{"id":"https://openalex.org/W4389169180","doi":"https://doi.org/10.1109/tifs.2023.3337947","title":"Information Embedding With Stegotext Reconstruction","display_name":"Information Embedding With Stegotext Reconstruction","publication_year":2023,"publication_date":"2023-11-30","ids":{"openalex":"https://openalex.org/W4389169180","doi":"https://doi.org/10.1109/tifs.2023.3337947"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2023.3337947","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3337947","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014227402","display_name":"Yinfei Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yinfei Xu","raw_affiliation_strings":["School of Information Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100648619","display_name":"Jian Lu","orcid":"https://orcid.org/0000-0003-3176-5607"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Lu","raw_affiliation_strings":["School of Information Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027528912","display_name":"Xuan Guang","orcid":"https://orcid.org/0000-0002-0928-421X"},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuan Guang","raw_affiliation_strings":["School of Mathematical Sciences and the Key Laboratory of Pure Mathematics and Combinatorics (LPMC), Nankai University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematical Sciences and the Key Laboratory of Pure Mathematics and Combinatorics (LPMC), Nankai University, Tianjin, China","institution_ids":["https://openalex.org/I205237279"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013867024","display_name":"Wei Xu","orcid":"https://orcid.org/0000-0001-9341-8382"},"institutions":[{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Xu","raw_affiliation_strings":["National Mobile Communication Research Laboratory, Southeast University, Nanjing, China","Purple Mountain Laboratories, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"National Mobile Communication Research Laboratory, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Purple Mountain Laboratories, Nanjing, China","institution_ids":["https://openalex.org/I4210155350"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5014227402"],"corresponding_institution_ids":["https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":0.2607,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.55453874,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"19","issue":null,"first_page":"1415","last_page":"1428"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.7484422922134399},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.6101195812225342},{"id":"https://openalex.org/keywords/distortion","display_name":"Distortion (music)","score":0.5810256600379944},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5209413766860962},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.48240792751312256},{"id":"https://openalex.org/keywords/encoder","display_name":"Encoder","score":0.4816681146621704},{"id":"https://openalex.org/keywords/gaussian","display_name":"Gaussian","score":0.46134287118911743},{"id":"https://openalex.org/keywords/channel-capacity","display_name":"Channel capacity","score":0.4479243755340576},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.44507771730422974},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.42832285165786743},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3791913688182831},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.3460959196090698},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.19694849848747253},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.10658341646194458}],"concepts":[{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.7484422922134399},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.6101195812225342},{"id":"https://openalex.org/C126780896","wikidata":"https://www.wikidata.org/wiki/Q899871","display_name":"Distortion (music)","level":4,"score":0.5810256600379944},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5209413766860962},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.48240792751312256},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.4816681146621704},{"id":"https://openalex.org/C163716315","wikidata":"https://www.wikidata.org/wiki/Q901177","display_name":"Gaussian","level":2,"score":0.46134287118911743},{"id":"https://openalex.org/C97744766","wikidata":"https://www.wikidata.org/wiki/Q870845","display_name":"Channel