{"id":"https://openalex.org/W4210648470","doi":"https://doi.org/10.1145/3502300.3502304","title":"Reversible Data Hiding in Encrypted Images Based on Chinese Remainder Theorem and Secret Sharing Mechanism","display_name":"Reversible Data Hiding in Encrypted Images Based on Chinese Remainder Theorem and Secret Sharing Mechanism","publication_year":2021,"publication_date":"2021-11-19","ids":{"openalex":"https://openalex.org/W4210648470","doi":"https://doi.org/10.1145/3502300.3502304"},"language":"en","primary_location":{"id":"doi:10.1145/3502300.3502304","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3502300.3502304","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 3rd International Conference on Big-data Service and Intelligent Computation","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072469414","display_name":"Chuan Qin","orcid":"https://orcid.org/0000-0002-0370-4623"},"institutions":[{"id":"https://openalex.org/I148128674","display_name":"University of Shanghai for Science and Technology","ror":"https://ror.org/00ay9v204","country_code":"CN","type":"education","lineage":["https://openalex.org/I148128674"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chuan Qin","raw_affiliation_strings":["University of Shanghai for Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"University of Shanghai for Science and Technology, China","institution_ids":["https://openalex.org/I148128674"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029389054","display_name":"Shengyan Gao","orcid":"https://orcid.org/0000-0002-5267-4539"},"institutions":[{"id":"https://openalex.org/I148128674","display_name":"University of Shanghai for Science and Technology","ror":"https://ror.org/00ay9v204","country_code":"CN","type":"education","lineage":["https://openalex.org/I148128674"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shengyan Gao","raw_affiliation_strings":["University of Shanghai for Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"University of Shanghai for Science and Technology, China","institution_ids":["https://openalex.org/I148128674"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051126341","display_name":"Chanyu Jiang","orcid":null},"institutions":[{"id":"https://openalex.org/I148128674","display_name":"University of Shanghai for Science and Technology","ror":"https://ror.org/00ay9v204","country_code":"CN","type":"education","lineage":["https://openalex.org/I148128674"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chanyu Jiang","raw_affiliation_strings":["University of Shanghai for Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"University of Shanghai for Science and Technology, China","institution_ids":["https://openalex.org/I148128674"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058083055","display_name":"Heng Yao","orcid":"https://orcid.org/0000-0002-3784-4157"},"institutions":[{"id":"https://openalex.org/I148128674","display_name":"University of Shanghai for Science and Technology","ror":"https://ror.org/00ay9v204","country_code":"CN","type":"education","lineage":["https://openalex.org/I148128674"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Heng Yao","raw_affiliation_strings":["University of Shanghai for Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"University of Shanghai for Science and Technology, China","institution_ids":["https://openalex.org/I148128674"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101495154","display_name":"Ching-Chun Chang","orcid":"https://orcid.org/0000-0002-7539-1451"},"institutions":[{"id":"https://openalex.org/I39555362","display_name":"University of Warwick","ror":"https://ror.org/01a77tt86","country_code":"GB","type":"education","lineage":["https://openalex.org/I39555362"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Ching-Chun Chang","raw_affiliation_strings":["University of Warwick, UK"],"affiliations":[{"raw_affiliation_string":"University of Warwick, UK","institution_ids":["https://openalex.org/I39555362"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5072469414"],"corresponding_institution_ids":["https://openalex.org/I148128674"],"apc_list":null,"apc_paid":null,"fwci":0.1921,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.51715686,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"23","last_page":"32"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/chinese-remainder-theorem","display_name":"Chinese remainder theorem","score":0.902376651763916},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8266333341598511},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.8106853365898132},{"id":"https://openalex.org/keywords/homomorphic-secret-sharing","display_name":"Homomorphic secret sharing","score":0.7966780662536621},{"id":"https://openalex.org/keywords/least-significant-bit","display_name":"Least significant bit","score":0.7835326790809631},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.6849027872085571},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.662360668182373},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.6062134504318237},{"id":"https://openalex.org/keywords/shamirs-secret-sharing","display_name":"Shamir's Secret Sharing","score":0.6058331727981567},{"id":"https://openalex.org/keywords/remainder","display_name":"Remainder","score":0.6045035719871521},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5201133489608765},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.48196741938591003},{"id":"https://openalex.org/keywords/image-sharing","display_name":"Image sharing","score":0.4585438072681427},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.44971147179603577},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.42860519886016846},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.41075050830841064},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.39408665895462036},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.39355048537254333},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.37533053755760193},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.31099551916122437},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.23849338293075562},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23351392149925232}],"concepts":[{"id":"https://openalex.org/C151635116","wikidata":"https://www.wikidata.org/wiki/Q193878","display_name":"Chinese