{"id":"https://openalex.org/W2095233313","doi":"https://doi.org/10.1109/tit.2012.2217072","title":"An Efficient Embedder for BCH Coding for Steganography","display_name":"An Efficient Embedder for BCH Coding for Steganography","publication_year":2012,"publication_date":"2012-09-03","ids":{"openalex":"https://openalex.org/W2095233313","doi":"https://doi.org/10.1109/tit.2012.2217072","mag":"2095233313"},"language":"en","primary_location":{"id":"doi:10.1109/tit.2012.2217072","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2012.2217072","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003027028","display_name":"Rongyue Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I139024713","display_name":"Guangdong University of Technology","ror":"https://ror.org/04azbjn80","country_code":"CN","type":"education","lineage":["https://openalex.org/I139024713"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Rongyue Zhang","raw_affiliation_strings":["School of Computers, Guangdong University of Technology, Guangzhou, China","[School of Computer, Guangdong University of Technology, Guangzhou, China]"],"affiliations":[{"raw_affiliation_string":"School of Computers, Guangdong University of Technology, Guangzhou, China","institution_ids":["https://openalex.org/I139024713"]},{"raw_affiliation_string":"[School of Computer, Guangdong University of Technology, Guangzhou, China]","institution_ids":["https://openalex.org/I139024713"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059382291","display_name":"Vasily Sachnev","orcid":"https://orcid.org/0000-0001-7063-5069"},"institutions":[{"id":"https://openalex.org/I87111246","display_name":"Catholic University of Korea","ror":"https://ror.org/01fpnj063","country_code":"KR","type":"education","lineage":["https://openalex.org/I87111246"]},{"id":"https://openalex.org/I4210133166","display_name":"The Catholic University of Korea Bucheon St. Mary's Hospital","ror":"https://ror.org/0443jbw36","country_code":"KR","type":"healthcare","lineage":["https://openalex.org/I4210133166","https://openalex.org/I4405260414","https://openalex.org/I87111246"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"V. Sachnev","raw_affiliation_strings":["School of Information, Communication and Electronic Engineering, The Catholic University of Korea, Bucheon, South Korea","Sch. of Inf., Commun. & Electron. Eng., Catholic Univ. of Korea, Bucheon, South Korea"],"affiliations":[{"raw_affiliation_string":"School of Information, Communication and Electronic Engineering, The Catholic University of Korea, Bucheon, South Korea","institution_ids":["https://openalex.org/I87111246"]},{"raw_affiliation_string":"Sch. of Inf., Commun. & Electron. Eng., Catholic Univ. of Korea, Bucheon, South Korea","institution_ids":["https://openalex.org/I4210133166","https://openalex.org/I87111246"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108499036","display_name":"Magnus Bakke Botnan","orcid":null},"institutions":[{"id":"https://openalex.org/I204778367","display_name":"Norwegian University of Science and Technology","ror":"https://ror.org/05xg72x27","country_code":"NO","type":"education","lineage":["https://openalex.org/I204778367"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"M. B. Botnan","raw_affiliation_strings":["Department of Mathematical Sciences, Norwegian University of Science and Technology, Trondheim, Norway","Dept. of Math. Sci., Norwegian Univ. of Sci. & Technol., Trondheim, Norway"],"affiliations":[{"raw_affiliation_string":"Department of Mathematical Sciences, Norwegian University of Science and Technology, Trondheim, Norway","institution_ids":["https://openalex.org/I204778367"]},{"raw_affiliation_string":"Dept. of Math. Sci., Norwegian Univ. of Sci. & Technol., Trondheim, Norway","institution_ids":["https://openalex.org/I204778367"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008113667","display_name":"Hyoung Joong Kim","orcid":"https://orcid.org/0000-0002-1144-6660"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Hyoung Joong Kim","raw_affiliation_strings":["Graduate School of Information Security, Korea University, Seoul, South Korea","Grad. Sch. of Inf. Security, Korea Univ., Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Graduate School of Information Security, Korea University, Seoul, South Korea","institution_ids":["https://openalex.org/I197347611"]},{"raw_affiliation_string":"Grad. Sch. of Inf. Security, Korea Univ., Seoul, South Korea","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055816512","display_name":"Jun Heo","orcid":"https://orcid.org/0000-0002-7230-7875"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jun Heo","raw_affiliation_strings":["School of Electrical Engineering, Korea University, Seoul, South Korea","Sch. of Electr. Eng., Korea Univ., Seoul, South Korea#TAB#"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering, Korea University, Seoul, South Korea","institution_ids":["https://openalex.org/I197347611"]},{"raw_affiliation_string":"Sch. of Electr. Eng., Korea Univ., Seoul, South