{"id":"https://openalex.org/W2107754525","doi":"https://doi.org/10.1145/1411328.1411341","title":"Histogram-based reversible data hiding technique using subsampling","display_name":"Histogram-based reversible data hiding technique using subsampling","publication_year":2008,"publication_date":"2008-09-22","ids":{"openalex":"https://openalex.org/W2107754525","doi":"https://doi.org/10.1145/1411328.1411341","mag":"2107754525"},"language":"en","primary_location":{"id":"doi:10.1145/1411328.1411341","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1411328.1411341","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 10th ACM workshop on Multimedia and security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000349069","display_name":"Kyungsu Kim","orcid":"https://orcid.org/0000-0001-6622-6545"},"institutions":[{"id":"https://openalex.org/I157485424","display_name":"Korea Advanced Institute of Science and Technology","ror":"https://ror.org/05apxxy63","country_code":"KR","type":"education","lineage":["https://openalex.org/I157485424"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Kyung-Su Kim","raw_affiliation_strings":["Korea Advanced Institute of Science and Technology, Daejeon, South Korea"],"affiliations":[{"raw_affiliation_string":"Korea Advanced Institute of Science and Technology, Daejeon, South Korea","institution_ids":["https://openalex.org/I157485424"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101830839","display_name":"Min-Jeong Lee","orcid":"https://orcid.org/0000-0001-8921-6761"},"institutions":[{"id":"https://openalex.org/I157485424","display_name":"Korea Advanced Institute of Science and Technology","ror":"https://ror.org/05apxxy63","country_code":"KR","type":"education","lineage":["https://openalex.org/I157485424"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Min-Jeong Lee","raw_affiliation_strings":["Korea Advanced Institute of Science and Technology, Daejeon, South Korea"],"affiliations":[{"raw_affiliation_string":"Korea Advanced Institute of Science and Technology, Daejeon, South Korea","institution_ids":["https://openalex.org/I157485424"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082393568","display_name":"Heung-Kyu Lee","orcid":"https://orcid.org/0000-0002-8119-9407"},"institutions":[{"id":"https://openalex.org/I157485424","display_name":"Korea Advanced Institute of Science and Technology","ror":"https://ror.org/05apxxy63","country_code":"KR","type":"education","lineage":["https://openalex.org/I157485424"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Heung-Kyu Lee","raw_affiliation_strings":["Korea Advanced Institute of Science and Technology, Daejeon, South Korea"],"affiliations":[{"raw_affiliation_string":"Korea Advanced Institute of Science and Technology, Daejeon, South Korea","institution_ids":["https://openalex.org/I157485424"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046944782","display_name":"Young\u2010Ho Suh","orcid":null},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Young-Ho Suh","raw_affiliation_strings":["Electronics and Telecommunications Research Institute, Daejeon, South Korea","[Electronics and Telecommunications Research Institute, Daejeon, South Korea]"],"affiliations":[{"raw_affiliation_string":"Electronics and Telecommunications Research Institute, Daejeon, South Korea","institution_ids":["https://openalex.org/I142401562"]},{"raw_affiliation_string":"[Electronics and Telecommunications Research Institute, Daejeon, South Korea]","institution_ids":["https://openalex.org/I142401562"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5000349069"],"corresponding_institution_ids":["https://openalex.org/I157485424"],"apc_list":null,"apc_paid":null,"fwci":5.6753,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.96216135,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"69","last_page":"74"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/arithmetic-underflow","display_name":"Arithmetic underflow","score":0.9290598630905151},{"id":"https://openalex.org/keywords/histogram","display_name":"Histogram","score":0.8886492252349854},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.8357320427894592},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.6744639873504639},{"id":"https://openalex.org/keywords/histogram-matching","display_name":"Histogram matching","score":0.6438096761703491},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.608643114566803},{"id":"https://openalex.org/keywords/distortion","display_name":"Distortion (music)","score":0.5742402076721191},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5537523031234741},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5291006565093994},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.49291300773620605},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.4587550163269043},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4550623893737793},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.4507272243499756},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.42443156242370605},{"id":"https://openalex.org/keywords/image-quality","display_name":"Image