{"id":"https://openalex.org/W3162938965","doi":"https://doi.org/10.1109/icassp39728.2021.9415118","title":"Reversible Data Hiding in Jpeg Images for Privacy Protection","display_name":"Reversible Data Hiding in Jpeg Images for Privacy Protection","publication_year":2021,"publication_date":"2021-05-13","ids":{"openalex":"https://openalex.org/W3162938965","doi":"https://doi.org/10.1109/icassp39728.2021.9415118","mag":"3162938965"},"language":"en","primary_location":{"id":"doi:10.1109/icassp39728.2021.9415118","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icassp39728.2021.9415118","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005373227","display_name":"Yuxuan Huang","orcid":"https://orcid.org/0000-0002-4842-8781"},"institutions":[{"id":"https://openalex.org/I90610280","display_name":"South China University of Technology","ror":"https://ror.org/0530pts50","country_code":"CN","type":"education","lineage":["https://openalex.org/I90610280"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuxuan Huang","raw_affiliation_strings":["South China University of Technology,School of Computer Science and Engineering,Guangzhou,GD,China,510006"],"affiliations":[{"raw_affiliation_string":"South China University of Technology,School of Computer Science and Engineering,Guangzhou,GD,China,510006","institution_ids":["https://openalex.org/I90610280"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101457074","display_name":"Xin Cao","orcid":"https://orcid.org/0009-0007-7552-5345"},"institutions":[{"id":"https://openalex.org/I90610280","display_name":"South China University of Technology","ror":"https://ror.org/0530pts50","country_code":"CN","type":"education","lineage":["https://openalex.org/I90610280"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Cao","raw_affiliation_strings":["South China University of Technology,School of Computer Science and Engineering,Guangzhou,GD,China,510006"],"affiliations":[{"raw_affiliation_string":"South China University of Technology,School of Computer Science and Engineering,Guangzhou,GD,China,510006","institution_ids":["https://openalex.org/I90610280"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088100574","display_name":"Hao\u2010Tian Wu","orcid":"https://orcid.org/0000-0001-6462-7193"},"institutions":[{"id":"https://openalex.org/I90610280","display_name":"South China University of Technology","ror":"https://ror.org/0530pts50","country_code":"CN","type":"education","lineage":["https://openalex.org/I90610280"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hao-Tian Wu","raw_affiliation_strings":["South China University of Technology,School of Computer Science and Engineering,Guangzhou,GD,China,510006"],"affiliations":[{"raw_affiliation_string":"South China University of Technology,School of Computer Science and Engineering,Guangzhou,GD,China,510006","institution_ids":["https://openalex.org/I90610280"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038516431","display_name":"Yiu\u2010ming Cheung","orcid":"https://orcid.org/0000-0001-7629-4648"},"institutions":[{"id":"https://openalex.org/I141568987","display_name":"Hong Kong Baptist University","ror":"https://ror.org/0145fw131","country_code":"HK","type":"education","lineage":["https://openalex.org/I141568987"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Yiu-ming Cheung","raw_affiliation_strings":["Hong Kong Baptist University,Department of Computer Science,Hong Kong,China"],"affiliations":[{"raw_affiliation_string":"Hong Kong Baptist University,Department of Computer Science,Hong Kong,China","institution_ids":["https://openalex.org/I141568987"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5005373227"],"corresponding_institution_ids":["https://openalex.org/I90610280"],"apc_list":null,"apc_paid":null,"fwci":0.6725,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.70562092,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"2715","last_page":"2719"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7894493937492371},{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.7332567572593689},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.6069117188453674},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5996321439743042},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.5789564251899719},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4658336043357849},{"id":"https://openalex.org/keywords/transformation","display_name":"Transformation (genetics)","score":0.44732001423835754},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.421633243560791},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.41578811407089233},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3842487931251526},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.38424134254455566},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.34463661909103394},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3441665768623352},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.3155670166015625},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11730256676673889}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7894493937492371},{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.7332567572593689},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.6069117188453674},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5996321439743042},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.5789564251899719},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4658336043357849},{"id":"https://openalex.org/C204241405","wikidata":"https://www.wikidata.org/wiki/Q461499","display_name":"Transformation (genetics)","level":3,"score":0.44732001423835754},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.421633243560791},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.41578811407089233},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3842487931251526},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38424134254455566},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.34463661909103394},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3441665768623352},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.3155670166015625},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11730256676673889},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icassp39728.2021.9415118","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icassp39728.2021.9415118","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7699999809265137}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1610649526","https://openalex.org/W1760530029","https://openalex.org/W1919724854","https://openalex.org/W1986752946","https://openalex.org/W2005748876","https://openalex.org/W2035752188","https://openalex.org/W2098298834","https://openalex.org/W2118217749","https://openalex.org/W2135964285","https://openalex.org/W2140196014","https://openalex.org/W2148769230","https://openalex.org/W2474790722","https://openalex.org/W2508729725","https://openalex.org/W2509384312","https://openalex.org/W2736125956","https://openalex.org/W2779138100","https://openalex.org/W2804489050","https://openalex.org/W2920747963","https://openalex.org/W2944446180","https://openalex.org/W2995564652","https://openalex.org/W3003665003","https://openalex.org/W3029954326","https://openalex.org/W3088528150","https://openalex.org/W3091141192","https://openalex.org/W3092987439"],"related_works":["https://openalex.org/W2170577885","https://openalex.org/W4322741006","https://openalex.org/W2301878849","https://openalex.org/W3127228990","https://openalex.org/W2054082132","https://openalex.org/W2184946989","https://openalex.org/W3101977789","https://openalex.org/W2367209744","https://openalex.org/W2378072305","https://openalex.org/W3192546807"],"abstract_inverted_index":{"Recently,":[0],"how":[1],"to":[2,37,50,104],"protect":[3],"privacy":[4,27,39],"in":[5,13,41,64,77,140],"JPEG":[6,42],"images":[7],"has":[8,21],"become":[9],"an":[10,32],"important":[11],"issue":[12],"social":[14],"networks.":[15],"Besides":[16],"encryption,":[17],"reversible":[18,95,169],"visual":[19],"transformation":[20,170],"been":[22,72],"studied":[23],"for":[24],"content":[25,112],"and":[26,60,82,132,148,159],"protection.":[28],"In":[29],"this":[30],"paper,":[31],"improved":[33,156],"algorithm":[34,125],"is":[35,87,102],"proposed":[36,124,168],"conceal":[38],"information":[40,86,143,161],"images.":[43],"By":[44],"adopting":[45],"face":[46],"detection,":[47],"the":[48,58,78,83,90,106,110,119,123,134,167],"regions":[49],"be":[51,54,115,164],"protected":[52,111],"can":[53,113,163],"identified":[55],"so":[56],"that":[57,70,155],"DC":[59],"some":[61],"AC":[62,80],"coefficients":[63],"them":[65],"are":[66,74],"modified.":[67],"The":[68,151],"changes":[69],"have":[71],"made":[73],"reversibly":[75],"saved":[76],"other":[79],"coefficients,":[81],"block":[84],"selection":[85],"hidden":[88],"into":[89],"whole":[91],"image":[92,149,157],"also":[93],"by":[94],"data":[96],"hiding.":[97],"As":[98],"a":[99,127],"secret":[100],"key":[101],"employed":[103],"control":[105],"process":[107],"of":[108,129,142],"transformation,":[109],"hardly":[114],"obtained":[116],"without":[117],"knowing":[118],"key.":[120],"We":[121],"conduct":[122],"on":[126],"set":[128],"test":[130],"images,":[131],"compare":[133],"performance":[135],"with":[136,166],"several":[137],"existing":[138],"algorithms":[139],"terms":[141],"leakage,":[144],"file":[145],"size":[146],"increment,":[147],"quality.":[150],"experimental":[152],"results":[153],"show":[154],"quality":[158],"less":[160],"leakage":[162],"achieved":[165],"algorithm.":[171]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
