{"id":"https://openalex.org/W4378364839","doi":"https://doi.org/10.1109/tifs.2023.3280341","title":"A Reversible Framework for Efficient and Secure Visual Privacy Protection","display_name":"A Reversible Framework for Efficient and Secure Visual Privacy Protection","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4378364839","doi":"https://doi.org/10.1109/tifs.2023.3280341"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2023.3280341","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3280341","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085698418","display_name":"Yushu Zhang","orcid":"https://orcid.org/0000-0001-8183-8435"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4391768012","display_name":"State Key Laboratory of Information Security","ror":"https://ror.org/012cr4033","country_code":null,"type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4391768012"]},{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yushu Zhang","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","Institute of Information Engineering, State Key Laboratory of Information Security, Chinese Academy of Sciences, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0001-8183-8435","affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]},{"raw_affiliation_string":"Institute of Information Engineering, State Key Laboratory of Information Security, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366","https://openalex.org/I4391768012"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045474025","display_name":"Xi Ye","orcid":"https://orcid.org/0000-0001-8546-9737"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4391768012","display_name":"State Key Laboratory of Information Security","ror":"https://ror.org/012cr4033","country_code":null,"type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4391768012"]},{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xi Ye","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","Institute of Information Engineering, State Key Laboratory of Information Security, Chinese Academy of Sciences, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0001-8546-9737","affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]},{"raw_affiliation_string":"Institute of Information Engineering, State Key Laboratory of Information Security, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366","https://openalex.org/I4391768012"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057787077","display_name":"Xiangli Xiao","orcid":"https://orcid.org/0000-0002-3250-0603"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4391768012","display_name":"State Key Laboratory of Information Security","ror":"https://ror.org/012cr4033","country_code":null,"type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4391768012"]},{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangli Xiao","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","Institute of Information Engineering, State Key Laboratory of Information Security, Chinese Academy of Sciences, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-3250-0603","affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]},{"raw_affiliation_string":"Institute of Information Engineering, State Key Laboratory of Information Security, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366","https://openalex.org/I4391768012"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079461118","display_name":"Tao Xiang","orcid":"https://orcid.org/0000-0002-9439-4623"},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Xiang","raw_affiliation_strings":["College of Computer Science, Chongqing University, Chongqing, China"],"raw_orcid":"https://orcid.org/0000-0002-9439-4623","affiliations":[{"raw_affiliation_string":"College of Computer Science, Chongqing University, Chongqing, China","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100325334","display_name":"Hongwei Li","orcid":"https://orcid.org/0000-0002-1961-7946"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongwei Li","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"raw_orcid":"https://orcid.org/0000-0002-1961-7946","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068837264","display_name":"Xiaochun Cao","orcid":"https://orcid.org/0000-0001-7141-708X"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaochun Cao","raw_affiliation_strings":["School of Cyber Science and Technology, Shenzhen Campus, Sun Yat-sen University, Shenzhen, China","School of Cyber Science and Technology, Shenzhen Campus of Sun Yat-sen University, Shenzhen, China"],"raw_orcid":"https://orcid.org/0000-0001-7141-708X","affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Shenzhen Campus, Sun Yat-sen University, Shenzhen, China","institution_ids":["https://openalex.org/I157773358"]},{"raw_affiliation_string":"School