{"id":"https://openalex.org/W2894264879","doi":"https://doi.org/10.4018/ijdcf.2019010104","title":"Reversible Data Hiding with Multiple Data for Multiple Users in an Encrypted Image","display_name":"Reversible Data Hiding with Multiple Data for Multiple Users in an Encrypted Image","publication_year":2018,"publication_date":"2018-10-11","ids":{"openalex":"https://openalex.org/W2894264879","doi":"https://doi.org/10.4018/ijdcf.2019010104","mag":"2894264879"},"language":"en","primary_location":{"id":"doi:10.4018/ijdcf.2019010104","is_oa":true,"landing_page_url":"https://doi.org/10.4018/ijdcf.2019010104","pdf_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=215321&isxn=9781522565147","source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Digital Crime and Forensics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=215321&isxn=9781522565147","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004124220","display_name":"Asad Malik","orcid":"https://orcid.org/0000-0002-9976-3563"},"institutions":[{"id":"https://openalex.org/I4800084","display_name":"Southwest Jiaotong University","ror":"https://ror.org/00hn7w693","country_code":"CN","type":"education","lineage":["https://openalex.org/I4800084"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Asad Malik","raw_affiliation_strings":["School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China","institution_ids":["https://openalex.org/I4800084"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100373271","display_name":"Hongxia Wang","orcid":"https://orcid.org/0000-0002-1339-2504"},"institutions":[{"id":"https://openalex.org/I4800084","display_name":"Southwest Jiaotong University","ror":"https://ror.org/00hn7w693","country_code":"CN","type":"education","lineage":["https://openalex.org/I4800084"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongxia Wang","raw_affiliation_strings":["School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China","institution_ids":["https://openalex.org/I4800084"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049733139","display_name":"Hanzhou Wu","orcid":"https://orcid.org/0000-0002-1599-7232"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210112150","display_name":"Institute of Automation","ror":"https://ror.org/022c3hy66","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210112150"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hanzhou Wu","raw_affiliation_strings":["Institute of Automation, Chinese Academy of Sciences (CAS), Beijing, China & State Key Laboratory of Cryptology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Automation, Chinese Academy of Sciences (CAS), Beijing, China & State Key Laboratory of Cryptology, Beijing, China","institution_ids":["https://openalex.org/I4210132990","https://openalex.org/I4210112150","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027109204","display_name":"Sani M. Abdullahi","orcid":"https://orcid.org/0000-0003-4962-2794"},"institutions":[{"id":"https://openalex.org/I4800084","display_name":"Southwest Jiaotong University","ror":"https://ror.org/00hn7w693","country_code":"CN","type":"education","lineage":["https://openalex.org/I4800084"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sani M. Abdullahi","raw_affiliation_strings":["School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China","institution_ids":["https://openalex.org/I4800084"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5004124220"],"corresponding_institution_ids":["https://openalex.org/I4800084"],"apc_list":null,"apc_paid":null,"fwci":1.0624,"has_fulltext":true,"cited_by_count":12,"citation_normalized_percentile":{"value":0.82856327,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":"11","issue":"1","first_page":"46","last_page":"61"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.9136946201324463},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8240214586257935},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.6727966666221619},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.6641726493835449},{"id":"https://openalex.org/keywords/data-extraction","display_name":"Data extraction","score":0.6197749376296997},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.596433162689209},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.568993091583252},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.5202511548995972},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.5091084837913513},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.4098173975944519},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3946228325366974},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23874270915985107}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.9136946201324463},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8240214586257935},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.6727966666221619},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.6641726493835449},{"id":"https://openalex.org/C2777466982","wikidata":"https://www.wikidata.org/wiki/Q5227287","display_name":"Data