openalex.org/W2134527668","https://openalex.org/W2137642015","https://openalex.org/W2142798152","https://openalex.org/W2146837576","https://openalex.org/W2160699771","https://openalex.org/W2567787942","https://openalex.org/W4255501862","https://openalex.org/W6638122431","https://openalex.org/W6680863065"],"related_works":["https://openalex.org/W2532084905","https://openalex.org/W2277839806","https://openalex.org/W174759733","https://openalex.org/W2165886320","https://openalex.org/W1604614341","https://openalex.org/W2890073186","https://openalex.org/W2546197734","https://openalex.org/W2359334028","https://openalex.org/W2159222831","https://openalex.org/W4380607095"],"abstract_inverted_index":{"Some":[0],"state-of-the-art":[1],"binary":[2,30],"image":[3],"steganographic":[4,31,137,146],"methods":[5],"aim":[6],"to":[7,110,126,133],"generate":[8],"stego":[9],"images":[10],"with":[11,153],"good":[12],"visual":[13,107,155],"quality,":[14],"while":[15,92],"others":[16],"focus":[17],"more":[18,40],"on":[19,106],"the":[20,24,53,67,74,82,93,101,112,136,144,159],"statistical":[21,86,151],"security":[22,152],"of":[23,36,55],"anti-steganalysis.":[25],"This":[26],"paper":[27],"proposes":[28],"a":[29,45,119],"scheme":[32,147],"that":[33,51,143],"improves":[34],"both":[35],"them":[37],"by":[38,85,99,115],"selecting":[39],"appropriate":[41],"flipped":[42,117],"pixels.":[43],"First,":[44],"fused":[46],"distortion":[47,57,83],"measurement":[48,58],"is":[49,124],"developed":[50],"combines":[52],"advantages":[54],"flipping":[56,120,131],"(FDM)":[59],"and":[60,73,88,95],"two":[61],"data-carrying":[62],"pixel":[63],"location":[64],"methods,":[65],"including":[66],"edge":[68],"adaptive":[69],"grid":[70],"method":[71],"(EAG)":[72],"\u201cConnectivity":[75],"Preserving\u201d":[76],"criterion":[77],"(CPc).":[78],"The":[79],"FDM":[80],"measures":[81],"score":[84],"features":[87],"achieves":[89],"high-statistical":[90],"security,":[91],"EAG":[94],"CPc":[96],"select":[97],"pixels":[98,132],"analyzing":[100],"local":[102],"texture":[103],"structures":[104],"based":[105],"quality.":[108],"Then,":[109],"eliminate":[111],"interference":[113],"brought":[114],"adjacent":[116],"pixels,":[118],"position":[121],"optimization":[122],"strategy":[123],"proposed":[125,145],"find":[127],"better":[128,154],"positions":[129],"for":[130],"further":[134],"improve":[135],"performance.":[138],"Experimental":[139],"results":[140],"have":[141],"demonstrated":[142],"can":[148],"achieve":[149],"stronger":[150],"quality":[156],"without":[157],"degrading":[158],"embedding":[160],"capacity.":[161]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":14},{"year":2019,"cited_by_count":17},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
