{"id":"https://openalex.org/W4410832063","doi":"https://doi.org/10.32604/cmc.2025.064370","title":"Interpolation-Based Reversible Data Hiding in Encrypted Audio with Scalable Embedding Capacity","display_name":"Interpolation-Based Reversible Data Hiding in Encrypted Audio with Scalable Embedding Capacity","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4410832063","doi":"https://doi.org/10.32604/cmc.2025.064370"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.064370","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.064370","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.064370","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075384959","display_name":"Yuan\u2010Yu Tsai","orcid":"https://orcid.org/0000-0001-7904-8637"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yuan-Yu Tsai","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018067595","display_name":"Alfrindo Lin","orcid":"https://orcid.org/0009-0003-6715-7328"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Alfrindo Lin","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Wen-Ting Jao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wen-Ting Jao","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5057367477","display_name":"Yihui Chen","orcid":"https://orcid.org/0000-0003-2858-5170"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yi-Hui Chen","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5075384959"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.09522798,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"84","issue":"1","first_page":"681","last_page":"697"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.7216554880142212},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6727582216262817},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.6443229913711548},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6338483691215515},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5772193670272827},{"id":"https://openalex.org/keywords/interpolation","display_name":"Interpolation (computer graphics)","score":0.5530230402946472},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.3234260082244873},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2704375386238098},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2219308316707611},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.1184338927268982},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.07373043894767761}],"concepts":[{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.7216554880142212},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6727582216262817},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.6443229913711548},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6338483691215515},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5772193670272827},{"id":"https://openalex.org/C137800194","wikidata":"https://www.wikidata.org/wiki/Q11713455","display_name":"Interpolation (computer graphics)","level":3,"score":0.5530230402946472},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.3234260082244873},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2704375386238098},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2219308316707611},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.1184338927268982},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.07373043894767761}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.064370","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.064370","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.064370","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.064370","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2969448873","https://openalex.org/W3010339564","https://openalex.org/W3049735580","https://openalex.org/W3126880801","https://openalex.org/W3135559657","https://openalex.org/W3157396754","https://openalex.org/W3213054154","https://openalex.org/W4224297622","https://openalex.org/W4285210134","https://openalex.org/W4294691636","https://openalex.org/W4312204579","https://openalex.org/W4317796327","https://openalex.org/W4383315191","https://openalex.org/W4383682448","https://openalex.org/W4405965359","https://openalex.org/W4406892599"],"related_works":["https://openalex.org/W2170577885","https://openalex.org/W2081900870","https://openalex.org/W3190769222","https://openalex.org/W3127228990","https://openalex.org/W2301878849","https://openalex.org/W2054082132","https://openalex.org/W2769668853","https://openalex.org/W3101977789","https://openalex.org/W2184946989","https://openalex.org/W32138105"],"abstract_inverted_index":{"With":[0],"the":[1,36,53,71,113,141,171],"rapid":[2],"expansion":[3],"of":[4,35,56,185],"multimedia":[5,29],"data,":[6],"protecting":[7],"digital":[8],"information":[9,24,50],"has":[10],"become":[11],"increasingly":[12],"critical.":[13],"Reversible":[14],"data":[15,38,62,75,87,192,205],"hiding":[16,88,193,206],"offers":[17],"an":[18],"effective":[19],"solution":[20],"by":[21,197],"allowing":[22],"sensitive":[23],"to":[25,70,128,145,148],"be":[26],"embedded":[27],"in":[28,46,63,194],"files":[30],"while":[31,109,164],"enabling":[32],"full":[33,166],"recovery":[34],"original":[37,186],"after":[39],"extraction.":[40],"Audio,":[41],"as":[42,58],"a":[43,83,199],"vital":[44],"medium":[45],"communication,":[47],"entertainment,":[48],"and":[49,77,125,131,182,202],"sharing,":[51],"demands":[52],"same":[54],"level":[55],"security":[57],"images.":[59],"However,":[60],"embedding":[61,78,96,104,132,162,180],"encrypted":[64,91,195],"audio":[65,92,138,196],"poses":[66],"unique":[67],"challenges":[68],"due":[69],"trade-offs":[72],"between":[73],"security,":[74],"integrity,":[76],"capacity.":[79,97],"This":[80,188],"paper":[81],"presents":[82],"novel":[84],"interpolation-based":[85],"reversible":[86,191,204],"algorithm":[89],"for":[90,160,174],"that":[93,177],"achieves":[94],"scalable":[95],"By":[98],"increasing":[99],"sample":[100,152,158],"density":[101],"through":[102],"interpolation,":[103],"opportunities":[105],"are":[106],"significantly":[107],"enhanced":[108],"maintaining":[110],"encryption":[111],"throughout":[112],"process.":[114],"The":[115],"method":[116],"further":[117],"integrates":[118],"multiple":[119],"most":[120],"significant":[121],"bit":[122],"(multi-MSB)":[123],"prediction":[124],"Huffman":[126],"coding":[127],"optimize":[129],"compression":[130],"efficiency.":[133],"Experimental":[134],"results":[135,169],"on":[136],"standard":[137],"datasets":[139],"demonstrate":[140],"proposed":[142],"algorithm\u2019s":[143],"ability":[144],"embed":[146],"up":[147],"12.47":[149],"bits":[150,156],"per":[151,157],"with":[153],"over":[154],"9.26":[155],"available":[159],"pure":[161],"capacity,":[163],"preserving":[165],"reversibility.":[167],"These":[168],"confirm":[170],"method\u2019s":[172],"suitability":[173],"secure":[175],"applications":[176],"demand":[178],"high":[179],"capacity":[181],"perfect":[183],"reconstruction":[184],"audio.":[187],"work":[189],"advances":[190],"offering":[198],"secure,":[200],"efficient,":[201],"fully":[203],"framework.":[207]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
