{"id":"https://openalex.org/W4387187506","doi":"https://doi.org/10.3390/cryptography7040047","title":"Hiding Full-Color Images into Audio with Visual Enhancement via Residual Networks","display_name":"Hiding Full-Color Images into Audio with Visual Enhancement via Residual Networks","publication_year":2023,"publication_date":"2023-09-29","ids":{"openalex":"https://openalex.org/W4387187506","doi":"https://doi.org/10.3390/cryptography7040047"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography7040047","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography7040047","pdf_url":"https://www.mdpi.com/2410-387X/7/4/47/pdf?version=1695984498","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/7/4/47/pdf?version=1695984498","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041423805","display_name":"Hwai-Tsu Hu","orcid":"https://orcid.org/0000-0001-6519-7535"},"institutions":[{"id":"https://openalex.org/I75430998","display_name":"National Ilan University","ror":"https://ror.org/01npf0s58","country_code":"TW","type":"education","lineage":["https://openalex.org/I75430998"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Hwai-Tsu Hu","raw_affiliation_strings":["Department of Electronic Engineering, National I-Lan University, No. 1, Sec. 1, Shen-Lung Road, I-Lan 26047, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering, National I-Lan University, No. 1, Sec. 1, Shen-Lung Road, I-Lan 26047, Taiwan","institution_ids":["https://openalex.org/I75430998"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072278548","display_name":"Tung-Tsun Lee","orcid":null},"institutions":[{"id":"https://openalex.org/I75430998","display_name":"National Ilan University","ror":"https://ror.org/01npf0s58","country_code":"TW","type":"education","lineage":["https://openalex.org/I75430998"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Tung-Tsun Lee","raw_affiliation_strings":["Department of Electronic Engineering, National I-Lan University, No. 1, Sec. 1, Shen-Lung Road, I-Lan 26047, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering, National I-Lan University, No. 1, Sec. 1, Shen-Lung Road, I-Lan 26047, Taiwan","institution_ids":["https://openalex.org/I75430998"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5041423805"],"corresponding_institution_ids":["https://openalex.org/I75430998"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1195236,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"7","issue":"4","first_page":"47","last_page":"47"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7631471157073975},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.6726793050765991},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.6443119049072266},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6380881071090698},{"id":"https://openalex.org/keywords/residual","display_name":"Residual","score":0.6377852559089661},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.5790113210678101},{"id":"https://openalex.org/keywords/fast-fourier-transform","display_name":"Fast Fourier transform","score":0.5056369304656982},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4938126504421234},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.4602254033088684},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.4506141245365143},{"id":"https://openalex.org/keywords/rendering","display_name":"Rendering (computer graphics)","score":0.4278327524662018},{"id":"https://openalex.org/keywords/audio-signal","display_name":"Audio signal","score":0.42426547408103943},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.2653268873691559},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.22121644020080566},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.15861231088638306}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7631471157073975},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.6726793050765991},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.6443119049072266},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6380881071090698},{"id":"https://openalex.org/C155512373","wikidata":"https://www.wikidata.org/wiki/Q287450","display_name":"Residual","level":2,"score":0.6377852559089661},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.5790113210678101},{"id":"https://openalex.org/C75172450","wikidata":"https://www.wikidata.org/wiki/Q623950","display_name":"Fast Fourier transform","level":2,"score":0.5056369304656982},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4938126504421234},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4602254033088684},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.4506141245365143},{"id":"https://openalex.org/C205711294","wikidata":"https://www.wikidata.org/wiki/Q176953","display_name":"Rendering (computer graphics)","level":2,"score":0.4278327524662018},{"id":"https://openalex.org/C64922751","wikidata":"https://www.wikidata.org/wiki/Q4650799","display_name":"Audio signal","level":3,"score":0.42426547408103943},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.2653268873691559},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.22121644020080566},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.15861231088638306},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C13895895","wikidata":"https://www.wikidata.org/wiki/Q3270773","display_name":"Speech