Counterfeiting Attacks on an RDH-EI Scheme Based on Block-Permutation and Co-XOR Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.1145/3719294
Reversible data hiding in encrypted images (RDH-EI) has gained widespread attention due to its potential applications in secure cloud storage. However, the security challenges of RDH-EI in cloud storage scenarios remain largely unexplored. In this article, we present a counterfeiting attack on RDH-EI schemes that utilize block-permutation and Co-XOR (BPCX) encryption. We demonstrate that ciphertext images generated by BPCX-based RDH-EI are easily tampered with to produce a counterfeit decrypted image with different contents imperceptible to the human eye. This vulnerability is mainly because the block permutation key information of BPCX is susceptible to known-plaintext attacks (KPAs). Taking ciphertext images in telemedicine scenarios as an example, we describe two potential counterfeiting attacks, namely fixed-area and optimal-area attacks. We show that the quality of forged decrypted images depends on the accuracy of the estimated block-permutation key under KPA conditions. To improve the invisibility of counterfeit decrypted images, we analyze the limitations of existing KPA methods against BPCX encryption for \(2\times 2\) block sizes and propose a novel diagonal inversion rule specifically designed for image blocks. This rule further enhances the accuracy of the estimated block-permutation key. The experiments show that, compared to existing KPA methods, the accuracy of the estimated block-permutation key in the UCID dataset increases by an average of 11.5%. In the counterfeiting attack experiments on Camera’s encrypted image, we successfully tampered with over 80% of the pixels in the target area under the fixed-region attack. Additionally, we achieved a tampering success rate exceeding 90% in the optimal-region attack.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1145/3719294
- https://dl.acm.org/doi/pdf/10.1145/3719294
- OA Status
- bronze
- References
- 28
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4407924473
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4407924473Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1145/3719294Digital Object Identifier
- Title
-
Counterfeiting Attacks on an RDH-EI Scheme Based on Block-Permutation and Co-XORWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-02-25Full publication date if available
- Authors
-
Fan Chen, Lingfeng Qu, Hadi Amirpour, Christian Timmerer, Hongjie HeList of authors in order
- Landing page
-
https://doi.org/10.1145/3719294Publisher landing page
- PDF URL
-
https://dl.acm.org/doi/pdf/10.1145/3719294Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
bronzeOpen access status per OpenAlex
- OA URL
-
https://dl.acm.org/doi/pdf/10.1145/3719294Direct OA link when available
- Concepts
-
Computer science, Block (permutation group theory), Permutation (music), Scheme (mathematics), Bitwise operation, Block cipher, Theoretical computer science, Algorithm, Computer security, Cryptography, Arithmetic, Mathematics, Combinatorics, Programming language, Physics, Mathematical analysis, AcousticsTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
28Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4407924473 |
|---|---|
| doi | https://doi.org/10.1145/3719294 |
| ids.doi | https://doi.org/10.1145/3719294 |
| ids.openalex | https://openalex.org/W4407924473 |
| fwci | 0.0 |
| type | article |
| title | Counterfeiting Attacks on an RDH-EI Scheme Based on Block-Permutation and Co-XOR |
| biblio.issue | 4 |
| biblio.volume | 21 |
| biblio.last_page | 25 |
| biblio.first_page | 1 |
| topics[0].id | https://openalex.org/T10388 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 1.0 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1707 |
| topics[0].subfield.display_name | Computer Vision and Pattern Recognition |
| topics[0].display_name | Advanced Steganography and Watermarking Techniques |
| topics[1].id | https://openalex.org/T11017 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9984999895095825 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1707 |
| topics[1].subfield.display_name | Computer Vision and Pattern Recognition |
| topics[1].display_name | Chaos-based Image/Signal Encryption |
| topics[2].id | https://openalex.org/T12357 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9807999730110168 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1707 |
| topics[2].subfield.display_name | Computer Vision and Pattern Recognition |