extraction","level":3,"score":0.6197749376296997},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.596433162689209},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.568993091583252},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.5202511548995972},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.5091084837913513},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4098173975944519},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3946228325366974},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23874270915985107},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C2779473830","wikidata":"https://www.wikidata.org/wiki/Q1540899","display_name":"MEDLINE","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.4018/ijdcf.2019010104","is_oa":true,"landing_page_url":"https://doi.org/10.4018/ijdcf.2019010104","pdf_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=215321&isxn=9781522565147","source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Digital Crime and Forensics","raw_type":"journal-article"},{"id":"pmh:oai:dro.deakin.edu.au:DU:30118760","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401102","display_name":"Own your potential (DEAKIN)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I149704539","host_organization_name":"Deakin University","host_organization_lineage":["https://openalex.org/I149704539"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"},{"id":"pmh:oai:figshare.com:article/20782483","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Reversible_data_hiding_with_multiple_data_for_multiple_users_in_an_encrypted_image/20782483","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.4018/ijdcf.2019010104","is_oa":true,"landing_page_url":"https://doi.org/10.4018/ijdcf.2019010104","pdf_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=215321&isxn=9781522565147","source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Digital Crime and Forensics","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2894264879.pdf","grobid_xml":"https://content.openalex.org/works/W2894264879.grobid-xml"},"referenced_works_count":26,"referenced_works":["https://openalex.org/W790982447","https://openalex.org/W1571514197","https://openalex.org/W1812030059","https://openalex.org/W1968818978","https://openalex.org/W1998279455","https://openalex.org/W2010380519","https://openalex.org/W2012711090","https://openalex.org/W2038846832","https://openalex.org/W2074253957","https://openalex.org/W2075965608","https://openalex.org/W2106950225","https://openalex.org/W2121393355","https://openalex.org/W2126425008","https://openalex.org/W2132971215","https://openalex.org/W2134823205","https://openalex.org/W2135459805","https://openalex.org/W2137288380","https://openalex.org/W2159026792","https://openalex.org/W2170269447","https://openalex.org/W2227996660","https://openalex.org/W2337678523","https://openalex.org/W2342152533","https://openalex.org/W2403682575","https://openalex.org/W2508016950","https://openalex.org/W3209866323","https://openalex.org/W4247934040"],"related_works":["https://openalex.org/W3034535981","https://openalex.org/W2290994234","https://openalex.org/W2912228336","https://openalex.org/W2079448624","https://openalex.org/W3042472109","https://openalex.org/W2331956266","https://openalex.org/W2064060403","https://openalex.org/W4221160866","https://openalex.org/W1557159245","https://openalex.org/W2183156088"],"abstract_inverted_index":{"This":[0],"article":[1],"presents":[2],"a":[3],"new":[4],"method":[5],"which":[6,168],"embeds":[7],"multiple":[8,11,69],"data":[9,19,67,96],"from":[10,20,68,97],"users":[12,22,70,154],"in":[13,107],"an":[14,26,90],"encrypted":[15,27,33,43,80,99],"image.":[16,28],"Here,":[17],"the":[18,30,35,42,57,79,87,95,98,102,108,119,124,132,140,143,148,157,170],"several":[21,153],"is":[23,32,45],"embedded":[24,72,144],"into":[25,47,73],"Initially,":[29],"image":[31,44,81,100,109,126],"by":[34,38],"owner":[36,92],"followed":[37],"embedding":[39,172],"phase,":[40,89,113],"where":[41],"divided":[46],"four":[48],"sets.":[49],"Two":[50],"of":[51,78,142,152],"them":[52],"are":[53,62,71],"used":[54],"to":[55,166],"embed":[56],"secret":[58,66,125],"data,":[59],"while":[60],"others":[61],"remain":[63],"unaltered.":[64],"The":[65,136],"Most":[74],"Significant":[75],"Bit":[76],"(MSB)":[77],"using":[82,101,118,131],"their":[83],"location":[84],"maps.":[85],"In":[86],"extraction":[88,141],"individual":[91],"can":[93,115,127],"extract":[94],"assigned":[103],"private":[104],"key.":[105],"Subsequently,":[106],"decryption":[110],"and":[111,174],"recovery":[112],"images":[114],"be":[116,128],"recovered":[117,129],"unaltered":[120],"neighbor":[121],"pixels.":[122],"However,":[123],"losslessly":[130],"encryption":[133],"key":[134],"only.":[135],"proposed":[137],"scheme":[138],"allows":[139],"information":[145],"only":[146],"for":[147],"authorized":[149],"user":[150],"out":[151],"without":[155],"knowing":[156],"cover":[158],"information.":[159],"Various":[160],"simulations":[161],"have":[162],"been":[163],"made":[164],"related":[165],"this,":[167],"show":[169],"high":[171],"rate":[173],"accuracy.":[175]},"counts_by_year":[{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":3}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
