{"id":"https://openalex.org/W2040999721","doi":"https://doi.org/10.4018/jdcf.2012040102","title":"An Adaptive JPEG Steganographic Scheme Based on the Block Entropy of DCT Coefficients","display_name":"An Adaptive JPEG Steganographic Scheme Based on the Block Entropy of DCT Coefficients","publication_year":2012,"publication_date":"2012-04-01","ids":{"openalex":"https://openalex.org/W2040999721","doi":"https://doi.org/10.4018/jdcf.2012040102","mag":"2040999721"},"language":"en","primary_location":{"id":"doi:10.4018/jdcf.2012040102","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jdcf.2012040102","pdf_url":null,"source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Digital Crime and Forensics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100371643","display_name":"Chang Wang","orcid":"https://orcid.org/0000-0002-2330-6278"},"institutions":[{"id":"https://openalex.org/I101479585","display_name":"South China Agricultural University","ror":"https://ror.org/05v9jqt67","country_code":"CN","type":"education","lineage":["https://openalex.org/I101479585"]},{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chang Wang","raw_affiliation_strings":["South China Agricultural University, China","Sun Yat-sen University, China","Sun Yat Sen University, China"],"affiliations":[{"raw_affiliation_string":"South China Agricultural University, China","institution_ids":["https://openalex.org/I101479585"]},{"raw_affiliation_string":"Sun Yat-sen University, China","institution_ids":["https://openalex.org/I157773358"]},{"raw_affiliation_string":"Sun Yat Sen University, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039213686","display_name":"Jiangqun Ni","orcid":"https://orcid.org/0000-0002-7520-9031"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiangqun Ni","raw_affiliation_strings":["Sun Yat-sen University, China","Sun Yat Sen University, China"],"affiliations":[{"raw_affiliation_string":"Sun Yat-sen University, China","institution_ids":["https://openalex.org/I157773358"]},{"raw_affiliation_string":"Sun Yat Sen University, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064383463","display_name":"Chuntao Wang","orcid":"https://orcid.org/0000-0002-5482-1766"},"institutions":[{"id":"https://openalex.org/I101479585","display_name":"South China Agricultural University","ror":"https://ror.org/05v9jqt67","country_code":"CN","type":"education","lineage":["https://openalex.org/I101479585"]},{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chuntao Wang","raw_affiliation_strings":["South China Agricultural University, China","Sun Yat-sen University, China","South China Agricultural University,, China"],"affiliations":[{"raw_affiliation_string":"South China Agricultural University, China","institution_ids":["https://openalex.org/I101479585"]},{"raw_affiliation_string":"Sun Yat-sen University, China","institution_ids":["https://openalex.org/I157773358"]},{"raw_affiliation_string":"South China Agricultural University,, China","institution_ids":["https://openalex.org/I101479585"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036826029","display_name":"Ruiyu Zhang","orcid":"https://orcid.org/0000-0001-9469-2420"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruiyu Zhang","raw_affiliation_strings":["Sun Yat-sen University, China","Sun Yat Sen University, China"],"affiliations":[{"raw_affiliation_string":"Sun Yat-sen University, China","institution_ids":["https://openalex.org/I157773358"]},{"raw_affiliation_string":"Sun Yat Sen University, China","institution_ids":["https://openalex.org/I157773358"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100371643"],"corresponding_institution_ids":["https://openalex.org/I101479585","https://openalex.org/I157773358"],"apc_list":null,"apc_paid":null,"fwci":0.2745,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.56969132,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"4","issue":"2","first_page":"13","last_page":"27"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8411886692047119},{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.7895774245262146},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.6973185539245605},{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.6866194009780884},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6744111776351929},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5294011831283569},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.5062293410301208},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.5050418972969055},{"id":"https://openalex.org/keywords/distortion","display_name":"Distortion (music)","score":0.4748551845550537},{"id":"https://openalex.org/keywords/distortion-function","display_name":"Distortion function","score":0.4346182942390442},{"id":"https://openalex.org/keywords/transform-coding","display_name":"Transform coding","score":0.4333055019378662},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4154853820800781},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.33412185311317444},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.21783384680747986},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.16186687350273132},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.12414711713790894},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.09841600060462952},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.0601484477519989}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8411886692047119},{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.7895774245262146},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.6973185539245605},{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.6866194009780884},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6744111776351929},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5294011831283569},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.5062293410301208},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.5050418972969055},{"id":"https://openalex.org/C126780896","wikidata":"https://www.wikidata.org/wiki/Q899871","display_name":"Distortion (music)","level":4,"score":0.4748551845550537},{"id":"https://openalex.org/C2780803321","wikidata":"https://www.wikidata.org/wiki/Q5283073","display_name":"Distortion function","level":3,"score":0.4346182942390442},{"id":"https://openalex.org/C169805256","wikidata":"https://www.wikidata.org/wiki/Q1361381","display_name":"Transform coding","level":4,"score":0.4333055019378662},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4154853820800781},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.33412185311317444},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.21783384680747986},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.16186687350273132},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.12414711713790894},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.09841600060462952},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.0601484477519989},{"id":"https://openalex.org/C194257627","wikidata":"https://www.wikidata.org/wiki/Q211554","display_name":"Amplifier","level":3,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/jdcf.2012040102","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jdcf.2012040102","pdf_url":null,"source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Digital Crime and Forensics","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jdcf00:v:4:y:2012:i:2:p:13-27","is_oa":false,"landing_page_url":"http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jdcf.2012040102","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W1512190422","https://openalex.org/W1527181506","https://openalex.org/W1534147215","https://openalex.org/W1568107467","https://openalex.org/W1596128322","https://openalex.org/W1599992983","https://openalex.org/W1748609398","https://openalex.org/W1760530029","https://openalex.org/W1806317803","https://openalex.org/W1875845630","https://openalex.org/W1890251613","https://openalex.org/W1965064373","https://openalex.org/W1970303434","https://openalex.org/W1972785987","https://openalex.org/W2012300482","https://openalex.org/W2028943247","https://openalex.org/W2038504436","https://openalex.org/W2049562124","https://openalex.org/W2064353916","https://openalex.org/W2106802997","https://openalex.org/W2124890704","https://openalex.org/W2130372878","https://openalex.org/W2133743319","https://openalex.org/W2139212933","https://openalex.org/W2145015841","https://openalex.org/W2148808559","https://openalex.org/W2153635508","https://openalex.org/W2153789737","https://openalex.org/W2167999072","https://openalex.org/W2786495476","https://openalex.org/W2809176256","https://openalex.org/W3120421331","https://openalex.org/W6638363521"],"related_works":["https://openalex.org/W2133743319","https://openalex.org/W127724361","https://openalex.org/W2032334298","https://openalex.org/W4200085651","https://openalex.org/W2160587766","https://openalex.org/W2241212938","https://openalex.org/W2088023168","https://openalex.org/W4220747575","https://openalex.org/W1966340347","https://openalex.org/W2037059691"],"abstract_inverted_index":{"Minimizing":[0],"the":[1,22,28,32,51,55,68,97,103,106,126,136,143],"embedding":[2,29,115,145],"impact":[3,30,118],"is":[4],"a":[5,39,45,77,92],"practically":[6],"feasible":[7],"philosophy":[8],"in":[9,67],"designing":[10],"steganographic":[11,16,80,139,157],"systems.":[12],"The":[13,42,82,113],"development":[14],"of":[15,24,34,70,94,105,129],"systems":[17],"can":[18],"be":[19,120],"formulated":[20],"as":[21],"construction":[23],"distortion":[25,47,56,100,111,116],"profile":[26,48,101],"reflecting":[27],"and":[31,54,61,64,123,149],"design":[33],"syndrome":[35,71],"coding":[36,73],"based":[37],"on":[38],"certain":[40],"code.":[41],"authors":[43],"devise":[44],"new":[46,78],"exploring":[49],"both":[50],"block":[52,93],"complexity":[53],"effect":[57],"due":[58],"to":[59,75,88,91,125],"flipping":[60],"rounding":[62],"errors,":[63],"incorporate":[65],"it":[66],"framework":[69],"trellis":[72],"(STC)":[74],"propose":[76],"JPEG":[79,138,156],"scheme.":[81],"STC":[83],"provides":[84],"multiple":[85],"candidate":[86],"solutions":[87],"embed":[89],"messages":[90],"coefficients":[95],"while":[96],"constructed":[98],"content-adaptive":[99],"guides":[102],"determination":[104],"best":[107],"solution":[108],"with":[109],"minimal":[110],"effect.":[112],"total":[114],"or":[117],"would":[119],"significantly":[121],"reduced":[122],"lead":[124],"less":[127],"detectability":[128],"steganalysis.":[130],"Extensive":[131],"experimental":[132],"results":[133],"demonstrate":[134],"that":[135],"proposed":[137],"scheme":[140],"greatly":[141],"increases":[142],"secure":[144],"capacity":[146],"against":[147],"steganalysis":[148],"shows":[150],"significant":[151],"superiority":[152],"over":[153],"some":[154],"existing":[155],"approaches.":[158]},"counts_by_year":[{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
