{"id":"https://openalex.org/W4391104320","doi":"https://doi.org/10.3390/fi16010034","title":"An Innovative Information Hiding Scheme Based on Block-Wise Pixel Reordering","display_name":"An Innovative Information Hiding Scheme Based on Block-Wise Pixel Reordering","publication_year":2024,"publication_date":"2024-01-22","ids":{"openalex":"https://openalex.org/W4391104320","doi":"https://doi.org/10.3390/fi16010034"},"language":"en","primary_location":{"id":"doi:10.3390/fi16010034","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi16010034","pdf_url":"https://www.mdpi.com/1999-5903/16/1/34/pdf?version=1705914933","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1999-5903/16/1/34/pdf?version=1705914933","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068137632","display_name":"Jui\u2010Chuan Liu","orcid":"https://orcid.org/0009-0007-3401-8742"},"institutions":[{"id":"https://openalex.org/I4880106","display_name":"Feng Chia University","ror":"https://ror.org/05vhczg54","country_code":"TW","type":"education","lineage":["https://openalex.org/I4880106"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Jui-Chuan Liu","raw_affiliation_strings":["Department of Information Engineering and Computer Science, Feng Chia University, Taichung 40724, Taiwan"],"raw_orcid":"https://orcid.org/0009-0007-3401-8742","affiliations":[{"raw_affiliation_string":"Department of Information Engineering and Computer Science, Feng Chia University, Taichung 40724, Taiwan","institution_ids":["https://openalex.org/I4880106"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053926000","display_name":"Heng-Xiao Chi","orcid":"https://orcid.org/0000-0002-7780-8468"},"institutions":[{"id":"https://openalex.org/I4880106","display_name":"Feng Chia University","ror":"https://ror.org/05vhczg54","country_code":"TW","type":"education","lineage":["https://openalex.org/I4880106"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Heng-Xiao Chi","raw_affiliation_strings":["Department of Information Engineering and Computer Science, Feng Chia University, Taichung 40724, Taiwan"],"raw_orcid":"https://orcid.org/0000-0002-7780-8468","affiliations":[{"raw_affiliation_string":"Department of Information Engineering and Computer Science, Feng Chia University, Taichung 40724, Taiwan","institution_ids":["https://openalex.org/I4880106"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014271344","display_name":"Ching\u2010Chun Chang","orcid":"https://orcid.org/0000-0001-7723-4591"},"institutions":[{"id":"https://openalex.org/I4880106","display_name":"Feng Chia University","ror":"https://ror.org/05vhczg54","country_code":"TW","type":"education","lineage":["https://openalex.org/I4880106"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Ching-Chun Chang","raw_affiliation_strings":["Department of Information Engineering and Computer Science, Feng Chia University, Taichung 40724, Taiwan","Information and Communication Security Research Center, Feng Chia University, Taichung 40724, Taiwan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information Engineering and Computer Science, Feng Chia University, Taichung 40724, Taiwan","institution_ids":["https://openalex.org/I4880106"]},{"raw_affiliation_string":"Information and Communication Security Research Center, Feng Chia University, Taichung 40724, Taiwan","institution_ids":["https://openalex.org/I4880106"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038550838","display_name":"Chin\u2010Chen Chang","orcid":"https://orcid.org/0000-0002-7319-5780"},"institutions":[{"id":"https://openalex.org/I4880106","display_name":"Feng Chia University","ror":"https://ror.org/05vhczg54","country_code":"TW","type":"education","lineage":["https://openalex.org/I4880106"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Ching-Chun Chang","raw_affiliation_strings":["Department of Information Engineering and Computer Science, Feng Chia University, Taichung 40724, Taiwan","Information and Communication Security Research Center, Feng Chia University, Taichung 40724, Taiwan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information Engineering and Computer Science, Feng Chia University, Taichung 40724, Taiwan","institution_ids":["https://openalex.org/I4880106"]},{"raw_affiliation_string":"Information and Communication Security Research Center, Feng Chia University, Taichung 40724, Taiwan","institution_ids":["https://openalex.org/I4880106"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Chin-Chen