{"id":"https://openalex.org/W2093381613","doi":"https://doi.org/10.1109/tifs.2013.2292509","title":"Digital Image Sharing by Diverse Image Media","display_name":"Digital Image Sharing by Diverse Image Media","publication_year":2014,"publication_date":"2014-01-01","ids":{"openalex":"https://openalex.org/W2093381613","doi":"https://doi.org/10.1109/tifs.2013.2292509","mag":"2093381613"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2013.2292509","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2013.2292509","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076396013","display_name":"Kai-Hui Lee","orcid":"https://orcid.org/0000-0003-1051-1915"},"institutions":[{"id":"https://openalex.org/I192703390","display_name":"Ming Chuan University","ror":"https://ror.org/02pgvzy25","country_code":"TW","type":"education","lineage":["https://openalex.org/I192703390"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Kai-Hui Lee","raw_affiliation_strings":["Department of Computer Science and Information Engineering, Ming Chuan University, Taoyuan, Taiwan","Department of Computer Science and Information Engineering Ming Chuan University Taoyuan Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Engineering, Ming Chuan University, Taoyuan, Taiwan","institution_ids":["https://openalex.org/I192703390"]},{"raw_affiliation_string":"Department of Computer Science and Information Engineering Ming Chuan University Taoyuan Taiwan","institution_ids":["https://openalex.org/I192703390"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103584067","display_name":"Pei-Ling Chiu","orcid":null},"institutions":[{"id":"https://openalex.org/I192703390","display_name":"Ming Chuan University","ror":"https://ror.org/02pgvzy25","country_code":"TW","type":"education","lineage":["https://openalex.org/I192703390"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Pei-Ling Chiu","raw_affiliation_strings":["Department of Risk Management and Insurance, Ming Chuan University, Taipei, Taiwan","Dept. of Risk Manage. & Insurance, Ming Chuan Univ., Taipei, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Risk Management and Insurance, Ming Chuan University, Taipei, Taiwan","institution_ids":["https://openalex.org/I192703390"]},{"raw_affiliation_string":"Dept. of Risk Manage. & Insurance, Ming Chuan Univ., Taipei, Taiwan","institution_ids":["https://openalex.org/I192703390"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5076396013"],"corresponding_institution_ids":["https://openalex.org/I192703390"],"apc_list":null,"apc_paid":null,"fwci":5.1213,"has_fulltext":false,"cited_by_count":35,"citation_normalized_percentile":{"value":0.9657822,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"9","issue":"1","first_page":"88","last_page":"98"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10627","display_name":"Advanced Image and Video Retrieval Techniques","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8069368600845337},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.6269663572311401},{"id":"https://openalex.org/keywords/image-sharing","display_name":"Image sharing","score":0.616062343120575},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.610108494758606},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5855849385261536},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.5368403196334839},{"id":"https://openalex.org/keywords/digital-image","display_name":"Digital image","score":0.5239534378051758},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4782123267650604},{"id":"https://openalex.org/keywords/natural","display_name":"Natural (archaeology)","score":0.4606618285179138},{"id":"https://openalex.org/keywords/digital-photography","display_name":"Digital photography","score":0.43758949637413025},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.42796188592910767},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41738325357437134},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4144502580165863},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.3209744989871979},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.22744521498680115},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.22063976526260376},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12931334972381592},{"id":"https://openalex.org/keywords/photography","display_name":"Photography","score":0.11036661267280579}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8069368600845337},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.6269663572311401},{"id":"https://openalex.org/C2780639701","wikidata":"https://www.wikidata.org/wiki/Q354869","display_name":"Image