| topics[2].display_name | Digital Media Forensic Detection |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.8170762062072754 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C2777210771 |
| concepts[1].level | 2 |
| concepts[1].score | 0.6418317556381226 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q4927124 |
| concepts[1].display_name | Block (permutation group theory) |
| concepts[2].id | https://openalex.org/C21308566 |
| concepts[2].level | 2 |
| concepts[2].score | 0.6285946369171143 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q7169365 |
| concepts[2].display_name | Permutation (music) |
| concepts[3].id | https://openalex.org/C77618280 |
| concepts[3].level | 2 |
| concepts[3].score | 0.5788725018501282 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q1155772 |
| concepts[3].display_name | Scheme (mathematics) |
| concepts[4].id | https://openalex.org/C134765980 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5295000076293945 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q879126 |
| concepts[4].display_name | Bitwise operation |
| concepts[5].id | https://openalex.org/C106544461 |
| concepts[5].level | 3 |
| concepts[5].score | 0.458015114068985 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q543151 |
| concepts[5].display_name | Block cipher |
| concepts[6].id | https://openalex.org/C80444323 |
| concepts[6].level | 1 |
| concepts[6].score | 0.4335331320762634 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q2878974 |
| concepts[6].display_name | Theoretical computer science |
| concepts[7].id | https://openalex.org/C11413529 |
| concepts[7].level | 1 |
| concepts[7].score | 0.4099043607711792 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q8366 |
| concepts[7].display_name | Algorithm |
| concepts[8].id | https://openalex.org/C38652104 |
| concepts[8].level | 1 |
| concepts[8].score | 0.39365154504776 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[8].display_name | Computer security |
| concepts[9].id | https://openalex.org/C178489894 |
| concepts[9].level | 2 |
| concepts[9].score | 0.36826324462890625 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q8789 |
| concepts[9].display_name | Cryptography |
| concepts[10].id | https://openalex.org/C94375191 |
| concepts[10].level | 1 |
| concepts[10].score | 0.33961325883865356 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q11205 |
| concepts[10].display_name | Arithmetic |
| concepts[11].id | https://openalex.org/C33923547 |
| concepts[11].level | 0 |
| concepts[11].score | 0.11753711104393005 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[11].display_name | Mathematics |
| concepts[12].id | https://openalex.org/C114614502 |
| concepts[12].level | 1 |
| concepts[12].score | 0.08602014183998108 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q76592 |
| concepts[12].display_name | Combinatorics |
| concepts[13].id | https://openalex.org/C199360897 |
| concepts[13].level | 1 |
| concepts[13].score | 0.08433201909065247 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q9143 |
| concepts[13].display_name | Programming language |
| concepts[14].id | https://openalex.org/C121332964 |
| concepts[14].level | 0 |
| concepts[14].score | 0.0 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q413 |
| concepts[14].display_name | Physics |
| concepts[15].id | https://openalex.org/C134306372 |
| concepts[15].level | 1 |
| concepts[15].score | 0.0 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q7754 |
| concepts[15].display_name | Mathematical analysis |
| concepts[16].id | https://openalex.org/C24890656 |
| concepts[16].level | 1 |
| concepts[16].score | 0.0 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q82811 |
| concepts[16].display_name | Acoustics |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.8170762062072754 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/block |
| keywords[1].score | 0.6418317556381226 |
| keywords[1].display_name | Block (permutation group theory) |
| keywords[2].id | https://openalex.org/keywords/permutation |
| keywords[2].score | 0.6285946369171143 |
| keywords[2].display_name | Permutation (music) |
| keywords[3].id | https://openalex.org/keywords/scheme |
| keywords[3].score | 0.5788725018501282 |
| keywords[3].display_name | Scheme (mathematics) |
| keywords[4].id | https://openalex.org/keywords/bitwise-operation |
| keywords[4].score | 0.5295000076293945 |
| keywords[4].display_name | Bitwise operation |
| keywords[5].id | https://openalex.org/keywords/block-cipher |
| keywords[5].score | 0.458015114068985 |