of Cyber Science and Technology, Shenzhen Campus of Sun Yat-sen University, Shenzhen, China","institution_ids":["https://openalex.org/I157773358"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5085698418"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4391768012","https://openalex.org/I9842412"],"apc_list":null,"apc_paid":null,"fwci":3.7876,"has_fulltext":false,"cited_by_count":33,"citation_normalized_percentile":{"value":0.94882423,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"18","issue":null,"first_page":"3334","last_page":"3349"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9833999872207642,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8419707417488098},{"id":"https://openalex.org/keywords/thumbnail","display_name":"Thumbnail","score":0.704719066619873},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6945319771766663},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.5545265078544617},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.5436335206031799},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5102787017822266},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.472001314163208},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.46341580152511597},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.42161625623703003},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.3361971974372864},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.33017778396606445},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.20845544338226318},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.12616941332817078}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8419707417488098},{"id":"https://openalex.org/C160174412","wikidata":"https://www.wikidata.org/wiki/Q873806","display_name":"Thumbnail","level":3,"score":0.704719066619873},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6945319771766663},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.5545265078544617},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.5436335206031799},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5102787017822266},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.472001314163208},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.46341580152511597},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.42161625623703003},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.3361971974372864},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.33017778396606445},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.20845544338226318},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.12616941332817078},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2023.3280341","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3280341","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6100000143051147}],"awards":[{"id":"https://openalex.org/G1546930127","display_name":null,"funder_award_id":"U20A20176","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2434235226","display_name":null,"funder_award_id":"62261160653","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3321467346","display_name":null,"funder_award_id":"xcxjh20221608","funder_id":"https://openalex.org/F4320322438","funder_display_name":"Nanjing University of Aeronautics and Astronautics"},{"id":"https://openalex.org/G526554915","display_name":null,"funder_award_id":"62072237","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5385193388","display_name":null,"funder_award_id":"2021YFB3100400","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G5471977783","display_name":null,"funder_award_id":"2021YFQ0056","funder_id":"https://openalex.org/F4320333335","funder_display_name":"Sichuan Province Science and Technology Support Program"},{"id":"https://openalex.org/G724036087","display_name":null,"funder_award_id":"62072062","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7604368941","display_name":null,"funder_award_id":"BK20201290","funder_id":"https://openalex.org/F4320334982","funder_display_name":"Basic Research Program of Jiangsu Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322438","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794"},{"id":"https://openalex.org/F4320333335","display_name":"Sichuan Province Science and Technology Support Program","ror":null},{"id":"https://openalex.org/F4320334982","display_name":"Basic Research Program of Jiangsu