{"id":"https://openalex.org/W2051393035","doi":"https://doi.org/10.1117/12.473164","title":"&lt;title&gt;Capacity bounds and constructions for reversible data-hiding&lt;/title&gt;","display_name":"&lt;title&gt;Capacity bounds and constructions for reversible data-hiding&lt;/title&gt;","publication_year":2003,"publication_date":"2003-06-13","ids":{"openalex":"https://openalex.org/W2051393035","doi":"https://doi.org/10.1117/12.473164","mag":"2051393035"},"language":"en","primary_location":{"id":"doi:10.1117/12.473164","is_oa":false,"landing_page_url":"https://doi.org/10.1117/12.473164","pdf_url":null,"source":{"id":"https://openalex.org/S183492911","display_name":"Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE","issn_l":"0277-786X","issn":["0277-786X","1996-756X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310315543","host_organization_name":"SPIE","host_organization_lineage":["https://openalex.org/P4310315543"],"host_organization_lineage_names":["SPIE"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SPIE Proceedings","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011941511","display_name":"Ton Kalker","orcid":null},"institutions":[{"id":"https://openalex.org/I4210122849","display_name":"Philips (Netherlands)","ror":"https://ror.org/02p2bgp27","country_code":"NL","type":"company","lineage":["https://openalex.org/I4210122849"]},{"id":"https://openalex.org/I1329325741","display_name":"Philips (Finland)","ror":"https://ror.org/01g4jev56","country_code":"FI","type":"company","lineage":["https://openalex.org/I1329325741","https://openalex.org/I4210122849"]}],"countries":["FI","NL"],"is_corresponding":true,"raw_author_name":"Ton Kalker","raw_affiliation_strings":["Philips Research Labs. (Netherlands)","Philips Research Labs, Netherlands"],"affiliations":[{"raw_affiliation_string":"Philips Research Labs. (Netherlands)","institution_ids":["https://openalex.org/I4210122849"]},{"raw_affiliation_string":"Philips Research Labs, Netherlands","institution_ids":["https://openalex.org/I1329325741"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039843593","display_name":"F.M.J. Willems","orcid":"https://orcid.org/0000-0002-7316-3471"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Frans M. J. Willems","raw_affiliation_strings":["Technical Univ. Eindhoven (Netherlands)"],"affiliations":[{"raw_affiliation_string":"Technical Univ. Eindhoven (Netherlands)","institution_ids":["https://openalex.org/I83019370"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5011941511"],"corresponding_institution_ids":["https://openalex.org/I1329325741","https://openalex.org/I4210122849"],"apc_list":null,"apc_paid":null,"fwci":5.134,"has_fulltext":false,"cited_by_count":60,"citation_normalized_percentile":{"value":0.95799747,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"5020","issue":null,"first_page":"604","last_page":"611"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.9186276197433472},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.7634670734405518},{"id":"https://openalex.org/keywords/distortion","display_name":"Distortion (music)","score":0.677288293838501},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6238991022109985},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.5750411152839661},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5425636172294617},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.5228698253631592},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.5004370212554932},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4814947843551636},{"id":"https://openalex.org/keywords/signal","display_name":"SIGNAL (programming language)","score":0.46379926800727844},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4333984851837158},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.25921863317489624},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.25614580512046814},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.172087162733078},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.13952362537384033},{"id":"https://openalex.org/keywords/pure-mathematics","display_name":"Pure mathematics","score":0.07638013362884521}],"concepts":[{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.9186276197433472},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.7634670734405518},{"id":"https://openalex.org/C126780896","wikidata":"https://www.wikidata.org/wiki/Q899871","display_name":"Distortion (music)","level":4,"score":0.677288293838501},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6238991022109985},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.5750411152839661},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5425636172294617},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.5228698253631592},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.5004370212554932},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4814947843551636},{"id":"https://openalex.org/C2779843651","wikidata":"https://www.wikidata.org/wiki/Q7390335","display_name":"SIGNAL (programming