| keywords[5].display_name | Block cipher |
| keywords[6].id | https://openalex.org/keywords/theoretical-computer-science |
| keywords[6].score | 0.4335331320762634 |
| keywords[6].display_name | Theoretical computer science |
| keywords[7].id | https://openalex.org/keywords/algorithm |
| keywords[7].score | 0.4099043607711792 |
| keywords[7].display_name | Algorithm |
| keywords[8].id | https://openalex.org/keywords/computer-security |
| keywords[8].score | 0.39365154504776 |
| keywords[8].display_name | Computer security |
| keywords[9].id | https://openalex.org/keywords/cryptography |
| keywords[9].score | 0.36826324462890625 |
| keywords[9].display_name | Cryptography |
| keywords[10].id | https://openalex.org/keywords/arithmetic |
| keywords[10].score | 0.33961325883865356 |
| keywords[10].display_name | Arithmetic |
| keywords[11].id | https://openalex.org/keywords/mathematics |
| keywords[11].score | 0.11753711104393005 |
| keywords[11].display_name | Mathematics |
| keywords[12].id | https://openalex.org/keywords/combinatorics |
| keywords[12].score | 0.08602014183998108 |
| keywords[12].display_name | Combinatorics |
| keywords[13].id | https://openalex.org/keywords/programming-language |
| keywords[13].score | 0.08433201909065247 |
| keywords[13].display_name | Programming language |
| language | en |
| locations[0].id | doi:10.1145/3719294 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S19610489 |
| locations[0].source.issn | 1551-6857, 1551-6865 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 1551-6857 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | ACM Transactions on Multimedia Computing Communications and Applications |
| locations[0].source.host_organization | https://openalex.org/P4310319798 |
| locations[0].source.host_organization_name | Association for Computing Machinery |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319798 |
| locations[0].source.host_organization_lineage_names | Association for Computing Machinery |
| locations[0].license | |
| locations[0].pdf_url | https://dl.acm.org/doi/pdf/10.1145/3719294 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | ACM Transactions on Multimedia Computing, Communications, and Applications |
| locations[0].landing_page_url | https://doi.org/10.1145/3719294 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5100766720 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-2909-0295 |
| authorships[0].author.display_name | Fan Chen |
| authorships[0].countries | CN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I4800084 |
| authorships[0].affiliations[0].raw_affiliation_string | School of Computing and Artificial Intelligence, Southwest Jiaotong University, China |
| authorships[0].institutions[0].id | https://openalex.org/I4800084 |
| authorships[0].institutions[0].ror | https://ror.org/00hn7w693 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I4800084 |
| authorships[0].institutions[0].country_code | CN |
| authorships[0].institutions[0].display_name | Southwest Jiaotong University |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Fan Chen |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | School of Computing and Artificial Intelligence, Southwest Jiaotong University, China |
| authorships[1].author.id | https://openalex.org/A5072151673 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-2544-4324 |
| authorships[1].author.display_name | Lingfeng Qu |
| authorships[1].countries | CN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I37987034 |
| authorships[1].affiliations[0].raw_affiliation_string | Cyberspace Institute of Advanced Technology, Guangzhou University, China |
| authorships[1].institutions[0].id | https://openalex.org/I37987034 |
| authorships[1].institutions[0].ror | https://ror.org/05ar8rn06 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I37987034 |
| authorships[1].institutions[0].country_code | CN |
| authorships[1].institutions[0].display_name | Guangzhou University |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Lingfeng Qu |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Cyberspace Institute of Advanced Technology, Guangzhou University, China |
| authorships[2].author.id | https://openalex.org/A5063653867 |
| authorships[2].author.orcid | https://orcid.org/0000-0001-9853-1720 |
| authorships[2].author.display_name | Hadi Amirpour |
| authorships[2].countries | AT |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I4210166741 |
| authorships[2].affiliations[0].raw_affiliation_string | Christian Doppler Laboratory ATHENA, Institute of Information Technology (ITEC), University of Klagenfurt, Austria |
