{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T04:35:59Z","timestamp":1754195759304,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T00:00:00Z","timestamp":1663891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the National Natural Science Foundation of China","award":["No. 62202377"],"award-info":[{"award-number":["No. 62202377"]}]},{"name":"the Natural Science Basic Research Plan of Shaanxi Province of China","award":["No. 2021JM-463"],"award-info":[{"award-number":["No. 2021JM-463"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,9,23]]},"DOI":"10.1145\/3573942.3574064","type":"proceedings-article","created":{"date-parts":[[2023,5,16]],"date-time":"2023-05-16T23:45:42Z","timestamp":1684280742000},"page":"572-580","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Reversible Data Hiding Algorithm for Binary Image Based on Sliding Window"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8442-4251","authenticated-orcid":false,"given":"Fang","family":"Ren","sequence":"first","affiliation":[{"name":"School of Cyberspace Security, Xi'an University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7938-362X","authenticated-orcid":false,"given":"Qiang","family":"Li","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Xi'an University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7413-7988","authenticated-orcid":false,"given":"Yuge","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Xi'an University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7343-5812","authenticated-orcid":false,"given":"Xinyi","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, China"}]}],"member":"320","published-online":{"date-parts":[[2023,5,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3158416"},{"issue":"3","key":"e_1_3_2_1_2_1","first-page":"31","article-title":"the Road Ahead[J]","volume":"20","author":"Krzysztof C","year":"2018","unstructured":"Krzysztof C , Luca C , Wojciech M , The New Threats of Information Hiding: the Road Ahead[J]. It Professional, 2018, 20(3):31-39.","journal-title":"It Professional"},{"key":"e_1_3_2_1_3_1","first-page":"1","volume":"2019","author":"Liu X","unstructured":"Liu X , Lu W , Zhang Q , Downscaling Factor Estimation on Pre-JPEG Compressed Images[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2019, PP(99):1-1.","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"e_1_3_2_1_4_1","volume-title":"Distance-reciprocal distortion measure for binary document images[J]","author":"Haiping","year":"2004","unstructured":"Haiping, Lu, Kot, Distance-reciprocal distortion measure for binary document images[J]. IEEE signal processing letters, 2004, 11(2):228-231."},{"key":"e_1_3_2_1_5_1","volume-title":"A Survey on Reversible Watermarking for Multimedia Content: A Robustness Overview[J]","author":"Menendez-Ortiz A","year":"2019","unstructured":"Menendez-Ortiz A , Feregrino-Uribe C , Hasimoto-Beltran R,et al. A Survey on Reversible Watermarking for Multimedia Content: A Robustness Overview[J]. IEEE Access, 2019."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2573308"},{"key":"e_1_3_2_1_7_1","first-page":"1139","article-title":"A survey paper on various reversible data hiding techniques in encrypted images[C]\/\/2015 IEEE International Advance Computing Conference (IACC)","volume":"2015","author":"Sivadasan E T","unstructured":"Sivadasan E T. A survey paper on various reversible data hiding techniques in encrypted images[C]\/\/2015 IEEE International Advance Computing Conference (IACC). IEEE, 2015: 1139-1143.","journal-title":"IEEE"},{"issue":"01","key":"e_1_3_2_1_8_1","first-page":"245","article-title":"High-capacity reversible data hiding in encrypted images based on prediction error dual coding [J].","volume":"39","author":"Qin Baokun","year":"2022","unstructured":"Qin Baokun, Zheng Hongying, Xiao Di. High-capacity reversible data hiding in encrypted images based on prediction error dual coding [J].Application Research of Computers, 2022,39(01):245-248.","journal-title":"Application Research of Computers"},{"issue":"12","key":"e_1_3_2_1_9_1","first-page":"3756","article-title":"High capacity reversible data hiding inencrypted image based on Peano curve scanning[J]","volume":"38","author":"Ge Yu","year":"2021","unstructured":"Ge Yu, Zhang Minqing, Yangpan. High capacity reversible data hiding inencrypted image based on Peano curve scanning[J]. Application Research of Computers, 2021,38(12):3756-3759.","journal-title":"Application Research of Computers"},{"key":"e_1_3_2_1_10_1","first-page":"183","article-title":"Digital Watermarking and Steganography[J]","volume":"2008","author":"Chen K","unstructured":"Chen K . Digital Watermarking and Steganography[J]. Digital Watermarking & Steganography,2008,75 (15 Supplement) :183\u2013212.","journal-title":"Digital Watermarking & Steganography"},{"key":"e_1_3_2_1_11_1","first-page":"393","volume-title":"ICME2000","author":"Wu M","year":"2000","unstructured":"Wu M, Tang E, Lin B. Data hiding in digital binary image[C]\/\/2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No. 00TH8532). IEEE, 2000, 1: 393-396."