Province","ror":null},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W7682646","https://openalex.org/W1487489356","https://openalex.org/W1556531089","https://openalex.org/W1666447063","https://openalex.org/W1673464365","https://openalex.org/W1795776638","https://openalex.org/W1796263212","https://openalex.org/W1832766105","https://openalex.org/W1969513994","https://openalex.org/W1972138918","https://openalex.org/W1998279455","https://openalex.org/W1999360130","https://openalex.org/W2010989369","https://openalex.org/W2028299542","https://openalex.org/W2097896577","https://openalex.org/W2100415658","https://openalex.org/W2170269447","https://openalex.org/W2342152533","https://openalex.org/W2508016950","https://openalex.org/W2766866342","https://openalex.org/W2783916036","https://openalex.org/W2886130191","https://openalex.org/W2941048077","https://openalex.org/W2968081000","https://openalex.org/W2984609752","https://openalex.org/W2985045609","https://openalex.org/W3001217199","https://openalex.org/W3015356587","https://openalex.org/W3034419329","https://openalex.org/W3042973114","https://openalex.org/W3048511172","https://openalex.org/W3081489129","https://openalex.org/W3092401175","https://openalex.org/W3118049315","https://openalex.org/W3119831052","https://openalex.org/W3124064488","https://openalex.org/W3126792067","https://openalex.org/W3127360758","https://openalex.org/W3135307667","https://openalex.org/W3141913087","https://openalex.org/W3175406864","https://openalex.org/W4205588087","https://openalex.org/W4226094323","https://openalex.org/W4285601978","https://openalex.org/W4292387280","https://openalex.org/W6770086788"],"related_works":["https://openalex.org/W137154299","https://openalex.org/W2011506639","https://openalex.org/W2095080241","https://openalex.org/W2501702011","https://openalex.org/W2908847257","https://openalex.org/W2512435841","https://openalex.org/W2951818954","https://openalex.org/W4298160414","https://openalex.org/W2353159507","https://openalex.org/W3042973114"],"abstract_inverted_index":{"The":[0],"number":[1],"of":[2,92,132,158,181],"images":[3,38,71],"produced":[4],"by":[5,173,186,200,241],"people":[6,32],"everyday":[7],"is":[8,49,167,184,193,256],"rapidly":[9],"increasing":[10],"in":[11,73,208],"recent":[12],"years":[13],"and":[14,68,88,124,141,179,227,248,258,265],"their":[15,70],"local":[16],"storage":[17],"space":[18],"may":[19],"be":[20],"not":[21],"big":[22],"enough":[23],"for":[24,139,152,214],"storing":[25],"all":[26],"these":[27],"images.":[28],"As":[29],"a":[30,50,97,107,136,260],"result,":[31],"are":[33,94,114,212,224],"currently":[34],"accustomed":[35],"to":[36,39,52,65,84,195,217,251],"uploading":[37],"cloud":[40],"platforms,":[41],"which":[42,146],"raises":[43],"privacy":[44,55,79,87,144,264],"concerns.":[45],"Traditional":[46],"image":[47,54,62,86,123,149,153,166,204,230],"encryption":[48],"way":[51],"protect":[53],"without":[56],"preserving":[57],"visual":[58,78,143,150],"usability,":[59,89],"so":[60],"that":[61,253],"owners":[63,154],"fail":[64],"conveniently":[66],"browse":[67],"manage":[69],"stored":[72],"the":[74,121,156,162,164,182,190,197,221,228],"cloud.":[75],"Hence":[76],"some":[77],"protection":[80],"schemes":[81,113],"were":[82],"proposed":[83,175],"balance":[85,262],"while":[90],"many":[91],"them":[93],"irreversible.":[95],"Recently,":[96],"novel":[98],"reversible":[99,137,226],"technology,":[100],"called":[101],"Thumbnail-Preserving":[102],"Encryption":[103],"(TPE),":[104],"has":[105],"been":[106],"hot":[108],"topic.":[109],"However,":[110],"existing":[111],"TPE":[112],"either":[115],"inefficient,":[116],"or":[117],"cannot":[118],"perfectly":[119],"restore":[120],"original":[122,165,198],"meanwhile":[125],"achieve":[126],"Nonce-Respecting":[127],"(NR)":[128],"security.":[129,215,233],"In":[130,161],"view":[131],"this,":[133],"we":[134,235],"propose":[135],"framework":[138,255],"efficient":[140,257],"secure":[142],"protection,":[145],"tunably":[147],"preserves":[148],"usability":[151],"with":[155],"idea":[157],"data":[159,187],"hiding.":[160,188],"framework,":[163],"firstly":[168],"divided":[169],"into":[170],"several":[171],"regions":[172,183],"our":[174,218,254],"region":[176,192],"division":[177],"methods":[178],"one":[180],"vacated":[185,191],"Then,":[189],"utilized":[194],"preserve":[196],"thumbnail":[199],"pixel":[201],"adjustment":[202],"after":[203],"encryption.":[205],"Finally,":[206],"pixels":[207],"each":[209],"sub":[210],"block":[211],"permuted":[213],"According":[216],"theoretical":[219],"analysis,":[220],"above":[222],"processes":[223],"completely":[225],"processed":[229],"achieves":[231],"NR":[232],"Furthermore,":[234],"conduct":[236],"extensive":[237],"experiments,":[238],"including":[239],"recognition":[240],"various":[242],"application":[243],"programming":[244],"interfaces,":[245],"user":[246],"surveys,":[247],"efficiency":[249],"comparison,":[250],"demonstrate":[252],"strikes":[259],"good":[261],"between":[263],"usability.":[266]},"counts_by_year":[{"year":2026,"cited_by_count":5},{"year":2025,"cited_by_count":13},{"year":2024,"cited_by_count":14},{"year":2023,"cited_by_count":1}],"updated_date":"2026-05-13T08:25:38.343686","created_date":"2025-10-10T00:00:00"}