| authorships[2].institutions[0].id | https://openalex.org/I4210166741 |
| authorships[2].institutions[0].ror | https://ror.org/05q9m0937 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I4210166741 |
| authorships[2].institutions[0].country_code | AT |
| authorships[2].institutions[0].display_name | University of Klagenfurt |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Hadi Amirpour |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Christian Doppler Laboratory ATHENA, Institute of Information Technology (ITEC), University of Klagenfurt, Austria |
| authorships[3].author.id | https://openalex.org/A5057862649 |
| authorships[3].author.orcid | https://orcid.org/0000-0002-0031-5243 |
| authorships[3].author.display_name | Christian Timmerer |
| authorships[3].countries | AT |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I4210166741 |
| authorships[3].affiliations[0].raw_affiliation_string | Christian Doppler Laboratory ATHENA, Institute of Information Technology (ITEC), University of Klagenfurt, Austria |
| authorships[3].institutions[0].id | https://openalex.org/I4210166741 |
| authorships[3].institutions[0].ror | https://ror.org/05q9m0937 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I4210166741 |
| authorships[3].institutions[0].country_code | AT |
| authorships[3].institutions[0].display_name | University of Klagenfurt |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Christian Timmerer |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | Christian Doppler Laboratory ATHENA, Institute of Information Technology (ITEC), University of Klagenfurt, Austria |
| authorships[4].author.id | https://openalex.org/A5101735957 |
| authorships[4].author.orcid | https://orcid.org/0000-0003-2683-0419 |
| authorships[4].author.display_name | Hongjie He |
| authorships[4].countries | CN |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I4800084 |
| authorships[4].affiliations[0].raw_affiliation_string | School of Information Science and Technology, Southwest Jiaotong University, China |
| authorships[4].institutions[0].id | https://openalex.org/I4800084 |
| authorships[4].institutions[0].ror | https://ror.org/00hn7w693 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I4800084 |
| authorships[4].institutions[0].country_code | CN |
| authorships[4].institutions[0].display_name | Southwest Jiaotong University |
| authorships[4].author_position | last |
| authorships[4].raw_author_name | Hongjie He |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | School of Information Science and Technology, Southwest Jiaotong University, China |
| has_content.pdf | True |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://dl.acm.org/doi/pdf/10.1145/3719294 |
| open_access.oa_status | bronze |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Counterfeiting Attacks on an RDH-EI Scheme Based on Block-Permutation and Co-XOR |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10388 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 1.0 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1707 |
| primary_topic.subfield.display_name | Computer Vision and Pattern Recognition |
| primary_topic.display_name | Advanced Steganography and Watermarking Techniques |
| related_works | https://openalex.org/W1594590521, https://openalex.org/W1757511069, https://openalex.org/W3148559665, https://openalex.org/W4206055950, https://openalex.org/W3092209506, https://openalex.org/W4390187709, https://openalex.org/W4226291662, https://openalex.org/W2393540888, https://openalex.org/W3029663907, https://openalex.org/W369300053 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.1145/3719294 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S19610489 |
| best_oa_location.source.issn | 1551-6857, 1551-6865 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 1551-6857 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | ACM Transactions on Multimedia Computing Communications and Applications |
| best_oa_location.source.host_organization | https://openalex.org/P4310319798 |
| best_oa_location.source.host_organization_name | Association for Computing Machinery |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310319798 |
| best_oa_location.source.host_organization_lineage_names | Association for Computing Machinery |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://dl.acm.org/doi/pdf/10.1145/3719294 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | ACM Transactions on Multimedia Computing, Communications, and Applications |
