{"id":"https://openalex.org/W2502463739","doi":"https://doi.org/10.1109/aiccsa.2015.7507124","title":"A blind robust image watermarking approach exploiting the DFT magnitude","display_name":"A blind robust image watermarking approach exploiting the DFT magnitude","publication_year":2015,"publication_date":"2015-11-01","ids":{"openalex":"https://openalex.org/W2502463739","doi":"https://doi.org/10.1109/aiccsa.2015.7507124","mag":"2502463739"},"language":"en","primary_location":{"id":"doi:10.1109/aiccsa.2015.7507124","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiccsa.2015.7507124","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1910.11185","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Mohamed Hamidi","orcid":null},"institutions":[{"id":"https://openalex.org/I126477371","display_name":"Mohammed V University","ror":"https://ror.org/00r8w8f84","country_code":"MA","type":"education","lineage":["https://openalex.org/I126477371"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Mohamed Hamidi","raw_affiliation_strings":["Associated Unit to the CNRST-URAC N 29, University of Mohammed V, Morocco"],"affiliations":[{"raw_affiliation_string":"Associated Unit to the CNRST-URAC N 29, University of Mohammed V, Morocco","institution_ids":["https://openalex.org/I126477371"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Mohamed El Haziti","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mohamed El Haziti","raw_affiliation_strings":["Higher School of Technology, Sale, Morocco"],"affiliations":[{"raw_affiliation_string":"Higher School of Technology, Sale, Morocco","institution_ids":[]}]},{"author_position":"middle","author":{"id":null,"display_name":"Hocine Cherifi","orcid":null},"institutions":[{"id":"https://openalex.org/I177064439","display_name":"Universit\u00e9 de Bourgogne","ror":"https://ror.org/03k1bsr36","country_code":"FR","type":"education","lineage":["https://openalex.org/I177064439"]},{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I4210136953","display_name":"Laboratoire d\u2019\u00c9lectronique, Informatique et Image","ror":"https://ror.org/04gnd7c94","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I190752583","https://openalex.org/I190861549","https://openalex.org/I4210118524","https://openalex.org/I4210134562","https://openalex.org/I4210136953","https://openalex.org/I4210159245"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Hocine Cherifi","raw_affiliation_strings":["Informatique et Image (Le2i) UMR 6306 CNRS, University of Burgundy, Dijon, France"],"affiliations":[{"raw_affiliation_string":"Informatique et Image (Le2i) UMR 6306 CNRS, University of Burgundy, Dijon, France","institution_ids":["https://openalex.org/I4210136953","https://openalex.org/I177064439","https://openalex.org/I1294671590"]}]},{"author_position":"last","author":{"id":null,"display_name":"Driss Aboutajdine","orcid":null},"institutions":[{"id":"https://openalex.org/I126477371","display_name":"Mohammed V University","ror":"https://ror.org/00r8w8f84","country_code":"MA","type":"education","lineage":["https://openalex.org/I126477371"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Driss Aboutajdine","raw_affiliation_strings":["Associated Unit to the CNRST-URAC N 29, University of Mohammed V, Morocco"],"affiliations":[{"raw_affiliation_string":"Associated Unit to the CNRST-URAC N 29, University of Mohammed V, Morocco","institution_ids":["https://openalex.org/I126477371"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I126477371"],"apc_list":null,"apc_paid":null,"fwci":0.3745,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.71978203,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.8881000280380249},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.7710000276565552},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.7621999979019165},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5680000185966492},{"id":"https://openalex.org/keywords/histogram","display_name":"Histogram","score":0.4977000057697296},{"id":"https://openalex.org/keywords/gaussian","display_name":"Gaussian","score":0.4747999906539917},{"id":"https://openalex.org/keywords/smoothing","display_name":"Smoothing","score":0.44760000705718994},{"id":"https://openalex.org/keywords/transform-coding","display_name":"Transform coding","score":0.43860000371932983},{"id":"https://openalex.org/keywords/gaussian-blur","display_name":"Gaussian blur","score":0.43650001287460327}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.8881000280380249},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.7710000276565552},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.7621999979019165},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5680000185966492},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5514000058174133},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.5297999978065491},{"id":"https://openalex.org/C53533937","wikidata":"https://www.wikidata.org/wiki/Q185020","display_name":"Histogram","level":3,"score":0.4977000057697296},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4966000020503998},{"id":"https://openalex.org/C163716315","wikidata":"https://www.wikidata.org/wiki/Q901177","display_name":"Gaussian","level":2,"score":0.4747999906539917},{"id":"https://openalex.org/C3770464","wikidata":"https://www.wikidata.org/wiki/Q775963","display_name":"Smoothing","level":2,"score":0.44760000705718994},{"id":"https://openalex.org/C169805256","wikidata":"https://www.wikidata.org/wiki/Q1361381","display_name":"Transform coding","level":4,"score":0.43860000371932983},{"id":"https://openalex.org/C104317376","wikidata":"https://www.wikidata.org/wiki/Q1894545","display_name":"Gaussian blur","level":5,"score":0.43650001287460327},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4212000072002411},{"id":"https://openalex.org/C57733114","wikidata":"https://www.wikidata.org/wiki/Q1006032","display_name":"Discrete