language)","level":2,"score":0.46379926800727844},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4333984851837158},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.25921863317489624},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.25614580512046814},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.172087162733078},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.13952362537384033},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.07638013362884521},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.0},{"id":"https://openalex.org/C194257627","wikidata":"https://www.wikidata.org/wiki/Q211554","display_name":"Amplifier","level":3,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1117/12.473164","is_oa":false,"landing_page_url":"https://doi.org/10.1117/12.473164","pdf_url":null,"source":{"id":"https://openalex.org/S183492911","display_name":"Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE","issn_l":"0277-786X","issn":["0277-786X","1996-756X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310315543","host_organization_name":"SPIE","host_organization_lineage":["https://openalex.org/P4310315543"],"host_organization_lineage_names":["SPIE"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SPIE Proceedings","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.tue.nl:publications/5af6ab1d-40c3-4a99-8314-7547dc31e7ca","is_oa":false,"landing_page_url":"https://research.tue.nl/en/publications/5af6ab1d-40c3-4a99-8314-7547dc31e7ca","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Kalker, T & Willems, F M J 2003, Capacity bounds and constructions for reversible data-hiding. in P W Wong (ed.), Security and Watermarking of Multimedia Contents V. Proceedings of SPIE - The International Society for Optical Engineering, vol. 5020, SPIE, Warrendale, pp. 604-611, Security and Watermarking of Multimedia Contents V, Santa Clara, CA, United States, 21/01/03. https://doi.org/10.1117/12.473164","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:tue:oai:pure.tue.nl:publications/5af6ab1d-40c3-4a99-8314-7547dc31e7ca","is_oa":false,"landing_page_url":"https://research.tue.nl/nl/publications/5af6ab1d-40c3-4a99-8314-7547dc31e7ca","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Watermarking of Multimedia Contents V, 604 - 611","raw_type":"info:eu-repo/semantics/conferencepaper"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Sustainable cities and communities","score":0.5400000214576721,"id":"https://metadata.un.org/sdg/11"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2361629745","https://openalex.org/W2107922825","https://openalex.org/W3094285444","https://openalex.org/W1568204688","https://openalex.org/W2381262728","https://openalex.org/W2111592878","https://openalex.org/W2356840395","https://openalex.org/W3190769222","https://openalex.org/W2769668853","https://openalex.org/W32138105"],"abstract_inverted_index":{"An":[0],"undesirable":[1],"side":[2],"effect":[3],"of":[4,30,42,50,68,73,97,124,156,190,207,223,241],"many":[5],"watermarking":[6,74,158],"and":[7,33,75,117,214],"data-hiding":[8,76,99,107,131],"schemes":[9,132,159,165,244],"is":[10,19,21,37,90,109,204],"that":[11,114,245],"the":[12,28,34,48,65,69,95,125,147,154,184,192,199,205,221,228],"host":[13,127,194],"signal":[14,195],"into":[15],"which":[16],"auxiliary":[17,86,201],"data":[18,186],"embedded":[20,32,200],"distorted.":[22],"Finding":[23],"an":[24,39],"optimal":[25],"balance":[26],"between":[27],"amount":[29],"information":[31],"induced":[35],"distortion":[36,72,83],"therefore":[38],"active":[40],"field":[41],"research.":[43],"In":[44,92],"recent":[45],"years,":[46],"with":[47],"rediscovery":[49],"Costa's":[51],"seminal":[52],"paper":[53,209,233],"<i>Writing":[54],"on":[55,153,220],"Dirty":[56],"Paper</i>,":[57],"there":[58],"has":[59,143],"been":[60,134,144,161],"considerable":[61],"progress":[62],"in":[63,167,176,183,231,249],"understanding":[64],"fundamental":[66],"limits":[67,222],"capacity":[70,155],"versus":[71],"schemes.":[77],"For":[78],"some":[79,217],"applications,":[80],"however,":[81],"no":[82],"resulting":[84],"from":[85],"data,":[87],"however":[88],"small,":[89],"allowed.":[91],"these":[93],"cases":[94],"use":[96],"reversible":[98,106,130,157,164,225],"methods":[100],"provide":[101,216],"a":[102,112,172,180],"way":[103],"out.":[104],"A":[105],"scheme":[108,113],"defined":[110],"as":[111,196,198],"allows":[115],"complete":[116],"blind":[118],"restoration":[119],"(i.e.":[120],"without":[121],"additional":[122],"signaling)":[123],"original":[126,193],"data.":[128,202],"Practical":[129],"have":[133,160,171],"proposed":[135],"by":[136],"Fridrich":[137],"et":[138],"al.,":[139],"but":[140,237],"little":[141],"attention":[142],"paid":[145],"to":[146,210,215],"theoretical":[148],"limits.":[149],"Some":[150],"first":[151,218],"results":[152,219],"derived.":[162],"The":[163],"considered":[166],"most":[168],"previous":[169],"papers":[170],"highly":[173],"fragile":[174],"nature:":[175],"those":[177],"schemes,":[178],"changing":[179],"single":[181],"bit":[182],"watermarked":[185],"would":[187],"prohibit":[188],"recovery":[189],"both":[191],"well":[197],"It":[203],"purpose":[206],"this":[208,212,232],"<i>repair</i>":[211],"situation":[213],"<i>robust</i>":[224],"data-hiding.":[226],"Admittedly,":[227],"examples":[229],"provided":[230],"are":[234,239],"toy":[235],"examples,":[236],"they":[238],"indicative":[240],"more":[242],"practical":[243],"will":[246],"be":[247],"presented":[248],"subsequent":[250],"papers.":[251]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":1}],"updated_date":"2026-03-12T08:34:05.389933","created_date":"2016-06-24T00:00:00"}
