{"id":"https://openalex.org/W2969627706","doi":"https://doi.org/10.3390/cryptography3030021","title":"Reversible Data Hiding for DICOM Image Using Lifting and Companding","display_name":"Reversible Data Hiding for DICOM Image Using Lifting and Companding","publication_year":2019,"publication_date":"2019-08-19","ids":{"openalex":"https://openalex.org/W2969627706","doi":"https://doi.org/10.3390/cryptography3030021","mag":"2969627706"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography3030021","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography3030021","pdf_url":"https://www.mdpi.com/2410-387X/3/3/21/pdf?version=1566215069","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/3/3/21/pdf?version=1566215069","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036265250","display_name":"Amit Phadikar","orcid":"https://orcid.org/0000-0003-2430-5848"},"institutions":[{"id":"https://openalex.org/I98365261","display_name":"Indian Institute of Engineering Science and Technology, Shibpur","ror":"https://ror.org/02ytfzr55","country_code":"IN","type":"education","lineage":["https://openalex.org/I98365261"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Amit Phadikar","raw_affiliation_strings":["Department of Information Technology, MCKV Institute of Engineering, Liluah, Howrah 711204, India"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, MCKV Institute of Engineering, Liluah, Howrah 711204, India","institution_ids":["https://openalex.org/I98365261"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061334088","display_name":"Poulami Jana","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Poulami Jana","raw_affiliation_strings":["Department of Electronics &amp; Telecommunication Engineering, Bengal Institute of Polytechnic, Birbhum 731124, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics &amp; Telecommunication Engineering, Bengal Institute of Polytechnic, Birbhum 731124, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051105321","display_name":"Himadri Mandal","orcid":null},"institutions":[{"id":"https://openalex.org/I106542073","display_name":"University of Calcutta","ror":"https://ror.org/01e7v7w47","country_code":"IN","type":"education","lineage":["https://openalex.org/I106542073"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Himadri Mandal","raw_affiliation_strings":["Department of Electronics and Communication Engineering, Calcutta Institute of Technology, Uluberia, Howrah 711316, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Communication Engineering, Calcutta Institute of Technology, Uluberia, Howrah 711316, India","institution_ids":["https://openalex.org/I106542073"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5036265250"],"corresponding_institution_ids":["https://openalex.org/I98365261"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.4049,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.65131621,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"3","issue":"3","first_page":"21","last_page":"21"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/companding","display_name":"Companding","score":0.8873790502548218},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.8468974828720093},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.761215329170227},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7162153124809265},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.6873669028282166},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.6320220232009888},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.6057837605476379},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5715622901916504},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.507736086845398},{"id":"https://openalex.org/keywords/fidelity","display_name":"Fidelity","score":0.5021886825561523},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4918043911457062},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.4627734422683716},{"id":"https://openalex.org/keywords/high-fidelity","display_name":"High fidelity","score":0.4595870077610016},{"id":"https://openalex.org/keywords/discrete-wavelet-transform","display_name":"Discrete wavelet transform","score":0.45552265644073486},{"id":"https://openalex.org/keywords/wavelet","display_name":"Wavelet","score":0.3553747534751892},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.34433987736701965},{"id":"https://openalex.org/keywords/wavelet-transform","display_name":"Wavelet transform","score":0.3373870849609375},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.11630991101264954},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08403518795967102},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.07837039232254028}],"concepts":[{"id":"https://openalex.org/C104250799","wikidata":"https://www.wikidata.org/wiki/Q1780765","display_name":"Companding","level":4,"score":0.8873790502548218},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.8468974828720093},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.761215329170227},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7162153124809265},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.6873669028282166},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.6320220232009888},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.6057837605476379},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5715622901916504},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.507736086845398},{"id":"https://openalex.org/C2776459999","wikidata":"https://www.wikidata.org/wiki/Q2119376","display_name":"Fidelity","level":2,"score":0.5021886825561523},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4918043911457062},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4627734422683716},{"id":"https://openalex.org/C113364801","wikidata":"https://www.wikidata.org/wiki/Q26674","display_name":"High