Chang","orcid":"https://orcid.org/0000-0002-7319-5780"},"institutions":[{"id":"https://openalex.org/I4880106","display_name":"Feng Chia University","ror":"https://ror.org/05vhczg54","country_code":"TW","type":"education","lineage":["https://openalex.org/I4880106"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Chin-Chen Chang","raw_affiliation_strings":["Department of Information Engineering and Computer Science, Feng Chia University, Taichung 40724, Taiwan","Information and Communication Security Research Center, Feng Chia University, Taichung 40724, Taiwan"],"raw_orcid":"https://orcid.org/0000-0002-7319-5780","affiliations":[{"raw_affiliation_string":"Department of Information Engineering and Computer Science, Feng Chia University, Taichung 40724, Taiwan","institution_ids":["https://openalex.org/I4880106"]},{"raw_affiliation_string":"Information and Communication Security Research Center, Feng Chia University, Taichung 40724, Taiwan","institution_ids":["https://openalex.org/I4880106"]}]},{"author_position":"last","author":{"id":null,"display_name":"Chin-Chen Chang","orcid":"https://orcid.org/0000-0002-7319-5780"},"institutions":[{"id":"https://openalex.org/I4880106","display_name":"Feng Chia University","ror":"https://ror.org/05vhczg54","country_code":"TW","type":"education","lineage":["https://openalex.org/I4880106"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Chin-Chen Chang","raw_affiliation_strings":["Department of Information Engineering and Computer Science, Feng Chia University, Taichung 40724, Taiwan","Information and Communication Security Research Center, Feng Chia University, Taichung 40724, Taiwan"],"raw_orcid":"https://orcid.org/0000-0002-7319-5780","affiliations":[{"raw_affiliation_string":"Department of Information Engineering and Computer Science, Feng Chia University, Taichung 40724, Taiwan","institution_ids":["https://openalex.org/I4880106"]},{"raw_affiliation_string":"Information and Communication Security Research Center, Feng Chia University, Taichung 40724, Taiwan","institution_ids":["https://openalex.org/I4880106"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5038550838"],"corresponding_institution_ids":["https://openalex.org/I4880106"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.00525552,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"16","issue":"1","first_page":"34","last_page":"34"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/codebook","display_name":"Codebook","score":0.925801157951355},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8633120656013489},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.768629789352417},{"id":"https://openalex.org/keywords/code-word","display_name":"Code word","score":0.7208693623542786},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6217013001441956},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5997408628463745},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.5965458154678345},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.5607427358627319},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.46068647503852844},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.45294541120529175},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4477955996990204},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.41596466302871704},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.41455650329589844},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3774290680885315},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2919234335422516},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.23301127552986145},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.1905164122581482},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11763456463813782}],"concepts":[{"id":"https://openalex.org/C127759330","wikidata":"https://www.wikidata.org/wiki/Q637416","display_name":"Codebook","level":2,"score":0.925801157951355},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8633120656013489},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.768629789352417},{"id":"https://openalex.org/C153207627","wikidata":"https://www.wikidata.org/wiki/Q863873","display_name":"Code