{"id":"https://openalex.org/W2132593710","doi":"https://doi.org/10.1007/0-387-34224-9_79","title":"Chaotic Encryption Driven Watermarking of Human Video Objects Based on Hu Moments","display_name":"Chaotic Encryption Driven Watermarking of Human Video Objects Based on Hu Moments","publication_year":2006,"publication_date":"2006-08-25","ids":{"openalex":"https://openalex.org/W2132593710","doi":"https://doi.org/10.1007/0-387-34224-9_79","mag":"2132593710"},"language":"en","primary_location":{"id":"doi:10.1007/0-387-34224-9_79","is_oa":true,"landing_page_url":"https://doi.org/10.1007/0-387-34224-9_79","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F0-387-34224-9_79.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP International Federation for Information Processing","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007%2F0-387-34224-9_79.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072019747","display_name":"Paraskevi Tzouveli","orcid":"https://orcid.org/0000-0002-2061-9607"},"institutions":[{"id":"https://openalex.org/I174458059","display_name":"National Technical University of Athens","ror":"https://ror.org/03cx6bg69","country_code":"GR","type":"education","lineage":["https://openalex.org/I174458059"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Paraskevi K. Tzouveli","raw_affiliation_strings":["Electrical and Computer Engineering Department, National Technical University of Athens, Athens, Greece","Electrical and Computer Engineering Department, National Technical University of Athens, Athens, greece#TAB#"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering Department, National Technical University of Athens, Athens, Greece","institution_ids":["https://openalex.org/I174458059"]},{"raw_affiliation_string":"Electrical and Computer Engineering Department, National Technical University of Athens, Athens, greece#TAB#","institution_ids":["https://openalex.org/I174458059"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013905462","display_name":"Klimis Ntalianis","orcid":"https://orcid.org/0000-0002-2175-3306"},"institutions":[{"id":"https://openalex.org/I174458059","display_name":"National Technical University of Athens","ror":"https://ror.org/03cx6bg69","country_code":"GR","type":"education","lineage":["https://openalex.org/I174458059"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Klimis S. Ntalianis","raw_affiliation_strings":["Electrical and Computer Engineering Department, National Technical University of Athens, Athens, Greece","Electrical and Computer Engineering Department, National Technical University of Athens, Athens, greece#TAB#"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering Department, National Technical University of Athens, Athens, Greece","institution_ids":["https://openalex.org/I174458059"]},{"raw_affiliation_string":"Electrical and Computer Engineering Department, National Technical University of Athens, Athens, greece#TAB#","institution_ids":["https://openalex.org/I174458059"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001457450","display_name":"Stefanos Kollias","orcid":"https://orcid.org/0000-0003-2899-0598"},"institutions":[{"id":"https://openalex.org/I174458059","display_name":"National Technical University of Athens","ror":"https://ror.org/03cx6bg69","country_code":"GR","type":"education","lineage":["https://openalex.org/I174458059"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Stefanos D. Kollias","raw_affiliation_strings":["Electrical and Computer Engineering Department, National Technical University of Athens, Athens, Greece","Electrical and Computer Engineering Department, National Technical University of Athens, Athens, greece#TAB#"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering Department, National Technical University of Athens, Athens, Greece","institution_ids":["https://openalex.org/I174458059"]},{"raw_affiliation_string":"Electrical and Computer Engineering Department, National Technical University of Athens, Athens, greece#TAB#","institution_ids":["https://openalex.org/I174458059"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5072019747"],"corresponding_institution_ids":["https://openalex.org/I174458059"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.23722349,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"673","last_page":"680"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.7625033855438232},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.7382150292396545},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.689669668674469},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.6823943853378296},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6820306777954102},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6586045026779175},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6517030000686646},{"id":"https://openalex.org/keywords/video-tracking","display_name":"Video tracking","score":0.5617926716804504},{"id":"https://openalex.org/keywords/invariant","display_name":"Invariant (physics)","score":0.49464651942253113},{"id":"https://openalex.org/keywords/object","display_name":"Object (grammar)","score":0.48694074153900146},{"id":"https://openalex.org/keywords/gaussian","display_name":"Gaussian","score":0.4700799286365509},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.3543586730957031},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3302220404148102},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.21071985363960266},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15211129188537598}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.7625033855438232},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.7382150292396545},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.689669668674469},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.6823943853378296},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6820306777954102},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6586045026779175},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6517030000686646},{"id":"https://openalex.org/C202474056","wikidata":"https://www.wikidata.org/wiki/Q1931635","display_name":"Video tracking","level":3,"score":0.5617926716804504},{"id":"https://openalex.org/C190470478","wikidata":"https://www.wikidata.org/wiki/Q2370229","display_name":"Invariant (physics)","level":2,"score":0.49464651942253113},{"id":"https://openalex.org/C2781238097","wikidata":"https://www.wikidata.org/wiki/Q175026","display_name":"Object (grammar)","level":2,"score":0.48694074153900146},{"id":"https://openalex.org/C163716315","wikidata":"https://www.wikidata.org/wiki/Q901177","display_name":"Gaussian","level":2,"score":0.4700799286365509},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.3543586730957031},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3302220404148102},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.21071985363960266},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15211129188537598},{"id":"https://openalex.org/C37914503","wikidata":"https://www.wikidata.org/wiki/Q156495","display_name":"Mathematical physics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/0-387-34224-9_79","is_oa":true,"landing_page_url":"https://doi.org/10.1007/0-387-34224-9_79","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F0-387-34224-9_79.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP International Federation for Information Processing","raw_type":"book-chapter"},{"id":"pmh:oai:dspace.lib.ntua.gr:123456789/17097","is_oa":true,"landing_page_url":"http://doi.org/10.1007/0-387-34224-9_79","pdf_url":null,"source":{"id":"https://openalex.org/S4377196837","display_name":"DSpace - NTUA (National Technical University of Athens)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I174458059","host_organization_name":"National Technical University of Athens","host_organization_lineage":["https://openalex.org/I174458059"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IFIP International Federation for Information Processing","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"doi:10.1007/0-387-34224-9_79","is_oa":true,"landing_page_url":"https://doi.org/10.1007/0-387-34224-9_79","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F0-387-34224-9_79.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP International Federation for Information Processing","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2132593710.pdf","grobid_xml":"https://content.openalex.org/works/W2132593710.grobid-xml"},"referenced_works_count":10,"referenced_works":["https://openalex.org/W1493698890","https://openalex.org/W1681763040","https://openalex.org/W1979684610","https://openalex.org/W2096142234","https://openalex.org/W2107822574","https://openalex.org/W2120706888","https://openalex.org/W2153715347","https://openalex.org/W2159498975","https://openalex.org/W2166212353","https://openalex.org/W6807716365"],"related_works":["https://openalex.org/W2137394636","https://openalex.org/W2358993821","https://openalex.org/W1516446231","https://openalex.org/W2098152888","https://openalex.org/W1559740347","https://openalex.org/W2040356834","https://openalex.org/W2080353903","https://openalex.org/W2385289568","https://openalex.org/W2381486749","https://openalex.org/W1514507288"],"abstract_inverted_index":{"A":[0,68],"novel":[1],"human":[2,44,79],"video":[3,45,80],"object":[4,102],"watermarking":[5,105],"scheme":[6],"is":[7,47,70,87,107],"proposed":[8,19,101],"in":[9],"this":[10],"paper,":[11],"providing":[12],"copyright":[13],"protection":[14],"of":[15,25,43,77,99],"semantic":[16],"content.":[17],"The":[18],"method":[20],"focuses":[21],"on":[22,95],"the":[23,62,83,100],"existence":[24],"face":[26],"and":[27,61,82,113],"body":[28,65],"regions":[29],"within":[30],"an":[31,90],"initial":[32],"image,":[33],"however":[34],"other":[35,63],"cases":[36],"can":[37],"also":[38],"be":[39],"addressed.":[40],"Initially":[41],"detection":[42],"objects":[46],"achieved":[48],"using":[49,73],"two":[50],"adaptive":[51],"2-D":[52],"Gaussian":[53],"models,":[54],"one":[55],"for":[56,64],"skin":[57],"color":[58],"distribution":[59],"modelling":[60],"localization":[66],"modelling.":[67],"watermark":[69,84],"then":[71],"designed":[72],"invariant":[74],"Hu":[75],"moments":[76],"each":[78],"object,":[81],"insertion":[85],"procedure":[86],"driven":[88],"by":[89],"iterative":[91],"encryption":[92],"module":[93],"based":[94,103],"chaotic":[96],"functions.":[97],"Performance":[98],"secure":[104],"system":[106],"tested":[108],"under":[109],"various":[110],"signal":[111],"distortions":[112],"known":[114],"cryptanalytic":[115],"attacks.":[116]},"counts_by_year":[{"year":2018,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