| best_oa_location.landing_page_url | https://doi.org/10.1145/3719294 |
| primary_location.id | doi:10.1145/3719294 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S19610489 |
| primary_location.source.issn | 1551-6857, 1551-6865 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 1551-6857 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | ACM Transactions on Multimedia Computing Communications and Applications |
| primary_location.source.host_organization | https://openalex.org/P4310319798 |
| primary_location.source.host_organization_name | Association for Computing Machinery |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319798 |
| primary_location.source.host_organization_lineage_names | Association for Computing Machinery |
| primary_location.license | |
| primary_location.pdf_url | https://dl.acm.org/doi/pdf/10.1145/3719294 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | ACM Transactions on Multimedia Computing, Communications, and Applications |
| primary_location.landing_page_url | https://doi.org/10.1145/3719294 |
| publication_date | 2025-02-25 |
| publication_year | 2025 |
| referenced_works | https://openalex.org/W2403682575, https://openalex.org/W2170269447, https://openalex.org/W1998279455, https://openalex.org/W2793696846, https://openalex.org/W4389665278, https://openalex.org/W4402474076, https://openalex.org/W4401210709, https://openalex.org/W4399039713, https://openalex.org/W2779077998, https://openalex.org/W2806483402, https://openalex.org/W2508016950, https://openalex.org/W2779146554, https://openalex.org/W2534300561, https://openalex.org/W2792958464, https://openalex.org/W2950377098, https://openalex.org/W2942420070, https://openalex.org/W3135307667, https://openalex.org/W3135976016, https://openalex.org/W4389670653, https://openalex.org/W2008604527, https://openalex.org/W4252343056, https://openalex.org/W2190925335, https://openalex.org/W3048575494, https://openalex.org/W3147162255, https://openalex.org/W4390578468, https://openalex.org/W3175406864, https://openalex.org/W2759097583, https://openalex.org/W4312748513 |
| referenced_works_count | 28 |
| abstract_inverted_index.a | 38, 66, 163, 239 |
| abstract_inverted_index.In | 33, 210 |
| abstract_inverted_index.To | 137 |
| abstract_inverted_index.We | 51, 116 |
| abstract_inverted_index.an | 103, 206 |
| abstract_inverted_index.as | 102 |
| abstract_inverted_index.by | 57, 205 |
| abstract_inverted_index.in | 3, 16, 26, 99, 200, 228, 245 |
| abstract_inverted_index.is | 80, 90 |
| abstract_inverted_index.of | 24, 88, 121, 129, 141, 149, 179, 195, 208, 225 |
| abstract_inverted_index.on | 41, 126, 215 |
| abstract_inverted_index.to | 12, 64, 74, 92, 189 |
| abstract_inverted_index.we | 36, 105, 145, 219, 237 |
| abstract_inverted_index.2\) | 158 |
| abstract_inverted_index.80% | 224 |
| abstract_inverted_index.90% | 244 |
| abstract_inverted_index.KPA | 135, 151, 191 |
| abstract_inverted_index.The | 184 |
| abstract_inverted_index.and | 47, 113, 161 |
| abstract_inverted_index.are | 60 |
| abstract_inverted_index.due | 11 |
| abstract_inverted_index.for | 156, 170 |
| abstract_inverted_index.has | 7 |
| abstract_inverted_index.its | 13 |
| abstract_inverted_index.key | 86, 133, 199 |
| abstract_inverted_index.the | 21, 75, 83, 119, 127, 130, 139, 147, 177, 180, 193, 196, 201, 211, 226, 229, 233, 246 |
| abstract_inverted_index.two | 107 |
| abstract_inverted_index.BPCX | 89, 154 |
| abstract_inverted_index.This | 78, 173 |
| abstract_inverted_index.UCID | 202 |
| abstract_inverted_index.area | 231 |
| abstract_inverted_index.data | 1 |
| abstract_inverted_index.eye. | 77 |
| abstract_inverted_index.key. | 183 |
| abstract_inverted_index.over | 223 |
| abstract_inverted_index.rate | 242 |
| abstract_inverted_index.rule | 167, 174 |
| abstract_inverted_index.show | 117, 186 |
| abstract_inverted_index.that | 44, 53, 118 |
| abstract_inverted_index.this | 34 |
| abstract_inverted_index.with | 63, 70, 222 |
| abstract_inverted_index.block | 84, 159 |
| abstract_inverted_index.cloud | 18, 27 |
| abstract_inverted_index.human | 76 |
| abstract_inverted_index.image | 69, 171 |
| abstract_inverted_index.novel | 164 |
| abstract_inverted_index.sizes | 160 |
| abstract_inverted_index.that, | 187 |
| abstract_inverted_index.under | 134, 232 |
| abstract_inverted_index.(BPCX) | 49 |
| abstract_inverted_index.11.5%. | 209 |
| abstract_inverted_index.Co-XOR | 48 |
| abstract_inverted_index.RDH-EI | 25, 42, 59 |
| abstract_inverted_index.Taking | 96 |
| abstract_inverted_index.attack | 40, 213 |
