{"id":"https://openalex.org/W4407692343","doi":"https://doi.org/10.1109/iceic64972.2025.10879765","title":"On The Notion of Complete Quality Preserving in Data Hiding","display_name":"On The Notion of Complete Quality Preserving in Data Hiding","publication_year":2025,"publication_date":"2025-01-19","ids":{"openalex":"https://openalex.org/W4407692343","doi":"https://doi.org/10.1109/iceic64972.2025.10879765"},"language":"en","primary_location":{"id":"doi:10.1109/iceic64972.2025.10879765","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iceic64972.2025.10879765","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Conference on Electronics, Information, and Communication (ICEIC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5116309340","display_name":"Dhaval Variya","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Dhaval Variya","raw_affiliation_strings":["Innov8tif Sdn Bhd,Malaysia"],"affiliations":[{"raw_affiliation_string":"Innov8tif Sdn Bhd,Malaysia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5116309341","display_name":"Nathan Cheong Yuen Kiat","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nathan Cheong Yuen Kiat","raw_affiliation_strings":["Innov8tif Sdn Bhd,Malaysia"],"affiliations":[{"raw_affiliation_string":"Innov8tif Sdn Bhd,Malaysia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009216437","display_name":"Simying Ong","orcid":"https://orcid.org/0000-0002-6876-3050"},"institutions":[{"id":"https://openalex.org/I33849332","display_name":"University of Malaya","ror":"https://ror.org/00rzspn62","country_code":"MY","type":"education","lineage":["https://openalex.org/I33849332"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Simying Ong","raw_affiliation_strings":["University of Malaya,Faculty of Computer Science and Information Technology,Malaysia"],"affiliations":[{"raw_affiliation_string":"University of Malaya,Faculty of Computer Science and Information Technology,Malaysia","institution_ids":["https://openalex.org/I33849332"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069916756","display_name":"KokSheik Wong","orcid":"https://orcid.org/0000-0002-4893-2291"},"institutions":[{"id":"https://openalex.org/I11662577","display_name":"Monash University Malaysia","ror":"https://ror.org/00yncr324","country_code":"MY","type":"education","lineage":["https://openalex.org/I11662577"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"KokSheik Wong","raw_affiliation_strings":["School of Information Technology, Monash University Malaysia,Malaysia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Monash University Malaysia,Malaysia","institution_ids":["https://openalex.org/I11662577"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5116309340"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0242648,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9696999788284302,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9692000150680542,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6723035573959351},{"id":"https://openalex.org/keywords/quality","display_name":"Quality (philosophy)","score":0.6356488466262817},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.6034937500953674},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.23326873779296875},{"id":"https://openalex.org/keywords/epistemology","display_name":"Epistemology","score":0.10311314463615417},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.07558339834213257},{"id":"https://openalex.org/keywords/philosophy","display_name":"Philosophy","score":0.0626586377620697}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6723035573959351},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.6356488466262817},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.6034937500953674},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.23326873779296875},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.10311314463615417},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.07558339834213257},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0626586377620697}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iceic64972.2025.10879765","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iceic64972.2025.10879765","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Conference on Electronics, Information, and Communication (ICEIC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2036067009","https://openalex.org/W2041560266","https://openalex.org/W2096186241","https://openalex.org/W2100442934","https://openalex.org/W2121393355","https://openalex.org/W2162434844","https://openalex.org/W2968779794","https://openalex.org/W3012008737","https://openalex.org/W3132558872","https://openalex.org/W3142067920","https://openalex.org/W3170422465","https://openalex.org/W4371806274","https://openalex.org/W4385326100","https://openalex.org/W4394928399","https://openalex.org/W4406859158"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2170577885","https://openalex.org/W4398199422","https://openalex.org/W2390279801","https://openalex.org/W2351909370","https://openalex.org/W2187037044","https://openalex.org/W4391913857","https://openalex.org/W2358668433"],"abstract_inverted_index":{"Data":[0,34],"hiding":[1,35,71],"aims":[2],"to":[3,9,30,52,78,110,123],"insert":[4,53],"data":[5,56,70,129],"into":[6],"a":[7,32,68,102,107],"content":[8,23,75],"achieve":[10,124],"specific":[11],"purposes,":[12],"including":[13],"claiming":[14],"ownership":[15],"through":[16],"watermarking,":[17],"validating":[18],"the":[19,22,74,81,84,94],"integrity":[20],"of":[21,83,96],"in":[24,67,128],"authentication,":[25],"and":[26,44,63,105,131],"providing":[27],"extra/paid":[28],"features,":[29],"name":[31],"few.":[33],"concerns":[36],"three":[37,120],"conflicting":[38],"requirement":[39],"aspects,":[40],"namely,":[41],"quality,":[42],"capacity,":[43],"robustness.":[45,65],"For":[46],"many":[47],"years,":[48],"researchers":[49],"have":[50],"aimed":[51],"as":[54,57],"much":[55],"possible":[58],"while":[59],"minimizing":[60],"quality":[61,82,98,113,126],"deterioration":[62],"maximizing":[64],"However,":[66],"typical":[69,121],"method":[72],"where":[73],"is":[76,86,101],"modified":[77],"encode":[79],"data,":[80],"host":[85],"always":[87],"degraded.":[88],"In":[89],"this":[90],"work,":[91],"we":[92],"introduce":[93],"concept":[95],"complete":[97,112,125],"preservation,":[99],"which":[100],"reference-based":[103],"measure,":[104],"formalize":[106],"general":[108],"metric":[109],"establish":[111],"preservation":[114,127],"for":[115,139],"different":[116],"media.":[117],"We":[118],"discuss":[119],"ways":[122],"hiding,":[130],"comment":[132],"on":[133],"potential":[134],"approaches":[135],"that":[136],"are":[137],"worthy":[138],"future":[140],"exploration.":[141]},"counts_by_year":[],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2025-10-10T00:00:00"}