remainder theorem","level":2,"score":0.902376651763916},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8266333341598511},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.8106853365898132},{"id":"https://openalex.org/C132161212","wikidata":"https://www.wikidata.org/wiki/Q5891458","display_name":"Homomorphic secret sharing","level":4,"score":0.7966780662536621},{"id":"https://openalex.org/C4305246","wikidata":"https://www.wikidata.org/wiki/Q3885225","display_name":"Least significant bit","level":2,"score":0.7835326790809631},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.6849027872085571},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.662360668182373},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.6062134504318237},{"id":"https://openalex.org/C131755552","wikidata":"https://www.wikidata.org/wiki/Q935125","display_name":"Shamir's Secret Sharing","level":5,"score":0.6058331727981567},{"id":"https://openalex.org/C39613435","wikidata":"https://www.wikidata.org/wiki/Q846677","display_name":"Remainder","level":2,"score":0.6045035719871521},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5201133489608765},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.48196741938591003},{"id":"https://openalex.org/C2780639701","wikidata":"https://www.wikidata.org/wiki/Q354869","display_name":"Image sharing","level":3,"score":0.4585438072681427},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.44971147179603577},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.42860519886016846},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.41075050830841064},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.39408665895462036},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.39355048537254333},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.37533053755760193},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.31099551916122437},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.23849338293075562},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23351392149925232},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3502300.3502304","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3502300.3502304","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 3rd International Conference on Big-data Service and Intelligent Computation","raw_type":"proceedings-article"},{"id":"pmh:oai:wrap.warwick.ac.uk:162547","is_oa":false,"landing_page_url":"https://wrap.warwick.ac.uk/162547/","pdf_url":null,"source":{"id":"https://openalex.org/S4306400665","display_name":"Warwick Research Archive Portal (University of Warwick)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I39555362","host_organization_name":"University of Warwick","host_organization_lineage":["https://openalex.org/I39555362"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Item"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5947735119","display_name":null,"funder_award_id":"62172280, U20B2051, 62172281","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1536681295","https://openalex.org/W1959190975","https://openalex.org/W1992808156","https://openalex.org/W1998279455","https://openalex.org/W2010380519","https://openalex.org/W2012711090","https://openalex.org/W2038658236","https://openalex.org/W2047305620","https://openalex.org/W2075965608","https://openalex.org/W2133062571","https://openalex.org/W2135459805","https://openalex.org/W2141420453","https://openalex.org/W2142181334","https://openalex.org/W2163868069","https://openalex.org/W2170269447","https://openalex.org/W2322525404","https://openalex.org/W2335243071","https://openalex.org/W2342152533","https://openalex.org/W2517494721","https://openalex.org/W2559403953","https://openalex.org/W2748251709","https://openalex.org/W2755498902","https://openalex.org/W2793696846","https://openalex.org/W2930064221","https://openalex.org/W2957293356","https://openalex.org/W2970097841","https://openalex.org/W2997759031","https://openalex.org/W3094904360"],"related_works":["https://openalex.org/W3098785088","https://openalex.org/W2350486768","https://openalex.org/W2164344703","https://openalex.org/W2401408573","https://openalex.org/W2026753506","https://openalex.org/W2032053269","https://openalex.org/W1574442789","https://openalex.org/W2088797375","https://openalex.org/W2158715187","https://openalex.org/W2573229646"],"abstract_inverted_index":{"Secret":[0],"sharing":[1,56,88,131],"refers":[2],"to":[3,126],"a":[4,8,17,37,85],"method":[5,39],"for":[6,40],"dividing":[7],"secret":[9,27,55,87,130],"into":[10,99],"several":[11],"shares":[12,23],"and":[13,54,63,109,120,132],"distributing":[14],"them":[15],"among":[16],"series":[18],"of":[19,106,129,144],"participants.":[20],"When":[21],"enough":[22],"are":[24,70,82,97],"received,":[25],"the":[26,49,74,91,94,104,117,122,127,142,145],"can":[28,115],"be":[29],"reconstructed":[30],"without":[31],"information":[32],"loss.":[33],"This":[34],"paper":[35],"proposes":[36],"new":[38],"reversible":[41],"data":[42],"hiding":[43],"in":[44,77],"encrypted":[45,72],"images":[46],"based":[47,102],"on":[48,103],"Chinese":[50],"remainder":[51],"theorem":[52],"(CRT)":[53],"strategy.":[57],"The":[58,112],"most":[59],"significant":[60,66],"bit":[61,67],"(MSB)":[62],"7":[64,79],"least":[65],"(LSB)":[68],"layers":[69,81],"separately":[71],"during":[73],"encryption":[75],"procedure,":[76],"which":[78],"LSB":[80],"scrambled":[83],"with":[84],"CRT":[86],"scheme.":[89],"During":[90],"embedding":[92],"phase,":[93],"additional":[95,123],"bits":[96,124],"embedded":[98],"each":[100],"share":[101],"strategies":[105],"MSB":[107,110],"flipping":[108],"substitution.":[111],"receiver":[113],"side":[114],"recover":[116],"original":[118],"image":[119],"extract":[121],"according":[125],"characteristics":[128],"strong":[133],"correlation":[134],"between":[135],"adjacent":[136],"pixels.":[137],"Experimental":[138],"results":[139],"have":[140],"demonstrated":[141],"effectiveness":[143],"proposed":[146],"method.":[147]},"counts_by_year":[{"year":2024,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
