{"id":"https://openalex.org/W1831735443","doi":"https://doi.org/10.1002/dac.2547","title":"JPEG forensics scheme for signature embedding and packet\u2010level detection","display_name":"JPEG forensics scheme for signature embedding and packet\u2010level detection","publication_year":2013,"publication_date":"2013-06-27","ids":{"openalex":"https://openalex.org/W1831735443","doi":"https://doi.org/10.1002/dac.2547","mag":"1831735443"},"language":"en","primary_location":{"id":"doi:10.1002/dac.2547","is_oa":false,"landing_page_url":"https://doi.org/10.1002/dac.2547","pdf_url":null,"source":{"id":"https://openalex.org/S175310385","display_name":"International Journal of Communication Systems","issn_l":"1074-5351","issn":["1074-5351","1099-1131"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Communication Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113518610","display_name":"Che\u2010Jen Hsieh","orcid":null},"institutions":[{"id":"https://openalex.org/I4210137066","display_name":"Far East University","ror":"https://ror.org/03ms7mr17","country_code":"TW","type":"education","lineage":["https://openalex.org/I4210137066"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Che\u2010Jen Hsieh","raw_affiliation_strings":["Department of Management Information System Far East University  Tainan Taiwan","Department of Management Information System; Far East University; Tainan; Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Management Information System Far East University  Tainan Taiwan","institution_ids":["https://openalex.org/I4210137066"]},{"raw_affiliation_string":"Department of Management Information System; Far East University; Tainan; Taiwan","institution_ids":["https://openalex.org/I4210137066"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109063679","display_name":"Chi\u2010Tien Weng","orcid":null},"institutions":[{"id":"https://openalex.org/I91807558","display_name":"National Cheng Kung University","ror":"https://ror.org/01b8kcc49","country_code":"TW","type":"education","lineage":["https://openalex.org/I91807558"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Chi\u2010Tien Weng","raw_affiliation_strings":["Department of Electrical Engineering, Institute of Computer and Communication Engineering National Cheng Kung University  Tainan Taiwan","Department of Electrical Engineering (Institute of Computer and Communication Engineering), National Cheng Kung University, Tainan, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Institute of Computer and Communication Engineering National Cheng Kung University  Tainan Taiwan","institution_ids":["https://openalex.org/I91807558"]},{"raw_affiliation_string":"Department of Electrical Engineering (Institute of Computer and Communication Engineering), National Cheng Kung University, Tainan, Taiwan","institution_ids":["https://openalex.org/I91807558"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102826253","display_name":"Jung\u2010Shian Li","orcid":"https://orcid.org/0000-0002-3613-6108"},"institutions":[{"id":"https://openalex.org/I91807558","display_name":"National Cheng Kung University","ror":"https://ror.org/01b8kcc49","country_code":"TW","type":"education","lineage":["https://openalex.org/I91807558"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Jung\u2010Shian Li","raw_affiliation_strings":["Department of Electrical Engineering, Institute of Computer and Communication Engineering National Cheng Kung University  Tainan Taiwan","Department of Electrical Engineering (Institute of Computer and Communication Engineering), National Cheng Kung University, Tainan, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Institute of Computer and Communication Engineering National Cheng Kung University  Tainan Taiwan","institution_ids":["https://openalex.org/I91807558"]},{"raw_affiliation_string":"Department of Electrical Engineering (Institute of Computer and Communication Engineering), National Cheng Kung University, Tainan, Taiwan","institution_ids":["https://openalex.org/I91807558"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5102826253"],"corresponding_institution_ids":["https://openalex.org/I91807558"],"apc_list":{"value":3450,"currency":"USD","value_usd":3450},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.04156901,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"27","issue":"11","first_page":"3368","last_page":"3382"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8874399662017822},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.7046003937721252},{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.6117194890975952},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6019763350486755},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5756730437278748},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.556265652179718},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4359610974788666},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.42132532596588135},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.4151299297809601},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.28666940331459045},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2782210111618042},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2635512948036194},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.23690807819366455},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.18273451924324036},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.10307091474533081}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8874399662017822},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.7046003937721252},{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.6117194890975952},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6019763350486755},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5756730437278748},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.556265652179718},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4359610974788666},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.42132532596588135},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.4151299297809601},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.28666940331459045},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2782210111618042},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2635512948036194},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.23690807819366455},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.18273451924324036},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.10307091474533081},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/dac.2547","is_oa":false,"landing_page_url":"https://doi.org/10.1002/dac.2547","pdf_url":null,"source":{"id":"https://openalex.org/S175310385","display_name":"International Journal of Communication Systems","issn_l":"1074-5351","issn":["1074-5351","1099-1131"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Communication Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W36102565","https://openalex.org/W1601700586","https://openalex.org/W1977010465","https://openalex.org/W2024933765","https://openalex.org/W2034343676","https://openalex.org/W2043169869","https://openalex.org/W2093562777","https://openalex.org/W2114667516","https://openalex.org/W2116666322","https://openalex.org/W2132712171","https://openalex.org/W2132994909","https://openalex.org/W2133671968","https://openalex.org/W2140196014","https://openalex.org/W2152337373","https://openalex.org/W2334963019","https://openalex.org/W2916086000","https://openalex.org/W2917583897","https://openalex.org/W2917815093"],"related_works":["https://openalex.org/W2361629745","https://openalex.org/W2107922825","https://openalex.org/W3094285444","https://openalex.org/W2381262728","https://openalex.org/W2111592878","https://openalex.org/W1568204688","https://openalex.org/W2122982227","https://openalex.org/W1846726187","https://openalex.org/W2387614453","https://openalex.org/W2743579231"],"abstract_inverted_index":{"SUMMARY":[0],"As":[1],"the":[2,10,15,19,34,43,50,67,70,74,79,84,91,98,101,110,114,121,133,140,144,152,156,170,177,189],"volume":[3],"of":[4,17,24,45,69,100,143,155,165,180],"multimedia":[5],"digital":[6,25,123],"information":[7],"transmitted":[8],"over":[9,49,183],"Internet":[11],"continues":[12],"to":[13,96],"rise,":[14],"problem":[16],"preventing":[18],"unauthorized":[20],"tampering":[21],"and":[22,62],"dissemination":[23,44],"content":[26],"has":[27,136],"emerged":[28],"as":[29,108,188],"a":[30,38],"major":[31],"concern.":[32],"Thus,":[33,169],"present":[35],"study":[36],"proposes":[37],"forensic":[39,126,178],"scheme":[40,54,159,171],"for":[41,125,176],"tracking":[42],"copyright\u2010protected":[46],"JPEG":[47,72,115,145,181],"images":[48],"Internet.":[51,190],"The":[52,128],"proposed":[53,102,157],"incorporates":[55],"two":[56],"basic":[57],"mechanisms,":[58],"namely":[59],"signature":[60,63,75,85,135],"embedding":[61],"detecting.":[64],"To":[65],"preserve":[66],"quality":[68,142],"protected":[71],"images,":[73],"is":[76,88,149,160],"embedded":[77,112,134],"at":[78,90],"application":[80],"layer.":[81],"By":[82],"contrast,":[83],"detection":[86,158],"process":[87],"performed":[89],"packet":[92,116],"level":[93],"in":[94,113],"order":[95],"improve":[97],"scalability":[99],"mechanism.":[103],"For":[104],"any":[105],"flows":[106],"regarded":[107],"suspicious,":[109],"signatures":[111,124],"trains":[117],"are":[118],"compared":[119],"with":[120],"known":[122],"purposes.":[127],"experimental":[129],"results":[130],"show":[131],"that":[132,151,164],"no":[137],"effect":[138],"on":[139],"visual":[141],"image.":[146],"Moreover,":[147],"it":[148],"shown":[150],"computational":[153],"complexity":[154],"significantly":[161],"lower":[162],"than":[163],"existing":[166],"application\u2010level":[167],"schemes.":[168],"provides":[172],"an":[173],"ideal":[174],"solution":[175],"analysis":[179],"streams":[182],"large\u2010scale":[184],"network":[185],"environments":[186],"such":[187],"Copyright":[191],"\u00a9":[192],"2013":[193],"John":[194],"Wiley":[195],"&amp;":[196],"Sons,":[197],"Ltd.":[198]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
