{"id":"https://openalex.org/W3147162255","doi":"https://doi.org/10.1109/tcsvt.2021.3069811","title":"On The Security of Block Permutation and Co-XOR in Reversible Data Hiding","display_name":"On The Security of Block Permutation and Co-XOR in Reversible Data Hiding","publication_year":2022,"publication_date":"2022-03-01","ids":{"openalex":"https://openalex.org/W3147162255","doi":"https://doi.org/10.1109/tcsvt.2021.3069811","mag":"3147162255"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsvt.2021.3069811","pdf_url":null,"source":{"id":"https://openalex.org/S115173108","display_name":"IEEE Transactions on Circuits and Systems for Video Technology","issn_l":"1051-8215","issn":["1051-8215","1558-2205"],"is_oa":false,"is_in_doaj":false,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072151673","display_name":"Lingfeng Qu","orcid":null},"institutions":[{"id":"https://openalex.org/I4800084","display_name":"Southwest Jiaotong University","ror":"https://ror.org/00hn7w693","country_code":"CN","type":"education","lineage":["https://openalex.org/I4800084"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lingfeng Qu","raw_affiliation_string":"[Key Lab of Signal&Information Processing,Sichuan Province, Southwest Jiaotong University, Chengdu 611756, China.]","raw_affiliation_strings":["[Key Lab of Signal&Information Processing,Sichuan Province, Southwest Jiaotong University, Chengdu 611756, China.]"]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049403375","display_name":"Hongjie He","orcid":"https://orcid.org/0000-0003-3839-5821"},"institutions":[{"id":"https://openalex.org/I4800084","display_name":"Southwest Jiaotong University","ror":"https://ror.org/00hn7w693","country_code":"CN","type":"education","lineage":["https://openalex.org/I4800084"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongjie He","raw_affiliation_string":"[Key Lab of Signal&Information Processing,Sichuan Province, Southwest Jiaotong University, Chengdu 611756, China.]","raw_affiliation_strings":["[Key Lab of Signal&Information Processing,Sichuan Province, Southwest Jiaotong University, Chengdu 611756, China.]"]},{"author_position":"last","author":{"id":"https://openalex.org/A5082137478","display_name":"Chen Fan","orcid":"https://orcid.org/0000-0002-5838-0187"},"institutions":[{"id":"https://openalex.org/I4800084","display_name":"Southwest Jiaotong University","ror":"https://ror.org/00hn7w693","country_code":"CN","type":"education","lineage":["https://openalex.org/I4800084"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fan Chen","raw_affiliation_string":"[School of Information Science and Technology, Southwest Jiaotong University, Chengdu 611756, China. (e-mail: fchen@swjtu.edu.cn)]","raw_affiliation_strings":["[School of Information Science and Technology, Southwest Jiaotong University, Chengdu 611756, China. (e-mail: fchen@swjtu.edu.cn)]"]}],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"has_fulltext":false,"cited_by_count":11,"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"32","issue":"3","first_page":"920","last_page":"932"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Digital Image Watermarking Techniques","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Digital Image Watermarking Techniques","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image Encryption Techniques","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Advanced Cryptographic Schemes and Protocols","score":0.9853,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"keyword":"block permutation","score":0.4699},{"keyword":"security","score":0.3071},{"keyword":"co-xor","score":0.25}],"concepts":[{"id":"https://openalex.org/C41431624","wikidata":"https://www.wikidata.org/wiki/Q1053357","display_name":"Block size","level":3,"score":0.71778005},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6874962},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.66835684},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.6007448},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.5451649},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.5288647},{"id":"https://openalex.org/C21308566","wikidata":"https://www.wikidata.org/wiki/Q7169365","display_name":"Permutation (music)","level":2,"score":0.5231097},{"id":"https://openalex.org/C134765980","wikidata":"https://www.wikidata.org/wiki/Q879126","display_name":"Bitwise operation","level":2,"score":0.50712013},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.49147427},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.46207267},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.36075974},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.35326368},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.3421479},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3309525},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2626222},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.20193014},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.06283349},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsvt.2021.3069811","pdf_url":null,"source":{"id":"https://openalex.org/S115173108","display_name":"IEEE Transactions on Circuits and Systems for Video Technology","issn_l":"1051-8215","issn":["1051-8215","1558-2205"],"is_oa":false,"is_in_doaj":false,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"U1936113"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61872303"}],"referenced_works_count":31,"referenced_works":["https://openalex.org/W1998279455","https://openalex.org/W2008604527","https://openalex.org/W2088399161","https://openalex.org/W2190925335","https://openalex.org/W2227996660","https://openalex.org/W2322525404","https://openalex.org/W2342152533","https://openalex.org/W2395282675","https://openalex.org/W2403682575","https://openalex.org/W2508016950","https://openalex.org/W2534300561","https://openalex.org/W2535009048","https://openalex.org/W2759097583","https://openalex.org/W2779077998","https://openalex.org/W2779146554","https://openalex.org/W2792958464","https://openalex.org/W2793696846","https://openalex.org/W2805885446","https://openalex.org/W2835756024","https://openalex.org/W2884179402","https://openalex.org/W2942420070","https://openalex.org/W2950377098","https://openalex.org/W2962531843","https://openalex.org/W3021929949","https://openalex.org/W3038637120","https://openalex.org/W3046924564","https://openalex.org/W3048575494","https://openalex.org/W3209866323","https://openalex.org/W4232805088","https://openalex.org/W4252343056","https://openalex.org/W4376596635"],"related_works":["https://openalex.org/W2076024987","https://openalex.org/W3147162255","https://openalex.org/W3019696413","https://openalex.org/W1524493663","https://openalex.org/W291693969","https://openalex.org/W1966644809","https://openalex.org/W3082612542","https://openalex.org/W2384710392","https://openalex.org/W3183382374","https://openalex.org/W2993995683"],"ngrams_url":"https://api.openalex.org/works/W3147162255/ngrams","abstract_inverted_index":{"Block":[0],"permutation":[1,61,139,192,198],"and":[2,28,38,52,76,88,95,155,164],"Co-XOR":[3,98,126],"(BPCX)":[4],"image":[5,65,71],"encryption":[6,11,19,99,220],"is":[7,133,202,210],"a":[8,46,92],"commonly":[9],"used":[10],"method":[12],"for":[13],"reversible":[14],"data":[15],"hiding":[16],"in":[17,174],"the":[18,25,29,32,59,74,80,83,97,118,129,137,144,151,156,175,184,190,207,223],"domain,":[20],"which":[21],"can":[22],"effectively":[23],"improve":[24],"embedded":[26],"capacity":[27],"ability":[30],"resisting":[31],"existing":[33],"attacks":[34],"including":[35],"ciphertext-only":[36],"attack":[37,41],"known":[39,159],"plaintext":[40],"(KPA).":[42],"This":[43],"paper":[44],"proposes":[45],"KPA":[47,132,225],"based":[48,131],"on":[49],"bit-block":[50,75,93,108],"inversion":[51,105],"mean":[53],"equivalent":[54],"division":[55],"(MED)":[56],"to":[57,111,116,135,143],"estimate":[58,136],"block":[60,72,138,162,177,191,197,208],"key":[62,140,152,199],"of":[63,82,85,91,107,120,158,189],"BPCX":[64],"encryption.":[66,127],"Firstly,":[67],"we":[68],"divide":[69],"an":[70],"into":[73],"point":[77],"out":[78],"that":[79,172],"maximum":[81],"numbers":[84],"0":[86],"bit":[87,90],"1":[89],"before":[94],"after":[96],"remains":[100],"unchanged.":[101],"And":[102],"then":[103],"two":[104],"rules":[106],"are":[109,167,226],"defined":[110],"construct":[112],"pseudo":[113,145,165],"plain-ciphertext":[114,146,160],"images":[115],"eliminate":[117],"influence":[119],"pixel":[121],"value":[122],"changes":[123],"caused":[124],"by":[125],"Finally,":[128],"MED":[130],"designed":[134],"sequence":[141,193],"according":[142],"images.":[147],"The":[148,196],"relationship":[149],"between":[150],"estimation":[153,200],"accuracy":[154,201],"number":[157],"pairs,":[161],"size,":[163],"ciphertext":[166],"discussed.":[168],"Experimental":[169],"results":[170],"show":[171],"even":[173],"minimum":[176],"size":[178,209],"(":[179],"$2\\times":[181],"2$":[182],"),":[183],"average":[185],"estimated":[186],"correct":[187],"rate":[188],"exceeds":[194],"40%.":[195],"more":[203],"than":[204,212],"50%":[205],"when":[206],"greater":[211],"":[213],"notation=\"LaTeX\">$3\\times":[215],"3$":[216],".":[217],"Some":[218],"improved":[219],"methods":[221],"against":[222],"proposed":[224],"also":[227],"given.":[228]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3147162255","counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":2}],"updated_date":"2024-03-21T02:26:39.483602","created_date":"2021-04-13"}