{"id":"https://openalex.org/W2544043488","doi":"https://doi.org/10.1109/wifs.2013.6707819","title":"A GA optimization approach to HS based multiple reversible data hiding","display_name":"A GA optimization approach to HS based multiple reversible data hiding","publication_year":2013,"publication_date":"2013-11-01","ids":{"openalex":"https://openalex.org/W2544043488","doi":"https://doi.org/10.1109/wifs.2013.6707819","mag":"2544043488"},"language":"en","primary_location":{"id":"doi:10.1109/wifs.2013.6707819","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wifs.2013.6707819","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE International Workshop on Information Forensics and Security (WIFS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100619909","display_name":"Junxiang Wang","orcid":"https://orcid.org/0000-0002-6635-4296"},"institutions":[{"id":"https://openalex.org/I105991555","display_name":"Jingdezhen Ceramic Institute","ror":"https://ror.org/01d0jcz74","country_code":"CN","type":"education","lineage":["https://openalex.org/I105991555"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Junxiang Wang","raw_affiliation_strings":["School of Mechanical & Electronic Engineering, Jingdezhen Ceramic Institute, Jingdezhen, China"],"affiliations":[{"raw_affiliation_string":"School of Mechanical & Electronic Engineering, Jingdezhen Ceramic Institute, Jingdezhen, China","institution_ids":["https://openalex.org/I105991555"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039213686","display_name":"Jiangqun Ni","orcid":"https://orcid.org/0000-0002-7520-9031"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiangqun Ni","raw_affiliation_strings":["School of Information Science and Technology, Sun Yat-Sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Sun Yat-Sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100619909"],"corresponding_institution_ids":["https://openalex.org/I105991555"],"apc_list":null,"apc_paid":null,"fwci":0.8165,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.78838394,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"5","issue":null,"first_page":"203","last_page":"208"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/histogram","display_name":"Histogram","score":0.6942899227142334},{"id":"https://openalex.org/keywords/distortion","display_name":"Distortion (music)","score":0.6786903738975525},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.6750738024711609},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.6691555976867676},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.6285082697868347},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.6009437441825867},{"id":"https://openalex.org/keywords/optimization-problem","display_name":"Optimization problem","score":0.5757322311401367},{"id":"https://openalex.org/keywords/genetic-algorithm","display_name":"Genetic algorithm","score":0.5250727534294128},{"id":"https://openalex.org/keywords/bin","display_name":"Bin","score":0.5185521245002747},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.45431941747665405},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.435740202665329},{"id":"https://openalex.org/keywords/rate\u2013distortion-theory","display_name":"Rate\u2013distortion theory","score":0.4323573410511017},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.43216919898986816},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.3729908764362335},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.31005120277404785},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2272064983844757},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.09613436460494995},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.06986001133918762}],"concepts":[{"id":"https://openalex.org/C53533937","wikidata":"https://www.wikidata.org/wiki/Q185020","display_name":"Histogram","level":3,"score":0.6942899227142334},{"id":"https://openalex.org/C126780896","wikidata":"https://www.wikidata.org/wiki/Q899871","display_name":"Distortion (music)","level":4,"score":0.6786903738975525},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.6750738024711609},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.6691555976867676},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.6285082697868347},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.6009437441825867},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.5757322311401367},{"id":"https://openalex.org/C8880873","wikidata":"https://www.wikidata.org/wiki/Q187787","display_name":"Genetic algorithm","level":2,"score":0.5250727534294128},{"id":"https://openalex.org/C156273044","wikidata":"https://www.wikidata.org/wiki/Q4913766","display_name":"Bin","level":2,"score":0.5185521245002747},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.45431941747665405},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.435740202665329},{"id":"https://openalex.org/C64185310","wikidata":"https://www.wikidata.org/wiki/Q843483","display_name":"Rate\u2013distortion theory","level":3,"score":0.4323573410511017},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.43216919898986816},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.3729908764362335},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.31005120277404785},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2272064983844757},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.09613436460494995},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.06986001133918762},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0},{"id":"https://openalex.org/C194257627","wikidata":"https://www.wikidata.org/wiki/Q211554","display_name":"Amplifier","level":3,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wifs.2013.6707819","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wifs.2013.6707819","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE International Workshop on Information Forensics and Security (WIFS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1495690538","https://openalex.org/W1571514197","https://openalex.org/W1989518396","https://openalex.org/W2005214253","https://openalex.org/W2040164026","https://openalex.org/W2073809459","https://openalex.org/W2087293550","https://openalex.org/W2087754138","https://openalex.org/W2106950225","https://openalex.org/W2111027484","https://openalex.org/W2115924904","https://openalex.org/W2121393355","https://openalex.org/W2135459805","https://openalex.org/W2158986121","https://openalex.org/W3023540311","https://openalex.org/W4238963040"],"related_works":["https://openalex.org/W2168959081","https://openalex.org/W2052838852","https://openalex.org/W3122406646","https://openalex.org/W2078128010","https://openalex.org/W2052231930","https://openalex.org/W4295213014","https://openalex.org/W2436180082","https://openalex.org/W2092582715","https://openalex.org/W2063809597","https://openalex.org/W2735427223"],"abstract_inverted_index":{"As":[0],"a":[1,106],"typical":[2],"reversible":[3,136],"data":[4],"hiding":[5],"scheme,":[6],"the":[7,17,28,37,54,60,70,79,98,110,118,145,148,152],"performance":[8],"of":[9,64,121,147,154],"histogram":[10],"shifting":[11],"(HS)":[12],"technique":[13],"is":[14,67,75,93],"dependent":[15],"on":[16],"selected":[18],"side":[19,49],"information,":[20],"i.e.,":[21,89],"peak":[22,103,122],"and":[23,32,56,59,81,102,123,157],"zero":[24,101,124],"bins.":[25,104],"Due":[26],"to":[27,46,95],"massive":[29],"solution":[30],"space":[31],"burden":[33],"in":[34,151],"distortion":[35,57,65,82],"computation,":[36],"conventional":[38],"HS":[39,71,133],"based":[40,72,134],"schemes":[41],"utilize":[42],"some":[43],"empirical":[44],"criterions":[45],"determine":[47,117],"those":[48],"information.":[50],"In":[51],"this":[52],"paper,":[53],"rate":[55,80],"model":[58],"associated":[61],"fast":[62],"algorithm":[63,91],"computation":[66],"first":[68],"developed,":[69],"multiple":[73,135],"embedding":[74,155],"then":[76],"formulated":[77],"as":[78],"optimization":[83,87],"problem.":[84],"An":[85],"intelligence":[86],"algorithm,":[88],"genetic":[90],"(GA)":[92],"employed":[94],"automatically":[96],"search":[97],"globally":[99],"optimal":[100,119],"For":[105],"given":[107],"secret":[108],"data,":[109],"proposed":[111,149],"scheme":[112,150],"could":[113],"not":[114],"only":[115],"adaptively":[116],"number":[120],"bin":[125],"pairs":[126],"but":[127],"also":[128],"their":[129],"corresponding":[130],"values":[131],"for":[132],"embedding.":[137],"Compared":[138],"with":[139],"previous":[140],"approaches,":[141],"experimental":[142],"results":[143],"demonstrate":[144],"superiority":[146],"terms":[153],"capacity":[156],"stego-image":[158],"quality.":[159]},"counts_by_year":[{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
