{"id":"https://openalex.org/W7143357550","doi":"https://doi.org/10.1016/j.engappai.2026.114503","title":"A secure deep image watermarking model using patch-based embedding and conditional mechanism","display_name":"A secure deep image watermarking model using patch-based embedding and conditional mechanism","publication_year":2026,"publication_date":"2026-03-30","ids":{"openalex":"https://openalex.org/W7143357550","doi":"https://doi.org/10.1016/j.engappai.2026.114503"},"language":"en","primary_location":{"id":"doi:10.1016/j.engappai.2026.114503","is_oa":false,"landing_page_url":"https://doi.org/10.1016/j.engappai.2026.114503","pdf_url":null,"source":{"id":"https://openalex.org/S900972176","display_name":"Engineering Applications of Artificial Intelligence","issn_l":"0952-1976","issn":["0952-1976","1873-6769"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Engineering Applications of Artificial Intelligence","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030351223","display_name":"Ako Bartani","orcid":"https://orcid.org/0009-0002-9320-8398"},"institutions":[{"id":"https://openalex.org/I3124704065","display_name":"University of Kurdistan","ror":"https://ror.org/04k89yk85","country_code":"IR","type":"education","lineage":["https://openalex.org/I3124704065"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Ako Bartani","raw_affiliation_strings":["Department of Computer Engineering, University of Kurdistan, Sanandaj, Iran"],"raw_orcid":"https://orcid.org/0009-0002-9320-8398","affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, University of Kurdistan, Sanandaj, Iran","institution_ids":["https://openalex.org/I3124704065"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057377487","display_name":"Sahar Karimi","orcid":"https://orcid.org/0000-0001-6607-203X"},"institutions":[{"id":"https://openalex.org/I3124704065","display_name":"University of Kurdistan","ror":"https://ror.org/04k89yk85","country_code":"IR","type":"education","lineage":["https://openalex.org/I3124704065"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Sahar Karimi","raw_affiliation_strings":["Department of Computer Engineering, University of Kurdistan, Sanandaj, Iran"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, University of Kurdistan, Sanandaj, Iran","institution_ids":["https://openalex.org/I3124704065"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001485953","display_name":"Hoshang Qasim Awla","orcid":"https://orcid.org/0000-0001-6679-9589"},"institutions":[{"id":"https://openalex.org/I32706565","display_name":"Soran University","ror":"https://ror.org/03k9q0e81","country_code":"IQ","type":"education","lineage":["https://openalex.org/I32706565"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Hoshang Qasim Awla","raw_affiliation_strings":["Department of Computer Science, Faculty of Science, University of Soran, Iraq"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Faculty of Science, University of Soran, Iraq","institution_ids":["https://openalex.org/I32706565"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081265236","display_name":"Fardin Akhlaghian Tab","orcid":"https://orcid.org/0000-0002-0300-9233"},"institutions":[{"id":"https://openalex.org/I3124704065","display_name":"University of Kurdistan","ror":"https://ror.org/04k89yk85","country_code":"IR","type":"education","lineage":["https://openalex.org/I3124704065"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Fardin Akhlaghian Tab","raw_affiliation_strings":["Department of Computer Engineering, University of Kurdistan, Sanandaj, Iran"],"raw_orcid":"https://orcid.org/0000-0002-0300-9233","affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, University of Kurdistan, Sanandaj, Iran","institution_ids":["https://openalex.org/I3124704065"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5081265236"],"corresponding_institution_ids":["https://openalex.org/I3124704065"],"apc_list":{"value":3170,"currency":"USD","value_usd":3170},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.66747276,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"175","issue":null,"first_page":"114503","last_page":"114503"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.7397000193595886,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.7397000193595886,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.0843999981880188,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.058800000697374344,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.879800021648407},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.7257999777793884},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.7160000205039978},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.5547999739646912},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4528000056743622},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.4415000081062317},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.40380001068115234},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.36010000109672546}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8870999813079834},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.879800021648407},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.7257999777793884},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.7160000205039978},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.5547999739646912},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.49059998989105225},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.47290000319480896},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4528000056743622},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.4415000081062317},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.40380001068115234},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.36010000109672546},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.3569999933242798},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.35040000081062317},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3481000065803528},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.3314000070095062},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.3285999894142151},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.32030001282691956},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.31189998984336853},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3034999966621399},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.30140000581741333},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.29980000853538513},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.2874000072479248},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2870999872684479},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.28060001134872437},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.2678999900817871},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.2567000091075897}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1016/j.engappai.2026.114503","is_oa":false,"landing_page_url":"https://doi.org/10.1016/j.engappai.2026.114503","pdf_url":null,"source":{"id":"https://openalex.org/S900972176","display_name":"Engineering Applications of Artificial Intelligence","issn_l":"0952-1976","issn":["0952-1976","1873-6769"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Engineering Applications of Artificial Intelligence","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W2031489346","https://openalex.org/W2573437058","https://openalex.org/W2579318729","https://openalex.org/W2607126301","https://openalex.org/W2788633781","https://openalex.org/W2806082141","https://openalex.org/W2883233582","https://openalex.org/W2952651666","https://openalex.org/W2963073614","https://openalex.org/W2970373593","https://openalex.org/W2997594966","https://openalex.org/W3035671550","https://openalex.org/W3042950035","https://openalex.org/W3089173875","https://openalex.org/W3089622076","https://openalex.org/W3164111940","https://openalex.org/W3175133087","https://openalex.org/W4226224676","https://openalex.org/W4280580011","https://openalex.org/W4281707480","https://openalex.org/W4285495254","https://openalex.org/W4290652572","https://openalex.org/W4310907107","https://openalex.org/W4313172341","https://openalex.org/W4315929005","https://openalex.org/W4327810912","https://openalex.org/W4360618912","https://openalex.org/W4400722424","https://openalex.org/W4400910348","https://openalex.org/W4405855969","https://openalex.org/W4406458681"],"related_works":[],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2026-04-01T02:31:24.031677","created_date":"2026-03-31T00:00:00"}
