{"id":"https://openalex.org/W2785554563","doi":"https://doi.org/10.1109/apsipa.2017.8282153","title":"Image manipulation on social media for encryption-then-compression systems","display_name":"Image manipulation on social media for encryption-then-compression systems","publication_year":2017,"publication_date":"2017-12-01","ids":{"openalex":"https://openalex.org/W2785554563","doi":"https://doi.org/10.1109/apsipa.2017.8282153","mag":"2785554563"},"language":"en","primary_location":{"id":"doi:10.1109/apsipa.2017.8282153","is_oa":false,"landing_page_url":"https://doi.org/10.1109/apsipa.2017.8282153","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021075343","display_name":"Tatsuya Chuman","orcid":"https://orcid.org/0000-0001-8687-3854"},"institutions":[{"id":"https://openalex.org/I69740276","display_name":"Tokyo Metropolitan University","ror":"https://ror.org/00ws30h19","country_code":"JP","type":"education","lineage":["https://openalex.org/I69740276"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Tatsuya Chuman","raw_affiliation_strings":["Tokyo Metropolitan University, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Tokyo Metropolitan University, Tokyo, Japan","institution_ids":["https://openalex.org/I69740276"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044004391","display_name":"Kenta Iida","orcid":"https://orcid.org/0000-0001-6288-943X"},"institutions":[{"id":"https://openalex.org/I69740276","display_name":"Tokyo Metropolitan University","ror":"https://ror.org/00ws30h19","country_code":"JP","type":"education","lineage":["https://openalex.org/I69740276"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kenta Iida","raw_affiliation_strings":["Tokyo Metropolitan University, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Tokyo Metropolitan University, Tokyo, Japan","institution_ids":["https://openalex.org/I69740276"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015250468","display_name":"Hitoshi Kiya","orcid":"https://orcid.org/0000-0001-8061-3090"},"institutions":[{"id":"https://openalex.org/I69740276","display_name":"Tokyo Metropolitan University","ror":"https://ror.org/00ws30h19","country_code":"JP","type":"education","lineage":["https://openalex.org/I69740276"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hitoshi Kiya","raw_affiliation_strings":["Tokyo Metropolitan University, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Tokyo Metropolitan University, Tokyo, Japan","institution_ids":["https://openalex.org/I69740276"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5021075343"],"corresponding_institution_ids":["https://openalex.org/I69740276"],"apc_list":null,"apc_paid":null,"fwci":1.9115,"has_fulltext":false,"cited_by_count":30,"citation_normalized_percentile":{"value":0.92116415,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"858","last_page":"863"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8434748649597168},{"id":"https://openalex.org/keywords/scrambling","display_name":"Scrambling","score":0.8174769878387451},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7754771113395691},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.7552197575569153},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.6031954288482666},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.589900016784668},{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.5520775318145752},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5288535356521606},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.4967530369758606},{"id":"https://openalex.org/keywords/distortion","display_name":"Distortion (music)","score":0.41314324736595154},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.4110533893108368},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3745254874229431},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3729110062122345},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.36695319414138794},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.3390039801597595},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3175746500492096},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.213189959526062},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.17109674215316772},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.14140337705612183},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.0813782811164856},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.07917013764381409}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8434748649597168},{"id":"https://openalex.org/C182548165","wikidata":"https://www.wikidata.org/wiki/Q2261483","display_name":"Scrambling","level":2,"score":0.8174769878387451},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7754771113395691},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.7552197575569153},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.6031954288482666},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.589900016784668},{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.5520775318145752},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5288535356521606},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.4967530369758606},{"id":"https://openalex.org/C126780896","wikidata":"https://www.wikidata.org/wiki/Q899871","display_name":"Distortion (music)","level":4,"score":0.41314324736595154},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4110533893108368},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3745254874229431},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3729110062122345},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.36695319414138794},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.3390039801597595},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3175746500492096},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.213189959526062},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.17109674215316772},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.14140337705612183},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.0813782811164856},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.07917013764381409},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C194257627","wikidata":"https://www.wikidata.org/wiki/Q211554","display_name":"Amplifier","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/apsipa.2017.8282153","is_oa":false,"landing_page_url":"https://doi.org/10.1109/apsipa.2017.8282153","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities","score":0.4399999976158142}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1501211345","https://openalex.org/W1510526020","https://openalex.org/W2009460929","https://openalex.org/W2023966246","https://openalex.org/W2040903332","https://openalex.org/W2040969511","https://openalex.org/W2050770647","https://openalex.org/W2052836530","https://openalex.org/W2084994317","https://openalex.org/W2085762799","https://openalex.org/W2096328905","https://openalex.org/W2101647944","https://openalex.org/W2101677434","https://openalex.org/W2104722041","https://openalex.org/W2133364557","https://openalex.org/W2148254922","https://openalex.org/W2148300333","https://openalex.org/W2171464389","https://openalex.org/W2245606036","https://openalex.org/W2394485828","https://openalex.org/W2494134239","https://openalex.org/W2563180213","https://openalex.org/W2582467130","https://openalex.org/W2689968489","https://openalex.org/W2753607224","https://openalex.org/W2993503428","https://openalex.org/W6680036709","https://openalex.org/W6739584322","https://openalex.org/W6771790382"],"related_works":["https://openalex.org/W69312893","https://openalex.org/W2349686135","https://openalex.org/W84934912","https://openalex.org/W936781193","https://openalex.org/W2353936545","https://openalex.org/W2153933599","https://openalex.org/W4297633779","https://openalex.org/W2287132719","https://openalex.org/W2384550941","https://openalex.org/W2386594575"],"abstract_inverted_index":{"Encryption-then-Compression":[0],"(EtC)":[1],"systems":[2,20,45,121],"have":[3],"been":[4],"proposed":[5],"to":[6,23,62,74,81,86,104,108,124],"securely":[7],"transmit":[8],"images":[9,79,101],"through":[10],"an":[11],"untrusted":[12],"channel":[13],"provider.":[14],"In":[15,94],"this":[16],"paper,":[17],"the":[18,43,51,77,91,95,110,119],"EtC":[19,44,113,120],"are":[21,29,46,102,122],"applied":[22],"social":[24,57,66],"media":[25],"like":[26],"Twitter,":[27],"that":[28,118],"known":[30],"for":[31],"carrying":[32],"out":[33],"some":[34,88],"image":[35,54,92],"manipulation.":[36,93],"Block":[37],"scrambling-based":[38],"encryption":[39],"schemes":[40],"used":[41],"in":[42,48],"evaluated":[47],"terms":[49],"of":[50,112],"robustness":[52,111],"against":[53],"manipulation":[55],"on":[56],"media.":[58],"This":[59],"work":[60],"aims":[61],"investigate":[63],"how":[64],"each":[65],"networking":[67],"service":[68],"(SNS)":[69],"provider":[70],"manipulates":[71],"images,":[72],"and":[73,98],"consider":[75],"whether":[76],"encrypted":[78,97],"uploaded":[80,103],"SNS":[82,106,127],"providers":[83,107],"can":[84],"avoid":[85],"include":[87],"distortion":[89],"under":[90],"experiment,":[96],"non-encrypted":[99],"JPEG":[100],"various":[105],"confirm":[109],"systems.":[114],"It":[115],"is":[116],"shown":[117],"applicable":[123],"almost":[125],"all":[126],"providers.":[128]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":16},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