capacity","level":3,"score":0.4479243755340576},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.44507771730422974},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.42832285165786743},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3791913688182831},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.3460959196090698},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.19694849848747253},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.10658341646194458},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C194257627","wikidata":"https://www.wikidata.org/wiki/Q211554","display_name":"Amplifier","level":3,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2023.3337947","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3337947","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.49000000953674316,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"awards":[{"id":"https://openalex.org/G2363493378","display_name":null,"funder_award_id":"BE2022059-3","funder_id":"https://openalex.org/F4320327777","funder_display_name":"Jiangsu Provincial Key Research and Development Program"},{"id":"https://openalex.org/G2374063051","display_name":null,"funder_award_id":"2242022k60002","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G4742664806","display_name":null,"funder_award_id":"62371119","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6546769403","display_name":null,"funder_award_id":"62022026","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6984540029","display_name":null,"funder_award_id":"62171238","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8981180859","display_name":null,"funder_award_id":"NKU 050-63233070","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320327777","display_name":"Jiangsu Provincial Key Research and Development Program","ror":null},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W625774930","https://openalex.org/W1484170624","https://openalex.org/W1897081267","https://openalex.org/W1955169834","https://openalex.org/W1976109068","https://openalex.org/W2001502656","https://openalex.org/W2012283350","https://openalex.org/W2013439598","https://openalex.org/W2031005616","https://openalex.org/W2050804383","https://openalex.org/W2068028939","https://openalex.org/W2097598146","https://openalex.org/W2100964406","https://openalex.org/W2115469356","https://openalex.org/W2118368685","https://openalex.org/W2124890704","https://openalex.org/W2144279061","https://openalex.org/W2151533263","https://openalex.org/W2164176006","https://openalex.org/W2167577564","https://openalex.org/W2169573155","https://openalex.org/W2173117926","https://openalex.org/W2296510033","https://openalex.org/W2810150785","https://openalex.org/W2963645489","https://openalex.org/W2963828702","https://openalex.org/W2972633733","https://openalex.org/W2975582393","https://openalex.org/W2989566004","https://openalex.org/W3104101844","https://openalex.org/W3169111758","https://openalex.org/W3199558812","https://openalex.org/W3214951728","https://openalex.org/W4205588087","https://openalex.org/W4300840296","https://openalex.org/W4301184727","https://openalex.org/W4312712230","https://openalex.org/W4317794926","https://openalex.org/W4367663522"],"related_works":["https://openalex.org/W2170577885","https://openalex.org/W2081900870","https://openalex.org/W2351909370","https://openalex.org/W2187037044","https://openalex.org/W4390516098","https://openalex.org/W1562053557","https://openalex.org/W2361587909","https://openalex.org/W3190769222","https://openalex.org/W2769668853","https://openalex.org/W2969231831"],"abstract_inverted_index":{"In":[0,94],"this":[1,60,130,145],"paper,":[2],"we":[3,23,62,147],"consider":[4,126],"stegotext":[5,18,35,91],"reconstruction":[6,36,57,92],"problem":[7,53],"in":[8,37,140],"information":[9,29,85],"embedding.":[10,30],"By":[11],"adding":[12],"the":[13,17,25,34,81,107,138],"requirement":[14],"of":[15,27,129],"restoring":[16],"under":[19],"certain":[20],"fidelity":[21],"criterion,":[22],"generalize":[24],"concept":[26],"reversible/irreversible":[28],"We":[31,124],"focus":[32],"on":[33,71],"a":[38,50,68,127,141],"discrete":[39],"memoryless":[40],"host":[41,87,133],"dependent":[42],"attack":[43,110,119],"channel,":[44],"which":[45,76],"can":[46],"be":[47],"regarded":[48],"as":[49],"generalized":[51],"Gel\u2019fand-Pinsker":[52],"with":[54,112,121],"an":[55,64],"input":[56],"constraint.":[58],"For":[59,144],"problem,":[61,131],"prove":[63],"upper":[65,97],"bound":[66,70],"and":[67,90,98,115],"lower":[69,99],"its":[72,150],"embedding":[73,84],"capacity-distortion":[74,151],"function,":[75],"is":[77,135],"defined":[78],"to":[79],"describe":[80],"tradeoff":[82],"between":[83],"rate,":[86],"composition":[88],"loss,":[89],"distortion.":[93],"particular,":[95],"our":[96],"bounds":[100],"thus":[101],"obtained":[102],"match":[103],"each":[104],"other":[105],"for":[106],"binary":[108],"XOR":[109],"channel":[111,120],"Hamming":[113],"distortion":[114],"Costa\u2019s":[116],"additive":[117],"Gaussian":[118],"quadratic":[122],"loss.":[123],"further":[125],"variant":[128],"where":[132],"signal":[134],"available":[136],"at":[137],"encoder":[139],"causal":[142],"way.":[143],"case,":[146],"completely":[148],"characterize":[149],"function.":[152]},"counts_by_year":[{"year":2024,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