Korea#TAB#","institution_ids":["https://openalex.org/I197347611"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5003027028"],"corresponding_institution_ids":["https://openalex.org/I139024713"],"apc_list":null,"apc_paid":null,"fwci":2.7455,"has_fulltext":false,"cited_by_count":51,"citation_normalized_percentile":{"value":0.91643527,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"58","issue":"12","first_page":"7272","last_page":"7279"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bch-code","display_name":"BCH code","score":0.8432214260101318},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5269292593002319},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.5142368674278259},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.47133588790893555},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4277620315551758},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.41571053862571716},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.3648959994316101},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.3175899386405945},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.31595155596733093},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.17609882354736328}],"concepts":[{"id":"https://openalex.org/C42276685","wikidata":"https://www.wikidata.org/wiki/Q795705","display_name":"BCH code","level":3,"score":0.8432214260101318},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5269292593002319},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.5142368674278259},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.47133588790893555},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4277620315551758},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.41571053862571716},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.3648959994316101},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.3175899386405945},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.31595155596733093},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.17609882354736328}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tit.2012.2217072","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2012.2217072","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W1497563318","https://openalex.org/W1527181506","https://openalex.org/W1527379064","https://openalex.org/W1534147215","https://openalex.org/W1543541055","https://openalex.org/W1557019715","https://openalex.org/W1582129125","https://openalex.org/W1599992983","https://openalex.org/W1760530029","https://openalex.org/W1970190826","https://openalex.org/W1970303434","https://openalex.org/W1976109068","https://openalex.org/W2032431003","https://openalex.org/W2038504436","https://openalex.org/W2043854093","https://openalex.org/W2052036524","https://openalex.org/W2066795426","https://openalex.org/W2092838825","https://openalex.org/W2095865742","https://openalex.org/W2103013014","https://openalex.org/W2125866656","https://openalex.org/W2127860199","https://openalex.org/W2134527668","https://openalex.org/W2148808559","https://openalex.org/W2153936403","https://openalex.org/W2154651642","https://openalex.org/W2161439181","https://openalex.org/W2169254475","https://openalex.org/W2169552486","https://openalex.org/W2170770173","https://openalex.org/W3121904864","https://openalex.org/W3142078075","https://openalex.org/W4239889878"],"related_works":["https://openalex.org/W1995527419","https://openalex.org/W1768316021","https://openalex.org/W1976834495","https://openalex.org/W2063367080","https://openalex.org/W2351328516","https://openalex.org/W2383319832","https://openalex.org/W3111377072","https://openalex.org/W2365813685","https://openalex.org/W2131941787","https://openalex.org/W2892104027"],"abstract_inverted_index":{"This":[0],"paper":[1],"presents":[2],"an":[3],"improved":[4],"data":[5,29,35,54],"hiding":[6],"technique":[7],"based":[8],"on":[9],"BCH":[10,107],"(":[11],"<i":[12,16,20,87,102],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[13,17,21,88,103],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">n</i>":[14,89,104],",":[15,19],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">k</i>":[18],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">t</i>":[22],")":[23],"coding.":[24],"The":[25,49,68,106],"proposed":[26,50,72,125],"embedder":[27,51],"hides":[28],"into":[30],"a":[31,100],"block":[32,42,85],"of":[33,70,78,123],"input":[34],"by":[36],"modifying":[37],"some":[38],"coefficients":[39],"in":[40,43],"the":[41,47,65,71,117,124],"order":[44],"to":[45,64,95,99,116],"null":[46],"syndrome.":[48],"can":[52],"hide":[53],"with":[55],"less":[56,60],"computational":[57],"time":[58],"and":[59,120],"storage":[61],"capacity":[62],"compared":[63],"existing":[66],"methods.":[67],"complexity":[69,119],"method":[73,98],"is":[74,93,112],"linear":[75],"while":[76],"that":[77],"other":[79],"methods":[80],"are":[81],"exponential":[82],"for":[83,110],"any":[84],"size":[86],".":[90,105],"Thus,":[91],"it":[92],"easy":[94],"extend":[96],"this":[97],"large":[101],"syndrome":[108],"coding":[109],"steganography":[111],"now":[113],"viable":[114],"ascribed":[115],"reduced":[118],"its":[121],"simplicity":[122],"embedder.":[126]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":6},{"year":2016,"cited_by_count":5},{"year":2015,"cited_by_count":6},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
