{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:43:34Z","timestamp":1740141814364,"version":"3.37.3"},"reference-count":27,"publisher":"SAGE Publications","issue":"11","license":[{"start":{"date-parts":[[2013,11,1]],"date-time":"2013-11-01T00:00:00Z","timestamp":1383264000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["20120192"],"award-info":[{"award-number":["20120192"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2013,11,1]]},"abstract":"<jats:p> It is very important to protect the copyright of digital images in wireless transmission, because people often use a smart phone in their daily life. Traditional security schemes are computationally expensive, and they introduce overhead, which shortens the life of the image sensors. In this paper, we present an Improved Matrix Encoding (IME) scheme for hiding data into a two-color binary image. Our proposed scheme improved the CPT scheme. In the CPT scheme, each block F of [Formula: see text] pixel of G is changed by at most two pixels for hiding data. CPT scheme's embedding rate is [Formula: see text]. The IME scheme is shown approximately as a [Formula: see text] embedding rate, while Tseng-Pan's modified CPT scheme (MCPT) is an [Formula: see text] embedding rate. Therefore, IME's embedding rate is higher than that of the MCPT scheme. In our experiment, we demonstrate that our proposed schemes are superior to those of the CPT and MCPT schemes. <\/jats:p>","DOI":"10.1155\/2013\/340963","type":"journal-article","created":{"date-parts":[[2013,11,19]],"date-time":"2013-11-19T00:54:32Z","timestamp":1384822472000},"page":"340963","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":4,"title":["Binary Image Data Hiding Using Matrix Encoding Technique in Sensors"],"prefix":"10.1177","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4412-4959","authenticated-orcid":false,"given":"Phan Trung","family":"Huy","sequence":"first","affiliation":[{"name":"Hanoi University of Science and Technology, 1 Dai Co Viet Road, Hanoi, Vietnam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5847-6736","authenticated-orcid":false,"given":"Cheonshik","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of of Digital Media Engineering, Anyang University, 708-113 Anyang 5-dong, Manan-gu, Anyang-shi, Kyonggi-do 430-714, Republic of Korea"}]}],"member":"179","published-online":{"date-parts":[[2013,11,18]]},"reference":[{"issue":"2","key":"B1-2013-340963","first-page":"25","volume":"3","author":"Truong T. T.","year":"2012","journal-title":"Journal of Convergence"},{"issue":"3","key":"B2-2013-340963","first-page":"23","volume":"3","author":"Tsai C. L.","year":"2012","journal-title":"Journal of Convergence"},{"issue":"4","key":"B3-2013-340963","first-page":"29","volume":"3","author":"Chen C. W.","year":"2012","journal-title":"Journal of Convergence"},{"issue":"16","key":"B4-2013-340963","first-page":"1","volume":"2","author":"Sharma M. J.","year":"2012","journal-title":"Human-Centric Computing and Information Sciences"},{"issue":"2","key":"B5-2013-340963","first-page":"1","volume":"3","author":"Luo Y.","year":"2013","journal-title":"Human-Centric Computing and Information Sciences"},{"issue":"13","key":"B6-2013-340963","first-page":"1","volume":"2","author":"Singh B.","year":"2012","journal-title":"Human-Centric Computing and Information Sciences"},{"key":"B7-2013-340963","doi-asserted-by":"publisher","DOI":"10.3745\/JIPS.2012.8.2.375"},{"key":"B8-2013-340963","doi-asserted-by":"publisher","DOI":"10.3745\/JIPS.2013.9.2.247"},{"key":"B9-2013-340963","doi-asserted-by":"publisher","DOI":"10.3745\/JIPS.2013.9.2.271"},{"key":"B10-2013-340963","doi-asserted-by":"publisher","DOI":"10.3390\/s100302450"},{"key":"B11-2013-340963","doi-asserted-by":"publisher","DOI":"10.3390\/s100100822"},{"key":"B12-2013-340963","doi-asserted-by":"publisher","DOI":"10.3390\/s90705324"},{"key":"B13-2013-340963","doi-asserted-by":"publisher","DOI":"10.3390\/s110504767"},{"issue":"1","key":"B14-2013-340963","first-page":"43","volume":"2","author":"Meghanathan N.","year":"2010","journal-title":"International Journal of Network Security & Its Application"},{"first-page":"2318","volume-title":"Proceedings of the IEEE Interntional Conference on Acoustics, Speech, and Signal Processing","author":"Fu M. S.","key":"B15-2013-340963"},{"key":"B16-2013-340963","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2005.1530245"},{"key":"B17-2013-340963","doi-asserted-by":"publisher","DOI":"10.1117\/12.435420"},{"key":"B18-2013-340963","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.03.001"},{"key":"B19-2013-340963","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2004.830814"},{"first-page":"887","volume-title":"Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies","author":"Tseng Y.-C.","key":"B20-2013-340963"},{"key":"B21-2013-340963","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1007\/978-3-540-31979-5_29","volume-title":"Proceedings of the 1st International Conference on Information Security, Practice and Experience (ISPEC '05)","volume":"3439","author":"Chang C.-C."},{"first-page":"1","volume-title":"Proceedings of the 19th International Conference on Pattern Recognition (ICPR '08)","author":"Guorong X.","key":"B22-2013-340963"},{"key":"B27-2013-340963","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2008.09.014"},{"first-page":"750","volume-title":"Proceedings of the 5th IEEE Symposium on Computers and Communications (ISCC '00)","author":"Chen Y.","key":"B23-2013-340963"},{"volume-title":"Proceedings of International Symposium on Multimedia Information Processing","author":"Wu M. Y.","key":"B24-2013-340963"},{"first-page":"24","volume-title":"Proceedings of the 11th International CSI Computer Conference","author":"Mirsattari N.","key":"B25-2013-340963"},{"first-page":"32","volume-title":"Pacific Rim Workshop on Digital Steganography","author":"Hioki H.","key":"B26-2013-340963"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/340963","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2013\/340963","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/340963","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T21:24:57Z","timestamp":1621200297000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2013\/340963"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,1]]},"references-count":27,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2013,11,1]]}},"alternative-id":["10.1155\/2013\/340963"],"URL":"https:\/\/doi.org\/10.1155\/2013\/340963","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2013,11,1]]}}}