{"id":"https://openalex.org/W2977217771","doi":"https://doi.org/10.4018/ijdcf.2019100108","title":"A New Kind of High Capacity and Security Reversible Data Hiding Scheme","display_name":"A New Kind of High Capacity and Security Reversible Data Hiding Scheme","publication_year":2019,"publication_date":"2019-09-27","ids":{"openalex":"https://openalex.org/W2977217771","doi":"https://doi.org/10.4018/ijdcf.2019100108","mag":"2977217771"},"language":"en","primary_location":{"id":"doi:10.4018/ijdcf.2019100108","is_oa":true,"landing_page_url":"https://doi.org/10.4018/ijdcf.2019100108","pdf_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=238888&isxn=9781522565178","source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Digital Crime and Forensics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=238888&isxn=9781522565178","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100749734","display_name":"Bin Ma","orcid":"https://orcid.org/0000-0002-9030-7393"},"institutions":[{"id":"https://openalex.org/I4210142748","display_name":"Shandong Academy of Sciences","ror":"https://ror.org/04y8d6y55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210142748"]},{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Bin Ma","raw_affiliation_strings":["College of Information, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China"],"affiliations":[{"raw_affiliation_string":"College of Information, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100357616","display_name":"Xiaoyu Wang","orcid":"https://orcid.org/0000-0002-7030-4291"},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]},{"id":"https://openalex.org/I4210142748","display_name":"Shandong Academy of Sciences","ror":"https://ror.org/04y8d6y55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210142748"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiao-Yu Wang","raw_affiliation_strings":["College of Information, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China"],"affiliations":[{"raw_affiliation_string":"College of Information, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100451238","display_name":"Bing Li","orcid":"https://orcid.org/0000-0002-0796-8415"},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]},{"id":"https://openalex.org/I4210142748","display_name":"Shandong Academy of Sciences","ror":"https://ror.org/04y8d6y55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210142748"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bing Li","raw_affiliation_strings":["College of Information, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China"],"affiliations":[{"raw_affiliation_string":"College of Information, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100749734"],"corresponding_institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.10345819,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"11","issue":"4","first_page":"118","last_page":"129"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9797000288963318,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.8169064521789551},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7490873336791992},{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.673554539680481},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.6412668228149414},{"id":"https://openalex.org/keywords/distortion","display_name":"Distortion (music)","score":0.6075963377952576},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5796492695808411},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5618206262588501},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.5276573896408081},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.48642635345458984},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4831082820892334},{"id":"https://openalex.org/keywords/sequence","display_name":"Sequence (biology)","score":0.47095733880996704},{"id":"https://openalex.org/keywords/code-division-multiple-access","display_name":"Code division multiple access","score":0.464664101600647},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4285799562931061},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2389068603515625},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.192335844039917},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.17685505747795105}],"concepts":[{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.8169064521789551},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7490873336791992},{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.673554539680481},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.6412668228149414},{"id":"https://openalex.org/C126780896","wikidata":"https://www.wikidata.org/wiki/Q899871","display_name":"Distortion (music)","level":4,"score":0.6075963377952576},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5796492695808411},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5618206262588501},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.5276573896408081},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.48642635345458984},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4831082820892334},{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.47095733880996704},{"id":"https://openalex.org/C47696715","wikidata":"https://www.wikidata.org/wiki/Q233394","display_name":"Code division multiple access","level":2,"score":0.464664101600647},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4285799562931061},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2389068603515625},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.192335844039917},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.17685505747795105},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.0},{"id":"https://openalex.org/C194257627","wikidata":"https://www.wikidata.org/wiki/Q211554","display_name":"Amplifier","level":3,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.4018/ijdcf.2019100108","is_oa":true,"landing_page_url":"https://doi.org/10.4018/ijdcf.2019100108","pdf_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=238888&isxn=9781522565178","source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Digital Crime and Forensics","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.4018/ijdcf.2019100108","is_oa":true,"landing_page_url":"https://doi.org/10.4018/ijdcf.2019100108","pdf_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=238888&isxn=9781522565178","source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Digital Crime and Forensics","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2977217771.pdf","grobid_xml":"https://content.openalex.org/works/W2977217771.grobid-xml"},"referenced_works_count":11,"referenced_works":["https://openalex.org/W1974641035","https://openalex.org/W1990337861","https://openalex.org/W1997244559","https://openalex.org/W2101472062","https://openalex.org/W2105770740","https://openalex.org/W2106950225","https://openalex.org/W2135459805","https://openalex.org/W2144088652","https://openalex.org/W2359175208","https://openalex.org/W2493250145","https://openalex.org/W4247934040"],"related_works":["https://openalex.org/W3049118997","https://openalex.org/W3203504906","https://openalex.org/W2497446005","https://openalex.org/W3190769222","https://openalex.org/W2171676767","https://openalex.org/W4312890355","https://openalex.org/W2189589914","https://openalex.org/W1716757876","https://openalex.org/W83713408","https://openalex.org/W4293373802"],"abstract_inverted_index":{"A":[0],"novel":[1],"high":[2,85,123],"capacity":[3,52,151],"and":[4,27,48,97,112],"security":[5,125],"reversible":[6,139],"data":[7,19,111,140],"hiding":[8,141],"scheme":[9,121,142],"is":[10,20,53],"proposed":[11,120],"in":[12,15,38,65],"this":[13],"article,":[14],"which":[16],"the":[17,31,39,50,66,73,76,90,94,98,102,105,109,114,119,132,136],"secret":[18,110],"represented":[21],"by":[22],"different":[23],"orthogonal":[24,59],"spreading":[25,60,95],"sequences":[26,61],"repeatedly":[28],"embedded":[29,77],"into":[30],"cover":[32],"image":[33,78,116,146],"without":[34],"disturbing":[35],"each":[36],"other":[37,127,154],"light":[40],"of":[41,58,68,75,131],"Code":[42],"Division":[43],"Multiple":[44],"Access":[45],"(CDMA)":[46],"technique,":[47],"thus":[49,118],"embedding":[51,86,99,124,150],"enlarged.":[54],"As":[55],"most":[56],"elements":[57],"are":[62],"mutually":[63],"canceled":[64],"process":[67],"repeated":[69],"embedding,":[70],"it":[71],"keeps":[72],"distortion":[74],"at":[79,148],"a":[80],"low":[81],"level":[82],"even":[83],"with":[84,153],"capacity.":[87],"Moreover,":[88],"only":[89],"receiver":[91],"who":[92],"has":[93],"sequence":[96],"gain":[100],"factor":[101],"same":[103],"as":[104],"sender":[106],"can":[107],"extract":[108],"achieve":[113,144],"original":[115],"exactly,":[117],"achieves":[122],"than":[126],"schemes.":[128,156],"The":[129],"results":[130],"experiment":[133],"demonstrates":[134],"that":[135],"CDMA":[137],"based":[138],"could":[143],"higher":[145],"quality":[147],"moderate-to-high":[149],"compared":[152],"state-of-the-art":[155]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