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2002.801488"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2004.830814"},{"issue":"11","key":"e_1_3_2_1_14_1","first-page":"2409","article-title":"Data Hiding in Binary Images [J]","volume":"37","author":"Guo Meng","year":"2009","unstructured":"Guo Meng, Zhang Hong-bin, Wei Lei. Data Hiding in Binary Images [J]. Acta Electronica Sinica, 2009, 37(11): 2409-2415.","journal-title":"Acta Electronica Sinica"},{"volume-title":"Information hiding in scanned binary image of chinese characters[C]\/\/Proceedings of the 5th International Conference on Multimedia and Image Processing. 2020: 92-95","author":"Wen W.","key":"e_1_3_2_1_15_1","unstructured":"Wen W. Information hiding in scanned binary image of chinese characters[C]\/\/Proceedings of the 5th International Conference on Multimedia and Image Processing. 2020: 92-95."},{"issue":"4","key":"e_1_3_2_1_16_1","first-page":"951","article-title":"A new data hiding algorithm based on minesweeper game for binary images [J]","volume":"31","author":"Tuncer T","year":"2016","unstructured":"Tuncer T , Avci D , Avci E . A new data hiding algorithm based on minesweeper game for binary images [J]. Journal of the Faculty of Engineering and Architecture of Gazi University, 2016, 31(4):951-959.","journal-title":"Journal of the Faculty of Engineering and Architecture of Gazi University"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2368364"},{"key":"e_1_3_2_1_18_1","volume-title":"Lossless Data Hiding for Binary Document Images Using n-Pairs Pattern[C]\/\/International conference on information security and cryptology","author":"Kim C","year":"2014","unstructured":"Kim C, Baek J, Fisher P S. Lossless Data Hiding for Binary Document Images Using n-Pairs Pattern[C]\/\/International conference on information security and cryptology. Springer, Cham, 2014: 317-327."},{"key":"e_1_3_2_1_19_1","volume-title":"Reversible data hiding method based on exclusive-or with two host images[C]\/\/2014 International Conference on Trustworthy Systems and their Applications","author":"Yang C H T","year":"2014","unstructured":"Yang C H T, Hsu Y T, Wu C C, Reversible data hiding method based on exclusive-or with two host images[C]\/\/2014 International Conference on Trustworthy Systems and their Applications. IEEE, 2014: 69-74."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2020.102816"},{"key":"e_1_3_2_1_21_1","volume-title":"Reversible data hiding in binary images by symmetrical flipping degree histogram modification[C]\/\/International Conference on Security with Intelligent Computing and Big-data Services","author":"Yin X","year":"2018","unstructured":"Yin X, Lu W, Liu W, Reversible data hiding in binary images by symmetrical flipping degree histogram modification[C]\/\/International Conference on Security with Intelligent Computing and Big-data Services. Springer, Cham, 2018: 891-903."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-7519-2"}],"event":{"name":"AIPR 2022: 2022 5th International Conference on Artificial Intelligence and Pattern Recognition","acronym":"AIPR 2022","location":"Xiamen China"},"container-title":["Proceedings of the 2022 5th International Conference on Artificial Intelligence and Pattern Recognition"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3573942.3574064","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3573942.3574064","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:32Z","timestamp":1750186952000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3573942.3574064"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,23]]},"references-count":22,"alternative-id":["10.1145\/3573942.3574064","10.1145\/3573942"],"URL":"https:\/\/doi.org\/10.1145\/3573942.3574064","relation":{},"subject":[],"published":{"date-parts":[[2022,9,23]]},"assertion":[{"value":"2023-05-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}