Fourier transform (general)","level":5,"score":0.41110000014305115},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.4065999984741211},{"id":"https://openalex.org/C42781572","wikidata":"https://www.wikidata.org/wiki/Q1250322","display_name":"Digital image","level":4,"score":0.3968999981880188},{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.3463999927043915},{"id":"https://openalex.org/C136943445","wikidata":"https://www.wikidata.org/wiki/Q1970240","display_name":"Histogram equalization","level":4,"score":0.34360000491142273},{"id":"https://openalex.org/C88485024","wikidata":"https://www.wikidata.org/wiki/Q1054571","display_name":"Cepstrum","level":2,"score":0.3321000039577484},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.32510000467300415},{"id":"https://openalex.org/C65892221","wikidata":"https://www.wikidata.org/wiki/Q1113935","display_name":"Gaussian filter","level":3,"score":0.31949999928474426},{"id":"https://openalex.org/C28855332","wikidata":"https://www.wikidata.org/wiki/Q198099","display_name":"Quantization (signal processing)","level":2,"score":0.30979999899864197},{"id":"https://openalex.org/C171383496","wikidata":"https://www.wikidata.org/wiki/Q2497477","display_name":"Generalized normal distribution","level":3,"score":0.2962000072002411},{"id":"https://openalex.org/C2780581891","wikidata":"https://www.wikidata.org/wiki/Q15738686","display_name":"Copy protection","level":4,"score":0.28839999437332153},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.2881999909877777},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.28790000081062317},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.28690001368522644},{"id":"https://openalex.org/C102519508","wikidata":"https://www.wikidata.org/wiki/Q6520159","display_name":"Fourier transform","level":2,"score":0.2815000116825104},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.26750001311302185},{"id":"https://openalex.org/C4199805","wikidata":"https://www.wikidata.org/wiki/Q2725903","display_name":"Gaussian noise","level":2,"score":0.2590000033378601},{"id":"https://openalex.org/C19118579","wikidata":"https://www.wikidata.org/wiki/Q786423","display_name":"Frequency domain","level":2,"score":0.2522999942302704}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/aiccsa.2015.7507124","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiccsa.2015.7507124","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1910.11185","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1910.11185","pdf_url":"https://arxiv.org/pdf/1910.11185","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1910.11185","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1910.11185","pdf_url":"https://arxiv.org/pdf/1910.11185","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1542157244","https://openalex.org/W1923853738","https://openalex.org/W1965826445","https://openalex.org/W1977881033","https://openalex.org/W2031667648","https://openalex.org/W2053796827","https://openalex.org/W2057148190","https://openalex.org/W2076997498","https://openalex.org/W2079984713","https://openalex.org/W2103320971","https://openalex.org/W2116467012","https://openalex.org/W2117382387","https://openalex.org/W2122787031","https://openalex.org/W2142868746","https://openalex.org/W2157242065","https://openalex.org/W2171239818"],"related_works":[],"abstract_inverted_index":{"Due":[0],"to":[1,38,46,90,106,113,124,144,156],"the":[2,91,114,125,129,135,138,150,153],"current":[3],"progress":[4],"in":[5,64],"Internet,":[6],"digital":[7,53,97],"contents":[8,19],"(video,":[9],"audio":[10],"and":[11,23,177,193],"images)":[12],"are":[13],"widely":[14],"used.":[15],"Distribution":[16],"of":[17,30,93,96,102,137,152,160],"multimedia":[18],"is":[20,45,105,131],"now":[21],"faster":[22],"it":[24],"allows":[25],"for":[26],"easy":[27],"unauthorized":[28],"reproduction":[29],"information.":[31],"Digital":[32],"watermarking":[33,60,85],"came":[34],"up":[35],"while":[36],"trying":[37],"solve":[39],"this":[40,77],"problem.":[41],"Its":[42],"main":[43],"idea":[44],"embed":[47],"a":[48,51,81,88,108,118,141,157,184,195],"watermark":[49,130,197],"into":[50],"host":[52],"content":[54],"without":[55],"affecting":[56],"its":[57],"quality.":[58],"Moreover,":[59],"can":[61],"be":[62],"used":[63],"several":[65],"applications":[66],"such":[67],"as":[68,87],"authentication,":[69],"copy":[70],"control,":[71],"indexation,":[72],"Copyright":[73],"protection,":[74],"etc.":[75],"In":[76],"paper,":[78],"we":[79],"propose":[80],"blind":[82],"robust":[83],"image":[84],"approach":[86],"solution":[89],"problem":[92],"copyright":[94],"protection":[95],"images.":[98],"The":[99,180],"underlying":[100],"concept":[101],"our":[103],"method":[104,182],"apply":[107],"discrete":[109,119],"cosine":[110],"transform":[111,121],"(DCT)":[112],"magnitude":[115],"resulting":[116],"from":[117],"Fourier":[120],"(DFT)":[122],"applied":[123],"original":[126],"image.":[127],"Then,":[128],"embedded":[132],"by":[133],"modifying":[134],"coefficients":[136],"DCT":[139],"using":[140],"secret":[142],"key":[143],"increase":[145],"security.":[146],"Experimental":[147],"results":[148],"show":[149],"robustness":[151],"proposed":[154,181],"technique":[155],"wide":[158],"range":[159],"common":[161],"attacks,":[162],"e.g.,":[163],"Low-Pass":[164],"Gaussian":[165,169,175],"Filtering,":[166],"JPEG":[167],"compression,":[168],"noise,":[170,174],"salt":[171],"&":[172],"pepper":[173],"Smoothing":[176],"Histogram":[178],"equalization.":[179],"achieves":[183],"Peak":[185],"signal-to-noise-ration":[186],"(PSNR)":[187],"value":[188],"greater":[189],"than":[190],"66":[191],"(dB)":[192],"ensures":[194],"perfect":[196],"extraction.":[198]},"counts_by_year":[{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2016-08-23T00:00:00"}
