{"id":"https://openalex.org/W4396670617","doi":"https://doi.org/10.3103/s0146411624700111","title":"Study on Applications of Reversible Information Hiding Algorithms Based on Discrete Cosine Transform Coefficient and Frequency Band Selection in JPEG Image Encryption","display_name":"Study on Applications of Reversible Information Hiding Algorithms Based on Discrete Cosine Transform Coefficient and Frequency Band Selection in JPEG Image Encryption","publication_year":2024,"publication_date":"2024-04-01","ids":{"openalex":"https://openalex.org/W4396670617","doi":"https://doi.org/10.3103/s0146411624700111"},"language":"en","primary_location":{"id":"doi:10.3103/s0146411624700111","is_oa":false,"landing_page_url":"https://doi.org/10.3103/s0146411624700111","pdf_url":null,"source":{"id":"https://openalex.org/S17203304","display_name":"Automatic Control and Computer Sciences","issn_l":"0146-4116","issn":["0146-4116","1558-108X"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320267","host_organization_name":"Pleiades Publishing","host_organization_lineage":["https://openalex.org/P4310320267","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Pleiades Publishing","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Automatic Control and Computer Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101348852","display_name":"Yingwei Gao","orcid":null},"institutions":[{"id":"https://openalex.org/I49232843","display_name":"Changchun University","ror":"https://ror.org/02an57k10","country_code":"CN","type":"education","lineage":["https://openalex.org/I49232843"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yingwei Gao","raw_affiliation_strings":["Changchun University of Architecture and Civil Engineering, 130000, Changchun, Jilin, China"],"affiliations":[{"raw_affiliation_string":"Changchun University of Architecture and Civil Engineering, 130000, Changchun, Jilin, China","institution_ids":["https://openalex.org/I49232843"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5101348852"],"corresponding_institution_ids":["https://openalex.org/I49232843"],"apc_list":null,"apc_paid":null,"fwci":1.0526,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.76581301,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"58","issue":"2","first_page":"216","last_page":"225"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.8867160081863403},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8090967535972595},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7354613542556763},{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.6448148488998413},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.6293611526489258},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.6067728996276855},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5275715589523315},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.5063730478286743},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.34972161054611206},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3012681007385254},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.27759191393852234},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10407716035842896}],"concepts":[{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.8867160081863403},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8090967535972595},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7354613542556763},{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.6448148488998413},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.6293611526489258},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.6067728996276855},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5275715589523315},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.5063730478286743},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34972161054611206},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3012681007385254},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.27759191393852234},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10407716035842896}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3103/s0146411624700111","is_oa":false,"landing_page_url":"https://doi.org/10.3103/s0146411624700111","pdf_url":null,"source":{"id":"https://openalex.org/S17203304","display_name":"Automatic Control and Computer Sciences","issn_l":"0146-4116","issn":["0146-4116","1558-108X"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320267","host_organization_name":"Pleiades Publishing","host_organization_lineage":["https://openalex.org/P4310320267","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Pleiades Publishing","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Automatic Control and Computer Sciences","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W2121393355","https://openalex.org/W2509384312","https://openalex.org/W2615159348","https://openalex.org/W2796283641","https://openalex.org/W2799283557","https://openalex.org/W2804131985","https://openalex.org/W2810150785","https://openalex.org/W2891268902","https://openalex.org/W2916747619","https://openalex.org/W2987142995","https://openalex.org/W2989416700","https://openalex.org/W3127099941","https://openalex.org/W3127162547","https://openalex.org/W3136501075","https://openalex.org/W3158777168","https://openalex.org/W3184608111","https://openalex.org/W3188582854","https://openalex.org/W3200589602","https://openalex.org/W3201130888","https://openalex.org/W3214912493","https://openalex.org/W4206370032","https://openalex.org/W4282583570","https://openalex.org/W4312371643"],"related_works":["https://openalex.org/W1597187555","https://openalex.org/W2614249221","https://openalex.org/W2997133669","https://openalex.org/W3127228990","https://openalex.org/W2108294500","https://openalex.org/W2301878849","https://openalex.org/W1975188435","https://openalex.org/W2158017498","https://openalex.org/W2054082132","https://openalex.org/W3101977789"],"abstract_inverted_index":{"With":[0],"the":[1,58,66,109,112,116,128,131],"development":[2],"of":[3,80,115,130],"digital":[4],"media,":[5],"its":[6],"security":[7],"has":[8,18],"also":[9,123],"been":[10,19],"emphasized,":[11],"and":[12,54,99,141],"reversible":[13],"data":[14,117],"hiding":[15],"(RDH)":[16],"algorithms":[17,26],"widely":[20],"studied.":[21],"This":[22],"paper":[23],"studied":[24],"RDH":[25,51,68],"for":[27],"JPEG":[28,135],"images,":[29,136],"designed":[30,67],"a":[31,71,92,100],"method":[32],"to":[33],"embed":[34],"secret":[35],"information":[36],"by":[37,119],"frequency":[38],"band":[39],"selection":[40],"based":[41],"on":[42,57,134],"discrete":[43],"cosine":[44],"transform":[45],"(DCT)":[46],"coefficients,":[47],"called":[48],"an":[49,76],"improved":[50],"(IRDH)":[52],"algorithm,":[53],"conducted":[55],"experiments":[56],"USC-SIPI":[59],"image":[60],"set.":[61],"It":[62],"was":[63,122],"found":[64],"that":[65],"algorithm":[69,121,133],"had":[70],"higher":[72,93],"embedding":[73,78],"capacity,":[74],"with":[75,108],"average":[77],"capacity":[79],"37":[81],"031":[82],"bits":[83],"at":[84],"quantization":[85],"factor":[86],"=":[87],"50,":[88],"as":[89,91],"well":[90],"peak":[94],"signal-to-noise":[95],"ratio":[96],"(PSNR)":[97],"value":[98],"lower":[101],"file":[102],"size":[103],"increase":[104],"(FSI)":[105],"value,":[106],"compared":[107],"other":[110],"methods;":[111],"dispersion":[113],"degree":[114],"obtained":[118],"this":[120],"low.":[124],"The":[125],"results":[126],"demonstrate":[127],"reliability":[129],"IRDH":[132],"which":[137],"can":[138],"be":[139],"extended":[140],"applied":[142],"in":[143],"practice.":[144]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
