{"id":"https://openalex.org/W2019485468","doi":"https://doi.org/10.1109/tifs.2011.2155062","title":"A Novel Data Embedding Method Using Adaptive Pixel Pair Matching","display_name":"A Novel Data Embedding Method Using Adaptive Pixel Pair Matching","publication_year":2011,"publication_date":"2011-05-17","ids":{"openalex":"https://openalex.org/W2019485468","doi":"https://doi.org/10.1109/tifs.2011.2155062","mag":"2019485468"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2011.2155062","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2011.2155062","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051928752","display_name":"Wien Hong","orcid":"https://orcid.org/0000-0002-2873-0190"},"institutions":[{"id":"https://openalex.org/I13521601","display_name":"Yu Da University","ror":"https://ror.org/03bej0y93","country_code":"TW","type":"education","lineage":["https://openalex.org/I13521601"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Wien Hong","raw_affiliation_strings":["Department of InformationManagement, Yu Da University, Chaochiao, Miaoli, Taiwan","Dept. of Inf. Manage., Yu Da Univ., Chaochiao Township, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of InformationManagement, Yu Da University, Chaochiao, Miaoli, Taiwan","institution_ids":["https://openalex.org/I13521601"]},{"raw_affiliation_string":"Dept. of Inf. Manage., Yu Da Univ., Chaochiao Township, Taiwan","institution_ids":["https://openalex.org/I13521601"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070790321","display_name":"Tung-Shou Chen","orcid":"https://orcid.org/0000-0002-5307-1043"},"institutions":[{"id":"https://openalex.org/I131948415","display_name":"National Taichung University of Science and Technology","ror":"https://ror.org/05bgcav40","country_code":"TW","type":"education","lineage":["https://openalex.org/I131948415"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Tung-Shou Chen","raw_affiliation_strings":["Department of Computer Science and Information Engineering, National Taichung University of Science and Technology, Taichung, Taiwan","(Department of Computer Science and Information Engineering, National Taichung University of Science and Technology, Taichung, Taiwan)"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Engineering, National Taichung University of Science and Technology, Taichung, Taiwan","institution_ids":["https://openalex.org/I131948415"]},{"raw_affiliation_string":"(Department of Computer Science and Information Engineering, National Taichung University of Science and Technology, Taichung, Taiwan)","institution_ids":["https://openalex.org/I131948415"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5051928752"],"corresponding_institution_ids":["https://openalex.org/I13521601"],"apc_list":null,"apc_paid":null,"fwci":14.9255,"has_fulltext":false,"cited_by_count":239,"citation_normalized_percentile":{"value":0.99277223,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":100},"biblio":{"volume":"7","issue":"1","first_page":"176","last_page":"184"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.8434600830078125},{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.837113618850708},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7714009881019592},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.6919024586677551},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.639883279800415},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.6081675291061401},{"id":"https://openalex.org/keywords/distortion","display_name":"Distortion (music)","score":0.6045699119567871},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.5800688862800598},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.5405070185661316},{"id":"https://openalex.org/keywords/encoding","display_name":"Encoding (memory)","score":0.53041011095047},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5041619539260864},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4925592541694641},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4215081036090851},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4104800224304199},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3898654580116272},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.388997882604599},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.19584840536117554},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.08082163333892822}],"concepts":[{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.8434600830078125},{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.837113618850708},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7714009881019592},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.6919024586677551},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.639883279800415},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.6081675291061401},{"id":"https://openalex.org/C126780896","wikidata":"https://www.wikidata.org/wiki/Q899871","display_name":"Distortion (music)","level":4,"score":0.6045699119567871},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.5800688862800598},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.5405070185661316},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.53041011095047},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5041619539260864},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4925592541694641},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4215081036090851},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4104800224304199},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3898654580116272},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.388997882604599},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.19584840536117554},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08082163333892822},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C194257627","wikidata":"https://www.wikidata.org/wiki/Q211554","display_name":"Amplifier","level":3,"score":0.0},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2011.2155062","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2011.2155062","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4300000071525574,"display_name":"Sustainable cities and communities","id":"https://metadata.un.org/sdg/11"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1482218439","https://openalex.org/W1965064373","https://openalex.org/W1984914622","https://openalex.org/W2012300482","https://openalex.org/W2020806646","https://openalex.org/W2028197392","https://openalex.org/W2028383827","https://openalex.org/W2031466562","https://openalex.org/W2041560266","https://openalex.org/W2050155372","https://openalex.org/W2053363395","https://openalex.org/W2070912905","https://openalex.org/W2075652908","https://openalex.org/W2103228545","https://openalex.org/W2106663508","https://openalex.org/W2115457096","https://openalex.org/W2118296934","https://openalex.org/W2148808559","https://openalex.org/W2153615901","https://openalex.org/W2155447586","https://openalex.org/W2158320630","https://openalex.org/W2169552486","https://openalex.org/W4253000688","https://openalex.org/W6641447691"],"related_works":["https://openalex.org/W2148973528","https://openalex.org/W2939392096","https://openalex.org/W4243922849","https://openalex.org/W2930153478","https://openalex.org/W2106726851","https://openalex.org/W4309385482","https://openalex.org/W3154843532","https://openalex.org/W2068740952","https://openalex.org/W2182496537","https://openalex.org/W1716757876"],"abstract_inverted_index":{"This":[0],"paper":[1],"proposes":[2],"a":[3,27,32,44,98],"new":[4],"data-hiding":[5,72],"method":[6,104,135,149],"based":[7,76],"on":[8,77],"pixel":[9,24,40,49,128],"pair":[10,25,41,50],"matching":[11],"(PPM).":[12],"The":[13,48,79,102],"basic":[14],"idea":[15],"of":[16,23,38,82,92,157,168],"PPM":[17],"is":[18,51,84,163],"to":[19,43,58],"use":[20],"the":[21,35,55,60,90,126,133,147,166],"values":[22],"as":[26],"reference":[28],"coordinate,":[29],"and":[30,66,87,116,159],"search":[31],"coordinate":[33,57],"in":[34,97,120],"neighborhood":[36,114],"set":[37],"this":[39],"according":[42],"given":[45],"message":[46],"digit.":[47,61],"then":[52],"replaced":[53],"by":[54,94,110],"searched":[56],"conceal":[59],"Exploiting":[62],"modification":[63],"direction":[64],"(EMD)":[65],"diamond":[67],"encoding":[68],"(DE)":[69],"are":[70],"two":[71],"methods":[73],"proposed":[74,103,134,148],"recently":[75],"PPM.":[78],"maximum":[80],"capacity":[81],"EMD":[83,93],"1.161":[85],"bpp":[86],"DE":[88,109],"extends":[89],"payload":[91],"embedding":[95],"digits":[96,119],"larger":[99],"notational":[100,122],"system.":[101,123],"offers":[105],"lower":[106,138],"distortion":[107,139],"than":[108,155],"providing":[111],"more":[112],"compact":[113],"sets":[115],"allowing":[117],"embedded":[118],"any":[121],"Compared":[124],"with":[125],"optimal":[127],"adjustment":[129],"process":[130],"(OPAP)":[131],"method,":[132],"always":[136],"has":[137],"for":[140],"various":[141],"payloads.":[142],"Experimental":[143],"results":[144],"reveal":[145],"that":[146],"not":[150],"only":[151],"provides":[152],"better":[153],"performance":[154],"those":[156],"OPAP":[158],"DE,":[160],"but":[161],"also":[162],"secure":[164],"under":[165],"detection":[167],"some":[169],"well-known":[170],"steganalysis":[171],"techniques.":[172]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":14},{"year":2021,"cited_by_count":22},{"year":2020,"cited_by_count":25},{"year":2019,"cited_by_count":13},{"year":2018,"cited_by_count":15},{"year":2017,"cited_by_count":22},{"year":2016,"cited_by_count":26},{"year":2015,"cited_by_count":30},{"year":2014,"cited_by_count":25},{"year":2013,"cited_by_count":22},{"year":2012,"cited_by_count":9}],"updated_date":"2026-03-31T07:56:22.981413","created_date":"2025-10-10T00:00:00"}