sharing","level":3,"score":0.616062343120575},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.610108494758606},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5855849385261536},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.5368403196334839},{"id":"https://openalex.org/C42781572","wikidata":"https://www.wikidata.org/wiki/Q1250322","display_name":"Digital image","level":4,"score":0.5239534378051758},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4782123267650604},{"id":"https://openalex.org/C2776608160","wikidata":"https://www.wikidata.org/wiki/Q4785462","display_name":"Natural (archaeology)","level":2,"score":0.4606618285179138},{"id":"https://openalex.org/C16282426","wikidata":"https://www.wikidata.org/wiki/Q173095","display_name":"Digital photography","level":3,"score":0.43758949637413025},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.42796188592910767},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41738325357437134},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4144502580165863},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.3209744989871979},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.22744521498680115},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.22063976526260376},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12931334972381592},{"id":"https://openalex.org/C119657128","wikidata":"https://www.wikidata.org/wiki/Q11633","display_name":"Photography","level":2,"score":0.11036661267280579},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2013.2292509","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2013.2292509","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.41999998688697815}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1974502466","https://openalex.org/W1982429228","https://openalex.org/W1988245022","https://openalex.org/W1988721368","https://openalex.org/W1998393919","https://openalex.org/W1998803122","https://openalex.org/W2010323271","https://openalex.org/W2011714040","https://openalex.org/W2016243271","https://openalex.org/W2036145348","https://openalex.org/W2045772684","https://openalex.org/W2047000895","https://openalex.org/W2099884310","https://openalex.org/W2107689227","https://openalex.org/W2145395774","https://openalex.org/W2155107565","https://openalex.org/W2159785038","https://openalex.org/W2172264700"],"related_works":["https://openalex.org/W2350486768","https://openalex.org/W1680673927","https://openalex.org/W2736079351","https://openalex.org/W3036561648","https://openalex.org/W3130643437","https://openalex.org/W2384158193","https://openalex.org/W4281696921","https://openalex.org/W3138619437","https://openalex.org/W2518043470","https://openalex.org/W2164344703"],"abstract_inverted_index":{"Conventional":[0],"visual":[1],"secret":[2,7,62,89,98,115,158],"sharing":[3],"(VSS)":[4],"schemes":[5,53],"hide":[6,181],"images":[8,90,122],"in":[9,22,71,139,143],"shares":[10,27,88,132,155,163],"that":[11,87,197],"are":[12,18,69,164],"either":[13],"printed":[14,144],"on":[15,152],"transparencies":[16],"or":[17,33,136,142],"encoded":[19],"and":[20,42,64,99,126,156,166],"stored":[21],"a":[23,56,81],"digital":[24,114,140],"form.":[25,145],"The":[26,106,130,146,160],"can":[28,111,133],"appear":[29],"as":[30,34],"noise-like":[31,128,147,183],"pixels":[32],"meaningful":[35],"images;":[36],"but":[37],"it":[38],"will":[39],"arouse":[40],"suspicion":[41],"increase":[43],"interception":[44],"risk":[45,58,173,189,209],"during":[46,102],"transmission":[47,57,104,172,188,208],"of":[48],"the":[49,61,66,72,97,100,103,157,171,182,187,192,198,207,212],"shares.":[50],"Hence,":[51],"VSS":[52,73,83,213],"suffer":[54],"from":[55],"problem":[59,190,210],"for":[60,65,191,205,211],"itself":[63],"participants":[67,101],"who":[68],"involved":[70],"scheme.":[74],"To":[75],"address":[76],"this":[77],"problem,":[78],"we":[79],"proposed":[80,107,199],"natural-image-based":[82],"scheme":[84,110],"(NVSS":[85],"scheme)":[86],"via":[91],"various":[92],"carrier":[93],"media":[94],"to":[95,180,185],"protect":[96],"phase.":[105],"(n,n)-":[108],"NVSS":[109],"share":[112,148,184],"one":[113,127],"image":[116],"over":[117],"n-1":[118],"arbitrary":[119],"selected":[120],"natural":[121,124,131,154,162],"(called":[123],"shares)":[125],"share.":[129,193],"be":[134],"photos":[135],"hand-painted":[137],"pictures":[138],"form":[141],"is":[149,201],"generated":[150],"based":[151],"these":[153],"image.":[159],"unaltered":[161],"diverse":[165],"innocuous,":[167],"thus":[168],"greatly":[169],"reducing":[170],"problem.":[174],"We":[175],"also":[176],"propose":[177],"possible":[178],"ways":[179],"reduce":[186],"Experimental":[194],"results":[195],"indicate":[196],"approach":[200],"an":[202],"excellent":[203],"solution":[204],"solving":[206],"schemes.":[214]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":9},{"year":2015,"cited_by_count":7},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