| abstract_inverted_index.easily | 61 |
| abstract_inverted_index.forged | 122 |
| abstract_inverted_index.gained | 8 |
| abstract_inverted_index.hiding | 2 |
| abstract_inverted_index.image, | 218 |
| abstract_inverted_index.images | 5, 55, 98, 124 |
| abstract_inverted_index.mainly | 81 |
| abstract_inverted_index.namely | 111 |
| abstract_inverted_index.pixels | 227 |
| abstract_inverted_index.remain | 30 |
| abstract_inverted_index.secure | 17 |
| abstract_inverted_index.target | 230 |
| abstract_inverted_index.(KPAs). | 95 |
| abstract_inverted_index.against | 153 |
| abstract_inverted_index.analyze | 146 |
| abstract_inverted_index.attack. | 235, 248 |
| abstract_inverted_index.attacks | 94 |
| abstract_inverted_index.average | 207 |
| abstract_inverted_index.because | 82 |
| abstract_inverted_index.blocks. | 172 |
| abstract_inverted_index.dataset | 203 |
| abstract_inverted_index.depends | 125 |
| abstract_inverted_index.further | 175 |
| abstract_inverted_index.images, | 144 |
| abstract_inverted_index.improve | 138 |
| abstract_inverted_index.largely | 31 |
| abstract_inverted_index.methods | 152 |
| abstract_inverted_index.present | 37 |
| abstract_inverted_index.produce | 65 |
| abstract_inverted_index.propose | 162 |
| abstract_inverted_index.quality | 120 |
| abstract_inverted_index.schemes | 43 |
| abstract_inverted_index.storage | 28 |
| abstract_inverted_index.success | 241 |
| abstract_inverted_index.utilize | 45 |
| abstract_inverted_index.(RDH-EI) | 6 |
| abstract_inverted_index.However, | 20 |
| abstract_inverted_index.accuracy | 128, 178, 194 |
| abstract_inverted_index.achieved | 238 |
| abstract_inverted_index.article, | 35 |
| abstract_inverted_index.attacks, | 110 |
| abstract_inverted_index.attacks. | 115 |
| abstract_inverted_index.compared | 188 |
| abstract_inverted_index.contents | 72 |
| abstract_inverted_index.describe | 106 |
| abstract_inverted_index.designed | 169 |
| abstract_inverted_index.diagonal | 165 |
| abstract_inverted_index.enhances | 176 |
| abstract_inverted_index.example, | 104 |
| abstract_inverted_index.existing | 150, 190 |
| abstract_inverted_index.methods, | 192 |
| abstract_inverted_index.security | 22 |
| abstract_inverted_index.storage. | 19 |
| abstract_inverted_index.tampered | 62, 221 |
| abstract_inverted_index.\(2\times | 157 |
| abstract_inverted_index.attention | 10 |
| abstract_inverted_index.decrypted | 68, 123, 143 |
| abstract_inverted_index.different | 71 |
| abstract_inverted_index.encrypted | 4, 217 |
| abstract_inverted_index.estimated | 131, 181, 197 |
| abstract_inverted_index.exceeding | 243 |
| abstract_inverted_index.generated | 56 |
| abstract_inverted_index.increases | 204 |
| abstract_inverted_index.inversion | 166 |
| abstract_inverted_index.potential | 14, 108 |
| abstract_inverted_index.scenarios | 29, 101 |
| abstract_inverted_index.tampering | 240 |
| abstract_inverted_index.BPCX-based | 58 |
| abstract_inverted_index.Camera’s | 216 |
| abstract_inverted_index.Reversible | 0 |
| abstract_inverted_index.challenges | 23 |
| abstract_inverted_index.ciphertext | 54, 97 |
| abstract_inverted_index.encryption | 155 |
| abstract_inverted_index.fixed-area | 112 |
| abstract_inverted_index.widespread | 9 |
| abstract_inverted_index.conditions. | 136 |
| abstract_inverted_index.counterfeit | 67, 142 |
| abstract_inverted_index.demonstrate | 52 |
| abstract_inverted_index.encryption. | 50 |
| abstract_inverted_index.experiments | 185, 214 |
| abstract_inverted_index.information | 87 |
| abstract_inverted_index.limitations | 148 |
| abstract_inverted_index.permutation | 85 |
| abstract_inverted_index.susceptible | 91 |
| abstract_inverted_index.unexplored. | 32 |
| abstract_inverted_index.applications | 15 |
| abstract_inverted_index.fixed-region | 234 |
| abstract_inverted_index.invisibility | 140 |
| abstract_inverted_index.optimal-area | 114 |
| abstract_inverted_index.specifically | 168 |
| abstract_inverted_index.successfully | 220 |
| abstract_inverted_index.telemedicine | 100 |
| abstract_inverted_index.Additionally, | 236 |
| abstract_inverted_index.imperceptible | 73 |
| abstract_inverted_index.vulnerability | 79 |
| abstract_inverted_index.counterfeiting | 39, 109, 212 |
| abstract_inverted_index.optimal-region | 247 |
| abstract_inverted_index.known-plaintext | 93 |
| abstract_inverted_index.block-permutation | 46, 132, 182, 198 |
| cited_by_percentile_year | |
| countries_distinct_count | 2 |
| institutions_distinct_count | 5 |
| citation_normalized_percentile.value | 0.04461823 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |