{"id":"https://openalex.org/W3094247675","doi":"https://doi.org/10.1109/tcyb.2020.3026047","title":"Secure Halftone Image Steganography Based on Feature Space and Layer Embedding","display_name":"Secure Halftone Image Steganography Based on Feature Space and Layer Embedding","publication_year":2020,"publication_date":"2020-10-23","ids":{"openalex":"https://openalex.org/W3094247675","doi":"https://doi.org/10.1109/tcyb.2020.3026047","mag":"3094247675","pmid":"https://pubmed.ncbi.nlm.nih.gov/33095731"},"language":"en","primary_location":{"id":"doi:10.1109/tcyb.2020.3026047","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcyb.2020.3026047","pdf_url":null,"source":{"id":"https://openalex.org/S4210191041","display_name":"IEEE Transactions on Cybernetics","issn_l":"2168-2267","issn":["2168-2267","2168-2275"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cybernetics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","pubmed"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083054357","display_name":"Wei Lu","orcid":"https://orcid.org/0000-0002-4068-1766"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wei Lu","raw_affiliation_strings":["School of Data and Computer Science, Guangdong Province Key Laboratory of Information Security Technology, Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Data and Computer Science, Guangdong Province Key Laboratory of Information Security Technology, Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101941670","display_name":"Junjia Chen","orcid":"https://orcid.org/0009-0001-4953-2388"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junjia Chen","raw_affiliation_strings":["School of Data and Computer Science, Guangdong Province Key Laboratory of Information Security Technology, Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Data and Computer Science, Guangdong Province Key Laboratory of Information Security Technology, Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100400217","display_name":"Jun Zhang","orcid":"https://orcid.org/0000-0001-7835-9871"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junhong Zhang","raw_affiliation_strings":["School of Data and Computer Science, Guangdong Province Key Laboratory of Information Security Technology, Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Data and Computer Science, Guangdong Province Key Laboratory of Information Security Technology, Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047964483","display_name":"Jiwu Huang","orcid":"https://orcid.org/0000-0002-7625-5689"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiwu Huang","raw_affiliation_strings":["Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Guangdong Laboratory of Artificial Intelligence and Digital Economy, and the Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Guangdong Laboratory of Artificial Intelligence and Digital Economy, and the Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082041657","display_name":"Jian Weng","orcid":null},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Weng","raw_affiliation_strings":["College of Information Science and Technology and the College of Cyber Security, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Technology and the College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009595085","display_name":"Yicong Zhou","orcid":"https://orcid.org/0000-0002-4487-6384"},"institutions":[{"id":"https://openalex.org/I204512498","display_name":"University of Macau","ror":"https://ror.org/01r4q9n85","country_code":"MO","type":"education","lineage":["https://openalex.org/I204512498"]}],"countries":["MO"],"is_corresponding":false,"raw_author_name":"Yicong Zhou","raw_affiliation_strings":["Department of Computer and Information Science, University of Macau, Macau, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Science, University of Macau, Macau, China","institution_ids":["https://openalex.org/I204512498"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5083054357"],"corresponding_institution_ids":["https://openalex.org/I157773358"],"apc_list":null,"apc_paid":null,"fwci":0.6868,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.72646937,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"52","issue":"6","first_page":"5001","last_page":"5014"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/halftone","display_name":"Halftone","score":0.9064656496047974},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.7550407648086548},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.667432427406311},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.6313312649726868},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.623859703540802},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5730599761009216},{"id":"https://openalex.org/keywords/layer","display_name":"Layer (electronics)","score":0.5427754521369934},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5186980962753296},{"id":"https://openalex.org/keywords/space","display_name":"Space (punctuation)","score":0.4751458168029785},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.4596203863620758},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.37233424186706543},{"id":"https://openalex.org/keywords/materials-science","display_name":"Materials science","score":0.183482825756073},{"id":"https://openalex.org/keywords/nanotechnology","display_name":"Nanotechnology","score":0.06771257519721985}],"concepts":[{"id":"https://openalex.org/C2777635815","wikidata":"https://www.wikidata.org/wiki/Q1110021","display_name":"Halftone","level":3,"score":0.9064656496047974},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.7550407648086548},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.667432427406311},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.6313312649726868},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.623859703540802},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5730599761009216},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.5427754521369934},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5186980962753296},{"id":"https://openalex.org/C2778572836","wikidata":"https://www.wikidata.org/wiki/Q380933","display_name":"Space (punctuation)","level":2,"score":0.4751458168029785},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4596203863620758},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.37233424186706543},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.183482825756073},{"id":"https://openalex.org/C171250308","wikidata":"https://www.wikidata.org/wiki/Q11468","display_name":"Nanotechnology","level":1,"score":0.06771257519721985},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tcyb.2020.3026047","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcyb.2020.3026047","pdf_url":null,"source":{"id":"https://openalex.org/S4210191041","display_name":"IEEE Transactions on Cybernetics","issn_l":"2168-2267","issn":["2168-2267","2168-2275"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cybernetics","raw_type":"journal-article"},{"id":"pmid:33095731","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/33095731","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE transactions on cybernetics","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.4300000071525574,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G3857766324","display_name":null,"funder_award_id":"GJHZ20180928155814437","funder_id":"https://openalex.org/F4320329801","funder_display_name":"Shenzhen Research and Development Program"},{"id":"https://openalex.org/G4871455045","display_name":null,"funder_award_id":"U19B2022","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5641777001","display_name":null,"funder_award_id":"U1736118","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8773676125","display_name":null,"funder_award_id":"62072480","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320329801","display_name":"Shenzhen Research and Development Program","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W22271197","https://openalex.org/W1604614341","https://openalex.org/W1868549062","https://openalex.org/W1928615599","https://openalex.org/W1955882805","https://openalex.org/W1965064373","https://openalex.org/W1976570511","https://openalex.org/W1979088303","https://openalex.org/W2010867994","https://openalex.org/W2028611829","https://openalex.org/W2031466562","https://openalex.org/W2048398911","https://openalex.org/W2068656974","https://openalex.org/W2096156898","https://openalex.org/W2099202463","https://openalex.org/W2106663508","https://openalex.org/W2118585731","https://openalex.org/W2124664712","https://openalex.org/W2134527668","https://openalex.org/W2137642015","https://openalex.org/W2152128675","https://openalex.org/W2153635508","https://openalex.org/W2158474074","https://openalex.org/W2159269332","https://openalex.org/W2165049148","https://openalex.org/W2208958634","https://openalex.org/W2322525404","https://openalex.org/W2344320947","https://openalex.org/W2465668359","https://openalex.org/W2750011053","https://openalex.org/W2805954585","https://openalex.org/W2832441265","https://openalex.org/W2904653265","https://openalex.org/W2912367388","https://openalex.org/W2921416452","https://openalex.org/W2965349828","https://openalex.org/W3023496898","https://openalex.org/W3104186834","https://openalex.org/W6677656871"],"related_works":["https://openalex.org/W4251316475","https://openalex.org/W387710534","https://openalex.org/W608034372","https://openalex.org/W2049375232","https://openalex.org/W4378219109","https://openalex.org/W2383705254","https://openalex.org/W4378446391","https://openalex.org/W2381832910","https://openalex.org/W1990318175","https://openalex.org/W2403754046"],"abstract_inverted_index":{"Syndrome-trellis":[0],"codes":[1],"(STCs)":[2],"are":[3,168,202],"commonly":[4],"used":[5,89],"in":[6,71,149,175],"image":[7,36,140],"steganographic":[8,37,224],"schemes,":[9],"which":[10,87,109],"aim":[11],"at":[12,170],"minimizing":[13],"the":[14,23,64,75,92,116,122,138,154,176,180,186,195,199,206,212,222,232],"embedding":[15,27,46,93,129,155,208,214],"distortion,":[16],"but":[17],"most":[18],"distortion":[19,99,117,181],"models":[20],"cannot":[21],"capture":[22],"mutual":[24],"interaction":[25],"of":[26,66,124,188,198],"modifications":[28],"(MIEMs).":[29],"In":[30,162],"this":[31],"article,":[32],"a":[33,41,50,56,78,96,98,103,127],"secure":[34],"halftone":[35,72],"scheme":[38,225],"based":[39,62,101],"on":[40,63,102,121],"feature":[42,51,76,105],"space":[43,52,106],"and":[44,153,179],"layer":[45,128,159,201],"is":[47,53,60,85,88,107,119,131,157,191],"proposed.":[48],"First,":[49],"constructed":[54],"by":[55,160],"characterization":[57],"method":[58],"that":[59,185,221],"designed":[61],"statistics":[65,123],"4":[67,150,172],"\u00d74":[68,151,173],"pixel":[69,189,196],"blocks":[70,174],"images.":[73],"Upon":[74],"space,":[77],"generalized":[79],"steganalyzer":[80],"with":[81,217],"good":[82],"classification":[83],"ability":[84],"proposed,":[86],"to":[90,133,145,205],"measure":[91],"distortion.":[94,215],"As":[95],"result,":[97],"model":[100,118,182],"hybrid":[104],"constructed,":[108],"outperforms":[110],"some":[111],"state-of-the-art":[112,233],"models.":[113],"Then,":[114],"as":[115],"established":[120],"local":[125],"regions,":[126],"strategy":[130],"proposed":[132,223],"reduce":[134],"MIEM.":[135],"It":[136],"divides":[137],"host":[139],"into":[141],"multiple":[142],"layers":[143],"according":[144,204],"their":[146],"relative":[147],"positions":[148],"blocks,":[152],"procedure":[156],"executed":[158],"layer.":[161],"each":[163],"layer,":[164],"any":[165],"two":[166],"pixels":[167],"located":[169],"different":[171],"original":[177],"image,":[178],"makes":[183],"sure":[184],"calculation":[187],"distortions":[190,197],"independent.":[192],"Between":[193],"layers,":[194],"current":[200],"updated":[203],"previous":[207],"modifications,":[209],"thus":[210],"reducing":[211],"total":[213],"Comparisons":[216],"prior":[218],"schemes":[219],"demonstrate":[220],"achieves":[226],"high":[227],"statistical":[228],"security":[229],"when":[230],"resisting":[231],"steganalysis.":[234]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