quality","score":0.4123445749282837},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.37693798542022705}],"concepts":[{"id":"https://openalex.org/C3265923","wikidata":"https://www.wikidata.org/wiki/Q669129","display_name":"Arithmetic underflow","level":2,"score":0.9290598630905151},{"id":"https://openalex.org/C53533937","wikidata":"https://www.wikidata.org/wiki/Q185020","display_name":"Histogram","level":3,"score":0.8886492252349854},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.8357320427894592},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.6744639873504639},{"id":"https://openalex.org/C127449775","wikidata":"https://www.wikidata.org/wiki/Q3785871","display_name":"Histogram matching","level":4,"score":0.6438096761703491},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.608643114566803},{"id":"https://openalex.org/C126780896","wikidata":"https://www.wikidata.org/wiki/Q899871","display_name":"Distortion (music)","level":4,"score":0.5742402076721191},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5537523031234741},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5291006565093994},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.49291300773620605},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.4587550163269043},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4550623893737793},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.4507272243499756},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.42443156242370605},{"id":"https://openalex.org/C55020928","wikidata":"https://www.wikidata.org/wiki/Q3813865","display_name":"Image quality","level":3,"score":0.4123445749282837},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.37693798542022705},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.0},{"id":"https://openalex.org/C194257627","wikidata":"https://www.wikidata.org/wiki/Q211554","display_name":"Amplifier","level":3,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/1411328.1411341","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1411328.1411341","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 10th ACM workshop on Multimedia and security","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.531.259","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.531.259","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://hklee.kaist.ac.kr/publications/ACM2008(Kim and Lee).pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8299999833106995,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1562053557","https://openalex.org/W1812030059","https://openalex.org/W1826780114","https://openalex.org/W2036117290","https://openalex.org/W2118085659","https://openalex.org/W2121393355","https://openalex.org/W2123218196","https://openalex.org/W2132971215","https://openalex.org/W2135459805","https://openalex.org/W2137288380","https://openalex.org/W2153362882","https://openalex.org/W2153715559","https://openalex.org/W2164137544","https://openalex.org/W6683725808"],"related_works":["https://openalex.org/W2397949907","https://openalex.org/W2074587767","https://openalex.org/W2063809597","https://openalex.org/W3155443874","https://openalex.org/W2060995160","https://openalex.org/W2060486287","https://openalex.org/W2158986121","https://openalex.org/W1440607661","https://openalex.org/W2356840395","https://openalex.org/W3187648820"],"abstract_inverted_index":{"Reversible":[0],"data":[1,20,55,73,151],"hiding":[2,56,152],"technique":[3,24],"guarantees":[4],"that":[5,58,123],"the":[6,14,18,42,60,63,76,80,92,100,104,118,124,133,140],"original":[7,43],"cover":[8],"image":[9,16,44],"is":[10,45,115],"completely":[11],"recovered":[12],"from":[13],"marked":[15],"after":[17],"hidden":[19],"are":[21,82],"extracted.":[22],"This":[23],"can":[25],"be":[26],"applied":[27],"in":[28,99,154],"some":[29],"applications":[30],"such":[31],"as":[32],"medical":[33],"imaging":[34],"and":[35,70,85,111,158],"law":[36],"enforcement":[37],"where":[38],"any":[39],"distortion":[40],"to":[41,138,147],"not":[46],"acceptable.":[47],"In":[48,136],"this":[49],"paper,":[50],"we":[51,145],"present":[52],"a":[53],"reversible":[54,150],"algorithm":[57,126],"shifts":[59],"histogram":[61],"of":[62,142,156],"differences":[64,95],"between":[65],"subimages":[66,81],"obtained":[67],"through":[68],"subsampling":[69],"embeds":[71],"secret":[72],"by":[74],"modifying":[75],"pixel":[77],"value.":[78],"Since":[79],"highly":[83],"correlated":[84],"have":[86,96],"strong":[87],"spatial":[88],"correlations,":[89],"it":[90],"utilizes":[91],"bins":[93],"whose":[94],"smaller":[97],"magnitude":[98],"difference":[101],"histogram.":[102],"Moreover,":[103],"proposed":[105,125],"scheme":[106],"prevents":[107],"possible":[108],"over/underflow":[109],"problem":[110],"no":[112],"location":[113],"map":[114],"needed":[116],"during":[117],"retrieval.":[119],"Experimental":[120],"results":[121],"prove":[122],"provides":[127],"high":[128],"embedding":[129],"capacity":[130,157],"while":[131],"keeping":[132],"distortions":[134],"low.":[135],"order":[137],"demonstrate":[139],"validity":[141],"our":[143],"algorithm,":[144],"compare":[146],"other":[148],"histogram-based":[149],"algorithms":[153],"terms":[155],"visual":[159],"quality.":[160]},"counts_by_year":[{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
