iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.openalex.org/works/doi:10.1109/ACCESS.2019.2920304
{"id":"https://openalex.org/W2947063299","doi":"https://doi.org/10.1109/access.2019.2920304","title":"Fuzzy Localization of Steganographic Flipped Bits via Modification Map","display_name":"Fuzzy Localization of Steganographic Flipped Bits via Modification Map","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2947063299","doi":"https://doi.org/10.1109/access.2019.2920304","mag":"2947063299"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2920304","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08727497.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08727497.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055425733","display_name":"Quanqi Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Quanqi Liu","raw_affiliation_strings":["School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069460515","display_name":"Tong Qiao","orcid":"https://orcid.org/0000-0003-4912-2132"},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tong Qiao","raw_affiliation_strings":["School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041210918","display_name":"Ming Xu","orcid":"https://orcid.org/0000-0001-9332-5258"},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ming Xu","raw_affiliation_strings":["School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047378832","display_name":"Ning Zheng","orcid":"https://orcid.org/0000-0003-3503-8167"},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ning Zheng","raw_affiliation_strings":["School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":1850,"currency":"USD","value_usd":1850,"provenance":"doaj"},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850,"provenance":"doaj"},"fwci":0.344,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":8,"citation_normalized_percentile":{"value":0.726737,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":84,"max":85},"biblio":{"volume":"7","issue":null,"first_page":"74157","last_page":"74167"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Digital Image Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Digital Image Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Image Forgery Detection and Identification","score":0.9987,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image Encryption Techniques","score":0.9984,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.9184588},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.78772765},{"id":"https://openalex.org/keywords/tampering-localization","display_name":"Tampering Localization","score":0.534629},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.52181},{"id":"https://openalex.org/keywords/image-forgery-detection","display_name":"Image Forgery Detection","score":0.513441},{"id":"https://openalex.org/keywords/splicing-detection","display_name":"Splicing Detection","score":0.506193}],"concepts":[{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.9184588},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.91785717},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.78772765},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.78338397},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6898464},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6448338},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.55611664},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.48048225},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.48040918},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.47571713},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.35548335},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.11114025},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2920304","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08727497.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":false,"landing_page_url":"https://doaj.org/article/b7d68603ae954b87a7e2e74320992289","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2920304","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08727497.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61572165"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61803135"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61702150"}],"datasets":[],"versions":[],"referenced_works_count":26,"referenced_works":["https://openalex.org/W1955882805","https://openalex.org/W1973941018","https://openalex.org/W1976570511","https://openalex.org/W1979062288","https://openalex.org/W2004686575","https://openalex.org/W2009130368","https://openalex.org/W2018527949","https://openalex.org/W2059019537","https://openalex.org/W2059049081","https://openalex.org/W2078125794","https://openalex.org/W2092586622","https://openalex.org/W2102416023","https://openalex.org/W2124664712","https://openalex.org/W2154026545","https://openalex.org/W2170598445","https://openalex.org/W2193183414","https://openalex.org/W22271197","https://openalex.org/W2277839806","https://openalex.org/W2538511122","https://openalex.org/W2542290803","https://openalex.org/W2781513756","https://openalex.org/W2793291280","https://openalex.org/W2806199268","https://openalex.org/W2902524809","https://openalex.org/W2914042153","https://openalex.org/W2917353774"],"related_works":["https://openalex.org/W4309385482","https://openalex.org/W4243922849","https://openalex.org/W3154843532","https://openalex.org/W2939392096","https://openalex.org/W2930153478","https://openalex.org/W2182496537","https://openalex.org/W2148973528","https://openalex.org/W2106726851","https://openalex.org/W2068740952","https://openalex.org/W1716757876"],"abstract_inverted_index":{"Adaptive":[0],"steganography":[1,83,173],"has":[2,43],"become":[3],"unprecedentedly":[4],"prevalent":[5],"compared":[6],"with":[7,145],"non-adaptive":[8,49],"ones":[9],"due":[10],"to":[11,34,76,105,120,134,149],"its":[12],"remarkable":[13],"performance":[14],"when":[15],"resisting":[16],"modern":[17],"steganalysis.":[18],"It":[19],"prefers":[20],"hiding":[21],"bits":[22,57],"into":[23,130],"pixels":[24,79,107,168],"from":[25],"texture":[26,113],"regions":[27],"as":[28],"such":[29],"modification":[30,137,143],"is":[31],"considerably":[32],"difficult":[33],"detect.":[35],"Current":[36],"steganalysis":[37],"capable":[38],"of":[39,54,161],"locating":[40,55,166],"steganographic":[41,61,101],"payload":[42,129],"only":[44],"been":[45,65],"investigated":[46],"in":[47,84,108,165,174],"the":[48,52,85,109,126,131,136,142,151,159,171,175],"domain,":[50],"while":[51],"works":[53],"hidden":[56],"modified":[58,80,152,169],"by":[59,81,170],"adaptive":[60,82,100,172],"algorithms":[62],"have":[63,157],"not":[64],"studied":[66],"yet.":[67],"In":[68],"this":[69],"paper,":[70],"we":[71,97,140],"propose":[72],"a":[73,122,146],"novel":[74],"algorithm":[75,164],"locate":[77,150],"flipped":[78,167],"spatial":[86,176],"domain.":[87,177],"By":[88],"re-embedding":[89],"randomly":[90],"generated":[91],"messages":[92],"upon":[93],"one":[94],"single":[95],"image,":[96],"observe":[98],"that":[99],"methods":[102],"are":[103],"prone":[104],"modify":[106],"same":[110,127],"region,":[111],"namely":[112],"region.":[114],"Such":[115],"property":[116],"straightforward":[117],"inspires":[118],"us":[119],"re-embed":[121],"random":[123],"message":[124],"at":[125],"relative":[128],"stego":[132],"image":[133],"obtain":[135],"map.":[138],"Then,":[139],"extend":[141],"map":[144],"given":[147],"margin":[148],"pixels.":[153],"The":[154],"extensive":[155],"experiments":[156],"verified":[158],"effectiveness":[160],"our":[162],"designed":[163]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2947063299","counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2019,"cited_by_count":1}],"updated_date":"2024-11-27T06:59:29.937542","created_date":"2019-06-07"}