{"id":"https://openalex.org/W3089337021","doi":"https://doi.org/10.1109/tcsvt.2020.3027843","title":"Secure Robust JPEG Steganography Based on AutoEncoder With Adaptive BCH Encoding","display_name":"Secure Robust JPEG Steganography Based on AutoEncoder With Adaptive BCH Encoding","publication_year":2020,"publication_date":"2020-09-30","ids":{"openalex":"https://openalex.org/W3089337021","doi":"https://doi.org/10.1109/tcsvt.2020.3027843","mag":"3089337021"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsvt.2020.3027843","pdf_url":null,"source":{"id":"https://openalex.org/S115173108","display_name":"IEEE Transactions on Circuits and Systems for Video Technology","issn_l":"1051-8215","issn":["1051-8215","1558-2205"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083054357","display_name":"Wei Lu","orcid":"https://orcid.org/0000-0002-4068-1766"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Lu","raw_affiliation_strings":["Guangdong Key Laboratory of Information Security Technology, School of Data and Computer Science, Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Guangdong Key Laboratory of Information Security Technology, School of Data and Computer Science, Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100400217","display_name":"Jun Zhang","orcid":"https://orcid.org/0000-0001-7835-9871"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junhong Zhang","raw_affiliation_strings":["Guangdong Key Laboratory of Information Security Technology, School of Data and Computer Science, Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Guangdong Key Laboratory of Information Security Technology, School of Data and Computer Science, Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100750788","display_name":"Xianfeng Zhao","orcid":"https://orcid.org/0000-0002-5617-8399"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xianfeng Zhao","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067689180","display_name":"Weiming Zhang","orcid":"https://orcid.org/0000-0001-5576-6108"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weiming Zhang","raw_affiliation_strings":["CAS Key Laboratory of Electro-magnetic Space Information, University of Science and Technology of China, Hefei, China"],"affiliations":[{"raw_affiliation_string":"CAS Key Laboratory of Electro-magnetic Space Information, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047964483","display_name":"Jiwu Huang","orcid":"https://orcid.org/0000-0002-7625-5689"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]},{"id":"https://openalex.org/I4210104064","display_name":"Shenzhen Academy of Robotics","ror":"https://ror.org/01h027j09","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210104064"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiwu Huang","raw_affiliation_strings":["Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Shenzhen University, Shenzhen, China","Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen University, Shenzhen, China","Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]},{"raw_affiliation_string":"Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]},{"raw_affiliation_string":"Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen, China","institution_ids":["https://openalex.org/I4210104064"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":4.311,"has_fulltext":false,"cited_by_count":57,"citation_normalized_percentile":{"value":0.776814,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":"31","issue":"7","first_page":"2909","last_page":"2922"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Digital Image Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Digital Image Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Image Forgery Detection and Identification","score":0.9992,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10901","display_name":"Image Compression Techniques and Standards","score":0.9982,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bch-code","display_name":"BCH code","score":0.8865394},{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.82866573},{"id":"https://openalex.org/keywords/lossy-compression","display_name":"Lossy compression","score":0.6451284},{"id":"https://openalex.org/keywords/jpeg-compression","display_name":"JPEG Compression","score":0.594279},{"id":"https://openalex.org/keywords/image-authentication","display_name":"Image Authentication","score":0.524658},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.516173},{"id":"https://openalex.org/keywords/scalable-compression","display_name":"Scalable Compression","score":0.501598},{"id":"https://openalex.org/keywords/lossless-jpeg","display_name":"Lossless JPEG","score":0.48575762},{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.43638325}],"concepts":[{"id":"https://openalex.org/C42276685","wikidata":"https://www.wikidata.org/wiki/Q795705","display_name":"BCH code","level":3,"score":0.8865394},{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.82866573},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7433396},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.70522445},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.6479448},{"id":"https://openalex.org/C165021410","wikidata":"https://www.wikidata.org/wiki/Q55564","display_name":"Lossy compression","level":2,"score":0.6451284},{"id":"https://openalex.org/C169805256","wikidata":"https://www.wikidata.org/wiki/Q1361381","display_name":"Transform coding","level":4,"score":0.5208188},{"id":"https://openalex.org/C8384606","wikidata":"https://www.wikidata.org/wiki/Q2190356","display_name":"Lossless