{"id":"https://openalex.org/W3045939081","doi":"https://doi.org/10.1109/tdsc.2020.3011923","title":"Secret sharing based reversible data hiding in encrypted images with multiple data-hiders","display_name":"Secret sharing based reversible data hiding in encrypted images with multiple data-hiders","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3045939081","doi":"https://doi.org/10.1109/tdsc.2020.3011923","mag":"3045939081"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2020.3011923","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101434801","display_name":"Bing Chen","orcid":"https://orcid.org/0000-0002-1716-877X"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bing Chen","raw_affiliation_strings":["Guangdong Key Laboratory of Information Security Technology, Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing, School of Data and Computer Science, Sun Yat-sen University, Guangzhou, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"Guangdong Key Laboratory of Information Security Technology, Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing, School of Data and Computer Science, Sun Yat-sen University, Guangzhou, Guangdong, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083054357","display_name":"Wei Lu","orcid":"https://orcid.org/0000-0002-4068-1766"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Lu","raw_affiliation_strings":["Guangdong Key Laboratory of Information Security Technology, Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing, School of Data and Computer Science, Sun Yat-sen University, Guangzhou, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"Guangdong Key Laboratory of Information Security Technology, Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing, School of Data and Computer Science, Sun Yat-sen University, Guangzhou, Guangdong, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047964483","display_name":"Jiwu Huang","orcid":"https://orcid.org/0000-0002-7625-5689"},"institutions":[{"id":"https://openalex.org/I4210104064","display_name":"Shenzhen Academy of Robotics","ror":"https://ror.org/01h027j09","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210104064"]},{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiwu Huang","raw_affiliation_strings":["Guangdong Key Laboratory of Intelligent Information Processing, Key Laboratory of Media Security, and Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen University, Shenzhen, Guangdong, China","Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen, China","institution_ids":["https://openalex.org/I4210104064"]},{"raw_affiliation_string":"Guangdong Key Laboratory of Intelligent Information Processing, Key Laboratory of Media Security, and Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen University, Shenzhen, Guangdong, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082041657","display_name":"Jian Weng","orcid":"https://orcid.org/0000-0003-4067-8230"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Weng","raw_affiliation_strings":["College of Information Science and Technology and the College of Cyber Security, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Technology and the College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009595085","display_name":"Yicong Zhou","orcid":"https://orcid.org/0000-0002-4487-6384"},"institutions":[{"id":"https://openalex.org/I204512498","display_name":"University of Macau","ror":"https://ror.org/01r4q9n85","country_code":"MO","type":"education","lineage":["https://openalex.org/I204512498"]}],"countries":["MO"],"is_corresponding":false,"raw_author_name":"Yicong Zhou","raw_affiliation_strings":["Department of Computer and Information Science, University of Macau, Macau, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Science, University of Macau, Macau, China","institution_ids":["https://openalex.org/I204512498"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.94,"has_fulltext":false,"cited_by_count":50,"citation_normalized_percentile":{"value":0.776814,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Digital Image Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Digital Image Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image Encryption Techniques","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Image Forgery Detection and Identification","score":0.9986,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reversible-data-embedding","display_name":"Reversible Data Embedding","score":0.61546},{"id":"https://openalex.org/keywords/image-encryption","display_name":"Image Encryption","score":0.610889},{"id":"https://openalex.org/keywords/data-hiding","display_name":"Data Hiding","score":0.5995},{"id":"https://openalex.org/keywords/color-image-encryption","display_name":"Color Image Encryption","score":0.582168},{"id":"https://openalex.org/keywords/image-forgery-detection","display_name":"Image