{"id":"https://openalex.org/W2615273237","doi":"https://doi.org/10.1109/tifs.2017.2705625","title":"Steganography With Multiple JPEG Images of the Same Scene","display_name":"Steganography With Multiple JPEG Images of the Same Scene","publication_year":2017,"publication_date":"2017-05-18","ids":{"openalex":"https://openalex.org/W2615273237","doi":"https://doi.org/10.1109/tifs.2017.2705625","mag":"2615273237"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2017.2705625","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2705625","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088470713","display_name":"Tom\u00e1\u0161 Denemark","orcid":null},"institutions":[{"id":"https://openalex.org/I123946342","display_name":"Binghamton University","ror":"https://ror.org/008rmbt77","country_code":"US","type":"education","lineage":["https://openalex.org/I123946342"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Tomas Denemark","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Binghamton University, Binghamton, NY, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Binghamton University, Binghamton, NY, USA","institution_ids":["https://openalex.org/I123946342"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081020569","display_name":"Jessica Fridrich","orcid":"https://orcid.org/0009-0003-6516-628X"},"institutions":[{"id":"https://openalex.org/I123946342","display_name":"Binghamton University","ror":"https://ror.org/008rmbt77","country_code":"US","type":"education","lineage":["https://openalex.org/I123946342"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jessica Fridrich","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Binghamton University, Binghamton, NY, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Binghamton University, Binghamton, NY, USA","institution_ids":["https://openalex.org/I123946342"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5088470713"],"corresponding_institution_ids":["https://openalex.org/I123946342"],"apc_list":null,"apc_paid":null,"fwci":3.4589,"has_fulltext":false,"cited_by_count":62,"citation_normalized_percentile":{"value":0.95746657,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"12","issue":"10","first_page":"2308","last_page":"2319"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.8603775501251221},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8163976669311523},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.7563846111297607},{"id":"https://openalex.org/keywords/bhattacharyya-distance","display_name":"Bhattacharyya distance","score":0.6721038818359375},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5616353750228882},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.5468192100524902},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.5373780727386475},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.5092636346817017},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.4265727996826172},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.21465381979942322}],"concepts":[{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.8603775501251221},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8163976669311523},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.7563846111297607},{"id":"https://openalex.org/C24145651","wikidata":"https://www.wikidata.org/wiki/Q2901249","display_name":"Bhattacharyya distance","level":2,"score":0.6721038818359375},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5616353750228882},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.5468192100524902},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.5373780727386475},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.5092636346817017},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.4265727996826172},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.21465381979942322}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2017.2705625","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2705625","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.47999998927116394}],"awards":[{"id":"https://openalex.org/G1008396666","display_name":null,"funder_award_id":"1561446","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G5870223447","display_name":null,"funder_award_id":"FA9950-12-1-0124","funder_id":"https://openalex.org/F4320338279","funder_display_name":"Air Force Office of Scientific Research"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320338279","display_name":"Air Force Office of Scientific Research","ror":"https://ror.org/011e9bt93"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W22271197","https://openalex.org/W1494254146","https://openalex.org/W1497964309","https://openalex.org/W1531168824","https://openalex.org/W1534147215","https://openalex.org/W1847693599","https://openalex.org/W1867816105","https://openalex.org/W1970303434","https://openalex.org/W1972506985","https://openalex.org/W1973466159","https://openalex.org/W2006711727","https://openalex.org/W2009130368","https://openalex.org/W2022503816","https://openalex.org/W2030198834","https://openalex.org/W2055625960","https://openalex.org/W2064060403","https://openalex.org/W2064123268","https://openalex.org/W2071451750","https://openalex.org/W2098616111","https://openalex.org/W2107689227","https://openalex.org/W2130706803","https://openalex.org/W2134527668","https://openalex.org/W2136035751","https://openalex.org/W2170598445","https://openalex.org/W2543123829","https://openalex.org/W2545241995","https://openalex.org/W2545848843","https://openalex.org/W2972741388","https://openalex.org/W3142078075","https://openalex.org/W4210764419","https://openalex.org/W6632049895"],"related_works":["https://openalex.org/W2373405822","https://openalex.org/W1529294424","https://openalex.org/W2241212938","https://openalex.org/W1597187555","https://openalex.org/W2614249221","https://openalex.org/W2160587766","https://openalex.org/W2357125417","https://openalex.org/W2997133669","https://openalex.org/W1966340347","https://openalex.org/W3045883714"],"abstract_inverted_index":{"It":[0],"is":[1,27,143],"widely":[2],"recognized":[3],"that":[4,26,150],"incorporating":[5],"side-information":[6],"at":[7],"the":[8,55,60,77,85,152,156],"sender":[9,61],"can":[10],"significantly":[11],"improve":[12],"steganographic":[13],"security":[14,125],"in":[15,92,123],"practice.":[16],"Currently,":[17],"most":[18],"side-informed":[19],"schemes":[20],"utilize":[21],"a":[22,37,67,112,119,131,160],"high-quality":[23],"\u201cprecover\u201d":[24],"image":[25],"subsequently":[28],"processed":[29],"and":[30,34,105,114,167],"then":[31],"jointly":[32],"quantized":[33,161],"embedded":[35],"with":[36,101,111,126],"secret.":[38],"In":[39],"this":[40],"paper,":[41],"we":[42],"investigate":[43],"an":[44,93],"alternative":[45],"form":[46],"of":[47,50,54,80,87,140,165],"side-information-a":[48],"set":[49],"multiple":[51,108],"JPEG":[52,71,133],"images":[53,72,100],"same":[56,153],"scene-for":[57],"applications":[58],"when":[59],"does":[62],"not":[63],"have":[64],"access":[65],"to":[66,75,83,128],"precover.":[68],"The":[69,135],"additional":[70],"are":[73],"used":[74],"determine":[76],"preferred":[78],"polarity":[79],"embedding":[81,95,141],"changes":[82],"modulate":[84],"costs":[86,142],"changing":[88],"individual":[89],"DCT":[90,169],"coefficients":[91,170],"existing":[94],"scheme.":[96],"Tests":[97],"on":[98,106],"real":[99,107],"synthesized":[102],"acquisition":[103,174],"noise":[104],"acquisitions":[109],"obtained":[110],"tripod-mounted":[113],"hand-held":[115],"digital":[116],"camera":[117],"show":[118],"rather":[120],"significant":[121],"improvement":[122],"empirical":[124],"respect":[127],"steganography":[129],"utilizing":[130],"single":[132],"image.":[134],"proposed":[136],"empirically":[137],"determined":[138],"modulation":[139,154],"justified":[144],"using":[145],"Monte-Carlo":[146],"simulations":[147],"by":[148,172],"showing":[149],"qualitatively":[151],"minimizes":[155],"Bhattacharyya":[157],"distance":[158],"between":[159],"generalized":[162],"Gaussian":[163],"model":[164],"cover":[166],"stego":[168],"corrupted":[171],"AWG":[173],"noise.":[175]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":11},{"year":2019,"cited_by_count":13},{"year":2018,"cited_by_count":12},{"year":2017,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
