{"id":"https://openalex.org/W1971895563","doi":"https://doi.org/10.1080/10798587.2011.10643147","title":"An Efficient Block-Based Fragile Watermarking System for Tamper Localization and Recovery","display_name":"An Efficient Block-Based Fragile Watermarking System for Tamper Localization and Recovery","publication_year":2011,"publication_date":"2011-01-01","ids":{"openalex":"https://openalex.org/W1971895563","doi":"https://doi.org/10.1080/10798587.2011.10643147","mag":"1971895563"},"language":"en","primary_location":{"id":"doi:10.1080/10798587.2011.10643147","is_oa":false,"landing_page_url":"https://doi.org/10.1080/10798587.2011.10643147","pdf_url":null,"source":{"id":"https://openalex.org/S40639465","display_name":"Intelligent Automation & Soft Computing","issn_l":"1079-8587","issn":["1079-8587","2326-005X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Intelligent Automation &amp; Soft Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015156471","display_name":"Venkata Gopal Edupuganti","orcid":null},"institutions":[{"id":"https://openalex.org/I118118575","display_name":"New Jersey Institute of Technology","ror":"https://ror.org/05e74xb87","country_code":"US","type":"education","lineage":["https://openalex.org/I118118575"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Venkata Gopal Edupuganti","raw_affiliation_strings":["College of Computing Sciences , New Jersey Institute of Technology , Newark , NJ 07102 , USA"],"affiliations":[{"raw_affiliation_string":"College of Computing Sciences , New Jersey Institute of Technology , Newark , NJ 07102 , USA","institution_ids":["https://openalex.org/I118118575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083863746","display_name":"Frank Y. Shih","orcid":"https://orcid.org/0000-0002-1507-0285"},"institutions":[{"id":"https://openalex.org/I118118575","display_name":"New Jersey Institute of Technology","ror":"https://ror.org/05e74xb87","country_code":"US","type":"education","lineage":["https://openalex.org/I118118575"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Frank Y. Shih","raw_affiliation_strings":["College of Computing Sciences , New Jersey Institute of Technology , Newark , NJ 07102 , USA"],"affiliations":[{"raw_affiliation_string":"College of Computing Sciences , New Jersey Institute of Technology , Newark , NJ 07102 , USA","institution_ids":["https://openalex.org/I118118575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111435466","display_name":"I\u2010Cheng Chang","orcid":null},"institutions":[{"id":"https://openalex.org/I33096239","display_name":"National Dong Hwa University","ror":"https://ror.org/00mng9617","country_code":"TW","type":"education","lineage":["https://openalex.org/I33096239"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"I-Cheng Chang","raw_affiliation_strings":["Department of Computer Science & Information Engineering, National Dong Hwa University, Hualien, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science & Information Engineering, National Dong Hwa University, Hualien, Taiwan","institution_ids":["https://openalex.org/I33096239"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5015156471"],"corresponding_institution_ids":["https://openalex.org/I118118575"],"apc_list":null,"apc_paid":null,"fwci":0.2576,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.54285955,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"17","issue":"2","first_page":"257","last_page":"267"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.9866999983787537,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8959689736366272},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.6861051321029663},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.6549733877182007},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4917140305042267},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.26176971197128296},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.12433579564094543},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.03882715106010437}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8959689736366272},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.6861051321029663},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.6549733877182007},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4917140305042267},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.26176971197128296},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.12433579564094543},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.03882715106010437},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1080/10798587.2011.10643147","is_oa":false,"landing_page_url":"https://doi.org/10.1080/10798587.2011.10643147","pdf_url":null,"source":{"id":"https://openalex.org/S40639465","display_name":"Intelligent Automation & Soft Computing","issn_l":"1079-8587","issn":["1079-8587","2326-005X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Intelligent Automation &amp; Soft Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/6","display_name":"Clean water and sanitation","score":0.5799999833106995}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1508120902","https://openalex.org/W1976231892","https://openalex.org/W1992330443","https://openalex.org/W2099675560","https://openalex.org/W2100365007","https://openalex.org/W2118224871","https://openalex.org/W2137694319","https://openalex.org/W2138530581","https://openalex.org/W2148756848","https://openalex.org/W3023896661"],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2361629745","https://openalex.org/W2107922825","https://openalex.org/W3094285444","https://openalex.org/W2381262728","https://openalex.org/W2111592878","https://openalex.org/W1568204688","https://openalex.org/W1846726187","https://openalex.org/W2387614453"],"abstract_inverted_index":{"Abstract":[0],"In":[1],"this":[2],"paper":[3],"we":[4],"present":[5],"an":[6],"efficient":[7],"block-based":[8],"fragile":[9],"watermarking":[10],"system":[11,92],"for":[12],"tamper":[13],"localization":[14,114],"and":[15,52,72,84,119],"recovery":[16,101],"of":[17,30,37,48,99,103,115,122],"images.":[18,74],"We":[19,75],"apply":[20],"the":[21,28,44,49,53,90,94,100,106,109,113,116,120],"Cyclic":[22],"Redundancy":[23],"Checksum":[24],"(CRC)":[25],"to":[26,62],"authenticate":[27],"feature":[29],"a":[31,35,60],"block":[32],"stored":[33],"in":[34,58,97],"pair":[36],"mapping":[38],"blocks.":[39],"The":[40],"proposed":[41,91],"scheme":[42],"localizes":[43],"tampered":[45,117],"area":[46],"irrespective":[47],"gray":[50],"value,":[51],"detection":[54],"strategy":[55],"is":[56],"designed":[57],"such":[59],"way":[61],"reduce":[63],"false":[64,123],"alarms.":[65,124],"It":[66],"can":[67],"be":[68],"applied":[69],"on":[70],"grayscale":[71],"color":[73],"conduct":[76],"malicious":[77],"attacks":[78],"using":[79],"different":[80],"cropping":[81],"patterns,":[82],"sizes,":[83],"shapes.":[85],"Experimental":[86],"results":[87],"show":[88],"that":[89],"outperforms":[93],"existing":[95],"schemes":[96],"terms":[98],"rate":[102],"modified":[104],"blocks,":[105],"support":[107],"against":[108],"vector":[110],"quantization":[111],"attack,":[112],"area,":[118],"reduction":[121]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