Forgery Detection","score":0.543444}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8308637},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.7636224},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.73924375},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.60412},{"id":"https://openalex.org/C70710897","wikidata":"https://www.wikidata.org/wiki/Q680081","display_name":"Separable space","level":2,"score":0.57447124},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.45253474},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.42977852},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4085648},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3791321},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.34131318},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.32358068},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.28795376},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.056845248},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2020.3011923","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.51,"display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":37,"referenced_works":["https://openalex.org/W1959190975","https://openalex.org/W1990337861","https://openalex.org/W1998279455","https://openalex.org/W2010380519","https://openalex.org/W2029438024","https://openalex.org/W2054082132","https://openalex.org/W2056515392","https://openalex.org/W2067674530","https://openalex.org/W2075965608","https://openalex.org/W2115924904","https://openalex.org/W2121393355","https://openalex.org/W2132172731","https://openalex.org/W2135459805","https://openalex.org/W2137288380","https://openalex.org/W2141420453","https://openalex.org/W2158986121","https://openalex.org/W2170269447","https://openalex.org/W2322525404","https://openalex.org/W2337678523","https://openalex.org/W2460569027","https://openalex.org/W2508330072","https://openalex.org/W2558527387","https://openalex.org/W2748251709","https://openalex.org/W2755498902","https://openalex.org/W2790928171","https://openalex.org/W2793245071","https://openalex.org/W2793696846","https://openalex.org/W2801138212","https://openalex.org/W2900708133","https://openalex.org/W2919213734","https://openalex.org/W2940937153","https://openalex.org/W2942903479","https://openalex.org/W2946415280","https://openalex.org/W2947978774","https://openalex.org/W2964268722","https://openalex.org/W2969448873","https://openalex.org/W2985045609"],"related_works":["https://openalex.org/W45120566","https://openalex.org/W3127228990","https://openalex.org/W3101977789","https://openalex.org/W2767997441","https://openalex.org/W2375981391","https://openalex.org/W2361408597","https://openalex.org/W2301878849","https://openalex.org/W2184946989","https://openalex.org/W2054082132","https://openalex.org/W2042193908"],"abstract_inverted_index":{"The":[0,92],"existing":[1],"models":[2],"of":[3,61,121,129,161],"reversible":[4],"data":[5,73,80],"hiding":[6],"in":[7],"encrypted":[8,55,83,90,103],"images":[9,56,104],"(RDH-EI)":[10],"are":[11,111,155],"based":[12,43],"on":[13,44],"single":[14],"data-hider,":[15],"where":[16],"the":[17,24,49,58,62,82,87,119,122,130,142,159,162],"original":[18,50,63,93,123],"image":[19,51,64,84,94],"cannot":[20],"be":[21,96],"reconstructed":[22],"when":[23,108],"data-hider":[25,76],"is":[26],"damaged.":[27],"To":[28],"address":[29],"this":[30,32],"issue,":[31],"article":[33],"proposes":[34],"a":[35,147],"novel":[36],"model":[37],"with":[38,57,151],"multiple":[39,53,69],"data-hiders":[40,71,107,110],"for":[41,72],"RDH-EI":[42,149],"secret":[45],"sharing.":[46],"It":[47],"divides":[48],"into":[52,81],"different":[54,70],"same":[59],"size":[60],"and":[65,137],"distributes":[66],"them":[67],"to":[68,85,113,157],"hiding.":[74],"Each":[75],"can":[77,95],"independently":[78],"embed":[79],"obtain":[86],"corresponding":[88],"marked":[89,102],"image.":[91,124],"losslessly":[97],"recovered":[98],"by":[99],"collecting":[100],"sufficient":[101],"from":[105],"undamaged":[106],"individual":[109],"subjected":[112],"potential":[114],"damage.":[115],"This":[116],"further":[117],"protects":[118],"security":[120],"We":[125],"provide":[126],"four":[127],"cases":[128,136],"proposed":[131,143,163],"model,":[132,144],"namely,":[133],"two":[134,138],"joint":[135],"separable":[139,148],"cases.":[140],"From":[141],"we":[145],"derive":[146],"method":[150],"high-capacity.":[152],"Experimental":[153],"results":[154],"presented":[156],"illustrate":[158],"effectiveness":[160],"method.":[164]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3045939081","counts_by_year":[{"year":2024,"cited_by_count":20},{"year":2023,"cited_by_count":17},{"year":2022,"cited_by_count":11},{"year":2021,"cited_by_count":2}],"updated_date":"2024-11-17T23:01:06.663694","created_date":"2020-08-03"}