word","level":3,"score":0.7208693623542786},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6217013001441956},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5997408628463745},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.5965458154678345},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.5607427358627319},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.46068647503852844},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.45294541120529175},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4477955996990204},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.41596466302871704},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.41455650329589844},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3774290680885315},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2919234335422516},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.23301127552986145},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.1905164122581482},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11763456463813782},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/fi16010034","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi16010034","pdf_url":"https://www.mdpi.com/1999-5903/16/1/34/pdf?version=1705914933","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:a33c348e70214bada032c1d367ed861f","is_oa":true,"landing_page_url":"https://doaj.org/article/a33c348e70214bada032c1d367ed861f","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Future Internet, Vol 16, Iss 1, p 34 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/fi16010034","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi16010034","pdf_url":"https://www.mdpi.com/1999-5903/16/1/34/pdf?version=1705914933","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.6600000262260437,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4391104320.pdf"},"referenced_works_count":23,"referenced_works":["https://openalex.org/W1998279455","https://openalex.org/W2010380519","https://openalex.org/W2012711090","https://openalex.org/W2075965608","https://openalex.org/W2137288380","https://openalex.org/W2145797388","https://openalex.org/W2152262436","https://openalex.org/W2342152533","https://openalex.org/W2400363826","https://openalex.org/W2403682575","https://openalex.org/W2508016950","https://openalex.org/W2792490487","https://openalex.org/W2793696846","https://openalex.org/W2801138212","https://openalex.org/W2806483402","https://openalex.org/W2950377098","https://openalex.org/W2985045609","https://openalex.org/W3015356587","https://openalex.org/W3021929949","https://openalex.org/W4200554442","https://openalex.org/W4226424628","https://openalex.org/W4293103896","https://openalex.org/W4387698010"],"related_works":["https://openalex.org/W2369939250","https://openalex.org/W2355032504","https://openalex.org/W1588525449","https://openalex.org/W2050865889","https://openalex.org/W3203504906","https://openalex.org/W2497446005","https://openalex.org/W2375798515","https://openalex.org/W2145406111","https://openalex.org/W1966593131","https://openalex.org/W2171676767"],"abstract_inverted_index":{"Information":[0],"has":[1,24,48],"been":[2,49],"uploaded":[3],"and":[4,11,31,156],"downloaded":[5],"through":[6],"the":[7,20,34,52,68,75,78,82,85,90,106,110,131,157],"Internet,":[8],"day":[9,12],"in":[10,19,84,119],"out,":[13],"ever":[14],"since":[15],"we":[16,127],"immersed":[17],"ourselves":[18],"Internet.":[21],"Data":[22],"security":[23],"become":[25],"an":[26,166],"area":[27],"demanding":[28],"high":[29],"attention,":[30],"one":[32],"of":[33,54,67,77,93,105,109,135],"most":[35],"efficient":[36],"techniques":[37],"for":[38],"protecting":[39],"data":[40,42,118,144,153],"is":[41,96,137],"hiding.":[43],"In":[44],"recent":[45],"studies,":[46],"it":[47],"shown":[50],"that":[51,130],"indices":[53],"a":[55,100,149,152,163],"codebook":[56,79,86],"can":[57,128,145,159],"be":[58,146,160],"reordered":[59],"to":[60,115],"hide":[61,116],"secret":[62,117],"bits.":[63],"The":[64],"hiding":[65,154],"capacity":[66,134],"codeword":[69,111],"index":[70,112],"reordering":[71,113],"scheme":[72,102],"increases":[73],"when":[74,148,162],"size":[76],"increases.":[80],"Since":[81],"codewords":[83],"are":[87],"not":[88],"modified,":[89],"visual":[91],"performance":[92],"compressed":[94],"images":[95],"retained.":[97],"We":[98],"propose":[99],"novel":[101],"making":[103],"use":[104],"fundamental":[107],"principle":[108],"technique":[114],"encrypted":[120],"images.":[121],"By":[122],"observing":[123],"our":[124],"experimental":[125],"results,":[126],"see":[129],"obtained":[132],"embedding":[133],"197,888":[136],"larger":[138],"than":[139],"other":[140],"state-of-the-art":[141],"schemes.":[142],"Secret":[143],"extracted":[147],"receiver":[150,164],"owns":[151,165],"key,":[155],"image":[158],"recovered":[161],"encryption":[167],"key.":[168]},"counts_by_year":[],"updated_date":"2026-05-19T08:33:51.333923","created_date":"2025-10-10T00:00:00"}