fidelity","level":2,"score":0.4595870077610016},{"id":"https://openalex.org/C46286280","wikidata":"https://www.wikidata.org/wiki/Q2414958","display_name":"Discrete wavelet transform","level":4,"score":0.45552265644073486},{"id":"https://openalex.org/C47432892","wikidata":"https://www.wikidata.org/wiki/Q831390","display_name":"Wavelet","level":2,"score":0.3553747534751892},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34433987736701965},{"id":"https://openalex.org/C196216189","wikidata":"https://www.wikidata.org/wiki/Q2867","display_name":"Wavelet transform","level":3,"score":0.3373870849609375},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.11630991101264954},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08403518795967102},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.07837039232254028},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C40409654","wikidata":"https://www.wikidata.org/wiki/Q375889","display_name":"Orthogonal frequency-division multiplexing","level":3,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3390/cryptography3030021","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography3030021","pdf_url":"https://www.mdpi.com/2410-387X/3/3/21/pdf?version=1566215069","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:2b9920dc592d4ebe9fadbe50287b0f1a","is_oa":true,"landing_page_url":"https://doaj.org/article/2b9920dc592d4ebe9fadbe50287b0f1a","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 3, Iss 3, p 21 (2019)","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/2410-387X/3/3/21/","is_oa":true,"landing_page_url":"http://doi.org/10.3390/cryptography3030021","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/cryptography3030021","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography3030021","pdf_url":"https://www.mdpi.com/2410-387X/3/3/21/pdf?version=1566215069","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2969627706.pdf","grobid_xml":"https://content.openalex.org/works/W2969627706.grobid-xml"},"referenced_works_count":37,"referenced_works":["https://openalex.org/W1483716139","https://openalex.org/W1570710652","https://openalex.org/W1945093115","https://openalex.org/W1981925483","https://openalex.org/W1991874044","https://openalex.org/W1993025711","https://openalex.org/W2001003259","https://openalex.org/W2006378352","https://openalex.org/W2022725284","https://openalex.org/W2034362843","https://openalex.org/W2049043878","https://openalex.org/W2058405568","https://openalex.org/W2062313593","https://openalex.org/W2076357705","https://openalex.org/W2081226718","https://openalex.org/W2097528406","https://openalex.org/W2102740494","https://openalex.org/W2104403159","https://openalex.org/W2106366262","https://openalex.org/W2106950225","https://openalex.org/W2123629501","https://openalex.org/W2133665775","https://openalex.org/W2135459805","https://openalex.org/W2144088652","https://openalex.org/W2150490197","https://openalex.org/W2151092698","https://openalex.org/W2152953137","https://openalex.org/W2296173415","https://openalex.org/W2537221517","https://openalex.org/W2773348626","https://openalex.org/W2802728270","https://openalex.org/W2889049822","https://openalex.org/W2908539050","https://openalex.org/W2909044500","https://openalex.org/W2924553066","https://openalex.org/W4291984517","https://openalex.org/W6676011590"],"related_works":["https://openalex.org/W2141622453","https://openalex.org/W4297832041","https://openalex.org/W2034069800","https://openalex.org/W2366114306","https://openalex.org/W2942289697","https://openalex.org/W3045162464","https://openalex.org/W3088751013","https://openalex.org/W2393160270","https://openalex.org/W2348009770","https://openalex.org/W2356585997"],"abstract_inverted_index":{"In":[0,49],"this":[1,104],"work,":[2],"a":[3,68],"reversible":[4,101],"watermarking":[5,102],"technique":[6,55],"is":[7,33,56,72,87,134],"proposed":[8,100,132],"for":[9],"DICOM":[10],"(Digital":[11],"Imaging":[12],"and":[13,25,83,139],"Communications":[14],"in":[15,41,74,113],"Medicine)":[16],"image":[17,116],"that":[18,117],"offers":[19],"high":[20,122],"embedding":[21,36,51],"capacity":[22],"(payload),":[23],"security":[24],"fidelity":[26,123],"of":[27,124,130],"the":[28,50,53,60,65,78,91,110,114,125,131],"watermarked":[29,126],"image.":[30,127],"The":[31,128],"goal":[32],"achieved":[34],"by":[35,136],"watermark":[37,86],"based":[38,43],"on":[39],"companding":[40,54,75],"lifting":[42],"discrete":[44],"wavelet":[45],"transform":[46],"(DWT)":[47],"domain.":[48],"process,":[52],"used":[57,73,88],"to":[58,76,81,89,94,120],"increase":[59],"data":[61],"hiding":[62],"capacity.":[63],"On":[64],"other":[66,144],"hand,":[67],"simple":[69],"linear":[70],"function":[71],"make":[77,90],"scheme":[79,92,133],"easy":[80],"implement,":[82],"content":[84],"dependant":[85],"robust":[93],"collusion":[95],"operation.":[96],"Moreover,":[97],"unlike":[98],"previously":[99],"techniques,":[103],"novel":[105],"approach":[106],"does":[107],"not":[108],"embed":[109],"location":[111],"map":[112],"host":[115],"ultimately":[118],"helps":[119],"achieve":[121],"advantage":[129],"demonstrated":[135],"simulation":[137],"results":[138],"also":[140],"compared":[141],"with":[142],"selected":[143],"related":[145],"schemes.":[146]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