JPEG","level":5,"score":0.48575762},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.46986803},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4475459},{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.43638325},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3631633},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.35052627},{"id":"https://openalex.org/C13481523","wikidata":"https://www.wikidata.org/wiki/Q412438","display_name":"Image compression","level":4,"score":0.34996024},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.33513707},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.33004996},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.21843353},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.19003639},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.116297066}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsvt.2020.3027843","pdf_url":null,"source":{"id":"https://openalex.org/S115173108","display_name":"IEEE Transactions on Circuits and Systems for Video Technology","issn_l":"1051-8215","issn":["1051-8215","1558-2205"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.47}],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"62072480"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"U1636202"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"U1736118"},{"funder":"https://openalex.org/F4320329801","funder_display_name":"Shenzhen Research and Development Program","award_id":"GJHZ20180928155814437"}],"datasets":[],"versions":[],"referenced_works_count":45,"referenced_works":["https://openalex.org/W1522301498","https://openalex.org/W1663899164","https://openalex.org/W1955882805","https://openalex.org/W1976570511","https://openalex.org/W1980171342","https://openalex.org/W2009130368","https://openalex.org/W2031466562","https://openalex.org/W2040903332","https://openalex.org/W2042598971","https://openalex.org/W2045110448","https://openalex.org/W2055625960","https://openalex.org/W2104705565","https://openalex.org/W2106663508","https://openalex.org/W2124664712","https://openalex.org/W2134527668","https://openalex.org/W2134732546","https://openalex.org/W2146345139","https://openalex.org/W2156387975","https://openalex.org/W2163605009","https://openalex.org/W2165049148","https://openalex.org/W2170598445","https://openalex.org/W22271197","https://openalex.org/W2545241995","https://openalex.org/W2593827718","https://openalex.org/W2781513756","https://openalex.org/W2782363563","https://openalex.org/W2792447253","https://openalex.org/W2793291280","https://openalex.org/W2807742006","https://openalex.org/W2832441265","https://openalex.org/W2891212213","https://openalex.org/W2892948265","https://openalex.org/W2901329636","https://openalex.org/W2902054981","https://openalex.org/W2905058180","https://openalex.org/W2910145171","https://openalex.org/W2912620163","https://openalex.org/W2942745088","https://openalex.org/W2950237263","https://openalex.org/W2964121744","https://openalex.org/W2970340508","https://openalex.org/W2995153684","https://openalex.org/W2995366209","https://openalex.org/W2997557485","https://openalex.org/W4294567867"],"related_works":["https://openalex.org/W4313377945","https://openalex.org/W4220747575","https://openalex.org/W2545896937","https://openalex.org/W2133743319","https://openalex.org/W2111280862","https://openalex.org/W2105458961","https://openalex.org/W2052389107","https://openalex.org/W2037059691","https://openalex.org/W2034182554","https://openalex.org/W1993513347"],"abstract_inverted_index":{"Social":[0],"networks":[1],"are":[2,30],"everywhere":[3],"and":[4,41,100,148,170],"currently":[5],"transmitting":[6,13,28],"very":[7],"large":[8],"messages.":[9],"As":[10],"a":[11,34,54,64,166],"result,":[12],"secret":[14,49,128],"messages":[15,29,50],"in":[16,27],"such":[17],"an":[18,72,75],"environment":[19],"is":[20,39,58,81,87,112],"worth":[21],"researching.":[22],"However,":[23],"the":[24,43,85,92,96,104,109,117,124,146,158],"images":[25],"used":[26],"usually":[31],"compressed":[32],"with":[33,74,152],"JPEG":[35,56,67,97,141,161],"compression":[36,102,105],"channel,":[37],"which":[38],"lossy":[40],"damages":[42],"transmitted":[44],"data.":[45],"Therefore,":[46],"to":[47,90,116,122],"prevent":[48],"from":[51],"being":[52],"damaged,":[53],"robust":[55,66,160,168],"steganography":[57],"urgently":[59],"needed.":[60],"In":[61,83,107],"this":[62],"paper,":[63],"secure":[65],"steganographic":[68,162],"scheme":[69],"based":[70,138],"on":[71,139],"autoencoder":[73,86],"adaptive":[76],"BCH":[77,110],"encoding":[78,111],"(Bose-Chaudhuri-Hocquenghem":[79],"encoding)":[80],"proposed.":[82],"particular,":[84],"first":[88],"pretrained":[89],"fit":[91],"transformation":[93],"relationship":[94],"between":[95],"image":[98,121],"before":[99],"after":[101],"by":[103],"channel.":[106],"addition,":[108],"adaptively":[113],"utilized":[114],"according":[115],"content":[118],"of":[119,127],"cover":[120],"decrease":[123],"error":[125],"rate":[126],"message":[129],"extraction.":[130],"The":[131],"DCT":[132],"(Discrete":[133],"Cosine":[134],"Transformation)":[135],"coefficient":[136],"adjustment":[137],"practical":[140],"channel":[142],"characteristics":[143],"further":[144],"improves":[145],"robustness":[147],"statistical":[149,171],"security.":[150,172],"Comparisons":[151],"prior":[153],"state-of-the-art":[154],"schemes":[155],"demonstrate":[156],"that":[157],"proposed":[159],"algorithm":[163],"can":[164],"provide":[165],"more":[167],"performance":[169]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3089337021","counts_by_year":[{"year":2024,"cited_by_count":13},{"year":2023,"cited_by_count":18},{"year":2022,"cited_by_count":16},{"year":2021,"cited_by_count":10}],"updated_date":"2024-12-03T18:11:46.178329","created_date":"2020-10-08"}