coding","level":2,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/cryptography7040047","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography7040047","pdf_url":"https://www.mdpi.com/2410-387X/7/4/47/pdf?version=1695984498","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:f9b4b6bee1ad471e82845bb258800696","is_oa":true,"landing_page_url":"https://doaj.org/article/f9b4b6bee1ad471e82845bb258800696","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 7, Iss 4, p 47 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography7040047","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography7040047","pdf_url":"https://www.mdpi.com/2410-387X/7/4/47/pdf?version=1695984498","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.41999998688697815,"id":"https://metadata.un.org/sdg/6","display_name":"Clean water and sanitation"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320331164","display_name":"National Science and Technology Council","ror":"https://ror.org/00wnb9798"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4387187506.pdf"},"referenced_works_count":34,"referenced_works":["https://openalex.org/W303104172","https://openalex.org/W1519471955","https://openalex.org/W1983457661","https://openalex.org/W1997697582","https://openalex.org/W1997769112","https://openalex.org/W2002661019","https://openalex.org/W2007598214","https://openalex.org/W2017300999","https://openalex.org/W2028332863","https://openalex.org/W2041007040","https://openalex.org/W2041750608","https://openalex.org/W2059193620","https://openalex.org/W2075204418","https://openalex.org/W2078974441","https://openalex.org/W2100268427","https://openalex.org/W2107465879","https://openalex.org/W2111233756","https://openalex.org/W2112589306","https://openalex.org/W2116467012","https://openalex.org/W2134069026","https://openalex.org/W2151583613","https://openalex.org/W2158322233","https://openalex.org/W2165468259","https://openalex.org/W2339254090","https://openalex.org/W2601269736","https://openalex.org/W2895598217","https://openalex.org/W2908662409","https://openalex.org/W2938386730","https://openalex.org/W2963470893","https://openalex.org/W4207073889","https://openalex.org/W4242937953","https://openalex.org/W4254812591","https://openalex.org/W6735905348","https://openalex.org/W6761784800"],"related_works":["https://openalex.org/W2355816198","https://openalex.org/W1966570904","https://openalex.org/W1997302683","https://openalex.org/W2533496217","https://openalex.org/W1989201844","https://openalex.org/W2939547256","https://openalex.org/W2477380541","https://openalex.org/W2015857425","https://openalex.org/W2791919795","https://openalex.org/W2481039866"],"abstract_inverted_index":{"Watermarking":[0],"is":[1],"a":[2,35,51,59],"viable":[3],"approach":[4],"for":[5],"safeguarding":[6],"the":[7,47,77,86,101,109,115,128,132,151,156,176],"proprietary":[8],"rights":[9],"of":[10,38,62,71,79,131,155,170],"digital":[11],"media.":[12],"This":[13],"study":[14],"introduces":[15],"an":[16,68],"innovative":[17],"fast":[18],"Fourier":[19],"transform":[20,88],"(FFT)-based":[21],"phase":[22],"modulation":[23],"(PM)":[24],"scheme":[25,104,117],"that":[26,100],"facilitates":[27],"efficient":[28],"and":[29,97,146],"effective":[30],"blind":[31],"audio":[32,69],"watermarking":[33],"at":[34],"remarkable":[36],"rate":[37],"508.85":[39],"numeric":[40],"values":[41],"per":[42],"second":[43],"while":[44],"still":[45],"retaining":[46],"original":[48],"quality.":[49],"Such":[50],"payload":[52],"capacity":[53],"makes":[54],"it":[55],"possible":[56],"to":[57,142,160],"embed":[58],"full-color":[60],"image":[61,144],"64":[63,65],"\u00d7":[64],"pixels":[66],"within":[67],"signal":[70],"just":[72],"24.15":[73],"s.":[74],"To":[75,125],"bolster":[76],"security":[78],"watermark":[80,111],"images,":[81],"we":[82,136],"have":[83],"also":[84],"implemented":[85],"Arnold":[87],"in":[89,163,167,173],"conjunction":[90],"with":[91],"chaotic":[92],"encryption.":[93],"Our":[94],"comprehensive":[95],"analysis":[96],"evaluation":[98],"confirm":[99],"proposed":[102],"FFT\u2013PM":[103,116],"exhibits":[105],"exceptional":[106],"imperceptibility,":[107],"rendering":[108],"hidden":[110],"virtually":[112],"undetectable.":[113],"Additionally,":[114],"shows":[118],"impressive":[119],"robustness":[120],"against":[121],"common":[122],"signal-processing":[123],"attacks.":[124],"further":[126],"enhance":[127],"visual":[129],"rendition":[130],"recovered":[133],"color":[134],"watermarks,":[135],"propose":[137],"using":[138],"residual":[139,157],"neural":[140],"networks":[141,158],"perform":[143],"denoising":[145],"super-resolution":[147],"reconstruction":[148],"after":[149],"retrieving":[150],"watermarks.":[152],"The":[153],"utilization":[154],"contributes":[159],"noticeable":[161],"improvements":[162],"perceptual":[164],"quality,":[165],"resulting":[166],"higher":[168],"levels":[169],"zero-normalized":[171],"cross-correlation":[172],"cases":[174],"where":[175],"watermarks":[177],"are":[178],"severely":[179],"damaged.":[180]},"counts_by_year":[],"updated_date":"2026-02-28T09:26:25.869077","created_date":"2025-10-10T00:00:00"}
