{"id":"https://openalex.org/W3210189071","doi":"https://doi.org/10.3233/jifs-210862","title":"Robust image data hiding method based on multiple backups and pixel bit weight","display_name":"Robust image data hiding method based on multiple backups and pixel bit weight","publication_year":2021,"publication_date":"2021-10-29","ids":{"openalex":"https://openalex.org/W3210189071","doi":"https://doi.org/10.3233/jifs-210862","mag":"3210189071"},"language":"en","primary_location":{"id":"doi:10.3233/jifs-210862","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-210862","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102835232","display_name":"Dong Yu","orcid":"https://orcid.org/0000-0003-2874-5795"},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Dong","raw_affiliation_strings":["Guangxi Key Lab of Multi-Source Information Mining & Security, Guangxi Normal University, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Lab of Multi-Source Information Mining & Security, Guangxi Normal University, Guilin, China","institution_ids":["https://openalex.org/I29739308"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085013836","display_name":"Xianquan Zhang","orcid":"https://orcid.org/0000-0003-3359-117X"},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xianquan Zhang","raw_affiliation_strings":["Guangxi Key Lab of Multi-Source Information Mining & Security, Guangxi Normal University, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Lab of Multi-Source Information Mining & Security, Guangxi Normal University, Guilin, China","institution_ids":["https://openalex.org/I29739308"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020240117","display_name":"Chunqiang Yu","orcid":"https://orcid.org/0000-0002-7221-0168"},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chunqiang Yu","raw_affiliation_strings":["School of Computer Science and Information Technology, Guangxi Normal University, Guilin, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Information Technology, Guangxi Normal University, Guilin, China","institution_ids":["https://openalex.org/I29739308"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087798028","display_name":"Zhenjun Tang","orcid":"https://orcid.org/0000-0003-3664-1363"},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenjun Tang","raw_affiliation_strings":["Guangxi Key Lab of Multi-Source Information Mining & Security, Guangxi Normal University, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Lab of Multi-Source Information Mining & Security, Guangxi Normal University, Guilin, China","institution_ids":["https://openalex.org/I29739308"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5053171458","display_name":"Guoen Xia","orcid":"https://orcid.org/0000-0002-8191-4490"},"institutions":[{"id":"https://openalex.org/I163732180","display_name":"Guangxi University of Finance and Economics","ror":"https://ror.org/02ayg6516","country_code":"CN","type":"education","lineage":["https://openalex.org/I163732180"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guoen Xia","raw_affiliation_strings":["School of Business Administration, Guangxi University of Finance and Economics, Nanning, China"],"affiliations":[{"raw_affiliation_string":"School of Business Administration, Guangxi University of Finance and Economics, Nanning, China","institution_ids":["https://openalex.org/I163732180"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5020240117","https://openalex.org/A5085013836"],"corresponding_institution_ids":["https://openalex.org/I29739308"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14120915,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"41","issue":"6","first_page":"6935","last_page":"6948"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.7788822650909424},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.6570071578025818},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6309491991996765},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5738626718521118},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.49959778785705566},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4654477536678314},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.4521399736404419},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.4474652409553528},{"id":"https://openalex.org/keywords/image-quality","display_name":"Image quality","score":0.4423290193080902},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.4342792332172394},{"id":"https://openalex.org/keywords/data-transmission","display_name":"Data transmission","score":0.4129106402397156},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11460867524147034},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.09467345476150513}],"concepts":[{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.7788822650909424},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.6570071578025818},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6309491991996765},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5738626718521118},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.49959778785705566},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4654477536678314},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.4521399736404419},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.4474652409553528},{"id":"https://openalex.org/C55020928","wikidata":"https://www.wikidata.org/wiki/Q3813865","display_name":"Image quality","level":3,"score":0.4423290193080902},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4342792332172394},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.4129106402397156},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11460867524147034},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.09467345476150513},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jifs-210862","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-210862","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W2022434232","https://openalex.org/W2048842493","https://openalex.org/W2068142860","https://openalex.org/W2086665685","https://openalex.org/W2118296934","https://openalex.org/W2135459805","https://openalex.org/W2142181334","https://openalex.org/W2179616877","https://openalex.org/W2183964636","https://openalex.org/W2520594535","https://openalex.org/W2547937061","https://openalex.org/W2557301023","https://openalex.org/W2611320059","https://openalex.org/W2726476877","https://openalex.org/W2783181623","https://openalex.org/W2884179402","https://openalex.org/W2890307189","https://openalex.org/W2898531670","https://openalex.org/W2898784076","https://openalex.org/W2901329636","https://openalex.org/W2903126033","https://openalex.org/W2953461088","https://openalex.org/W2966474122","https://openalex.org/W2969448873","https://openalex.org/W2990789364","https://openalex.org/W3011858052","https://openalex.org/W3033361357","https://openalex.org/W3045565924","https://openalex.org/W3093035972","https://openalex.org/W3105698493","https://openalex.org/W3146660591","https://openalex.org/W3181370845","https://openalex.org/W6766520796","https://openalex.org/W6798490562"],"related_works":["https://openalex.org/W2170577885","https://openalex.org/W2351909370","https://openalex.org/W2187037044","https://openalex.org/W623607250","https://openalex.org/W4245429118","https://openalex.org/W4245505501","https://openalex.org/W4285411112","https://openalex.org/W2921334381","https://openalex.org/W4255529442","https://openalex.org/W2974782078"],"abstract_inverted_index":{"Digital":[0],"images":[1],"are":[2,50,93],"easily":[3],"corrupted":[4],"by":[5,95],"attacks":[6,129],"during":[7],"transmission":[8],"and":[9,19,38,127],"most":[10,69],"data":[11,31],"hiding":[12,32],"methods":[13],"have":[14,65],"limitations":[15],"in":[16],"resisting":[17],"cropping":[18,126],"noise":[20,128],"attacks.":[21],"Aiming":[22],"at":[23],"this":[24],"problem,":[25],"we":[26],"propose":[27],"a":[28,53,58],"robust":[29,124],"image":[30,55,79,112],"method":[33],"based":[34],"on":[35,76],"multiple":[36,44],"backups":[37,45,90,101],"pixel":[39,48,63],"bit":[40,49],"weight":[41],"(PBW).":[42],"Especially":[43],"of":[46,82,91,102,108],"every":[47],"pre-embedded":[51],"into":[52],"cover":[54],"according":[56],"to":[57,98,125],"reference":[59],"matrix.":[60],"Since":[61],"different":[62,66],"bits":[64,71,86],"weights,":[67],"the":[68,77,83,96,100,106,109,120],"significant":[70,85],"(MSBs)":[72],"occupy":[73],"more":[74],"weights":[75],"secret":[78,111,131],"than":[80],"those":[81],"least":[84],"(LSBs).":[87],"Accordingly,":[88],"some":[89],"LSBs":[92],"substituted":[94],"MSBs":[97,103],"increase":[99],"so":[104],"that":[105,119],"quality":[107],"extracted":[110],"can":[113],"be":[114],"improved.":[115],"Experimental":[116],"results":[117],"show":[118],"proposed":[121],"algorithm":[122],"is":[123],"for":[130],"image.":[132]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
