{"id":"https://openalex.org/W2042975319","doi":"https://doi.org/10.1109/cicybs.2014.7013361","title":"Biobjective NSGA-II for optimal spread spectrum watermarking of color frames: Evaluation study","display_name":"Biobjective NSGA-II for optimal spread spectrum watermarking of color frames: Evaluation study","publication_year":2014,"publication_date":"2014-12-01","ids":{"openalex":"https://openalex.org/W2042975319","doi":"https://doi.org/10.1109/cicybs.2014.7013361","mag":"2042975319"},"language":"en","primary_location":{"id":"doi:10.1109/cicybs.2014.7013361","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cicybs.2014.7013361","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057893924","display_name":"El-Sayed M. El-Alfy","orcid":"https://orcid.org/0000-0001-6279-9776"},"institutions":[{"id":"https://openalex.org/I134085113","display_name":"King Fahd University of Petroleum and Minerals","ror":"https://ror.org/03yez3163","country_code":"SA","type":"education","lineage":["https://openalex.org/I134085113"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"El-Sayed M. El-Alfy","raw_affiliation_strings":["King Fahd University of Petroleum & Minerals, Dhahran, SA","King Fahd University of Petroleum and Minerals, College of Computer Sciences and Engineering, Dhahran 31261, Saudi Arabia#TAB#"],"affiliations":[{"raw_affiliation_string":"King Fahd University of Petroleum & Minerals, Dhahran, SA","institution_ids":["https://openalex.org/I134085113"]},{"raw_affiliation_string":"King Fahd University of Petroleum and Minerals, College of Computer Sciences and Engineering, Dhahran 31261, Saudi Arabia#TAB#","institution_ids":["https://openalex.org/I134085113"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046148961","display_name":"Asem Ghaleb","orcid":"https://orcid.org/0000-0002-2190-8304"},"institutions":[{"id":"https://openalex.org/I134085113","display_name":"King Fahd University of Petroleum and Minerals","ror":"https://ror.org/03yez3163","country_code":"SA","type":"education","lineage":["https://openalex.org/I134085113"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Asem A. Ghaleb","raw_affiliation_strings":["College of Computer Sciences and Engineering, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia","King Fahd University of Petroleum and Minerals, College of Computer Sciences and Engineering, Dhahran 31261, Saudi Arabia#TAB#"],"affiliations":[{"raw_affiliation_string":"College of Computer Sciences and Engineering, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]},{"raw_affiliation_string":"King Fahd University of Petroleum and Minerals, College of Computer Sciences and Engineering, Dhahran 31261, Saudi Arabia#TAB#","institution_ids":["https://openalex.org/I134085113"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5057893924"],"corresponding_institution_ids":["https://openalex.org/I134085113"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10960199,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9850999712944031,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.8013900518417358},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.7256298065185547},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.6965051293373108},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.6285594701766968},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5546916723251343},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.5086125135421753},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.4836519956588745},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4540468454360962},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4243420958518982},{"id":"https://openalex.org/keywords/color-image","display_name":"Color image","score":0.41934534907341003},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.3211100101470947},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.30671459436416626},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.21216556429862976}],"concepts":[{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.8013900518417358},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7256298065185547},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.6965051293373108},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.6285594701766968},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5546916723251343},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.5086125135421753},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.4836519956588745},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4540468454360962},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4243420958518982},{"id":"https://openalex.org/C142616399","wikidata":"https://www.wikidata.org/wiki/Q5148604","display_name":"Color image","level":4,"score":0.41934534907341003},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.3211100101470947},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.30671459436416626},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.21216556429862976},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cicybs.2014.7013361","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cicybs.2014.7013361","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/6","display_name":"Clean water and sanitation","score":0.49000000953674316}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W85936169","https://openalex.org/W1016478894","https://openalex.org/W1984122627","https://openalex.org/W1984659294","https://openalex.org/W2007592896","https://openalex.org/W2010398978","https://openalex.org/W2051276014","https://openalex.org/W2079570305","https://openalex.org/W2079984713","https://openalex.org/W2082281801","https://openalex.org/W2085525334","https://openalex.org/W2090294996","https://openalex.org/W2105086310","https://openalex.org/W2116467012","https://openalex.org/W2119970473","https://openalex.org/W2125763168","https://openalex.org/W2126105956","https://openalex.org/W2133665775","https://openalex.org/W2134415040","https://openalex.org/W2138007805","https://openalex.org/W2167159964","https://openalex.org/W2319345779","https://openalex.org/W2332325355","https://openalex.org/W4220690171","https://openalex.org/W6603523943","https://openalex.org/W6700032377","https://openalex.org/W6809513477"],"related_works":["https://openalex.org/W2137394636","https://openalex.org/W2358993821","https://openalex.org/W1516446231","https://openalex.org/W2098152888","https://openalex.org/W1559740347","https://openalex.org/W2040356834","https://openalex.org/W2080353903","https://openalex.org/W2385289568","https://openalex.org/W2381486749","https://openalex.org/W1514507288"],"abstract_inverted_index":{"In":[0],"this":[1],"work,":[2],"a":[3],"spread":[4],"spectrum":[5],"watermarking":[6],"optimization":[7,26],"algorithm":[8],"is":[9,27,45,65,86,145],"explored":[10],"for":[11,165],"digital":[12],"color":[13,132],"images":[14,142],"using":[15,47],"biobjective":[16,112],"genetic":[17,113],"algorithms":[18],"and":[19,40,57,79,107,129,135,150],"full-frame":[20],"discrete-cosine":[21],"transform.":[22],"The":[23,42,83,161],"aim":[24],"of":[25,37,69,91,158],"to":[28,88,139],"generate":[29],"the":[30,48,54,58,62,70,76,80,111,117,156,159],"trade-off":[31],"curve,":[32],"a.k.a.":[33],"optimal":[34],"Pareto":[35],"points,":[36],"watermark":[38,43,63,78],"imperceptibility":[39,44],"robustness.":[41],"evaluated":[46,66],"Structural":[49],"SIMilarity":[50],"(SSIM)":[51],"index":[52],"between":[53,75],"original":[55,77],"image":[56,60,85],"watermarked":[59,84],"whereas":[61],"robustness":[64],"in":[67,137,147],"terms":[68],"Normalized":[71],"Correlation":[72],"Coefficient":[73],"(NCC)":[74],"recovered":[81],"watermark.":[82,160],"susceptible":[87],"various":[89,151,166],"types":[90],"attacks":[92],"or":[93],"processing":[94],"distortions":[95,152],"such":[96],"as":[97],"additive":[98],"Gaussian":[99],"noise,":[100,102],"pepper-and-salt":[101],"JPEG":[103],"compression,":[104],"camera":[105],"motion":[106],"median":[108],"filtering.":[109],"For":[110],"algorithm,":[114],"we":[115],"used":[116],"fast":[118],"elitist":[119],"Non-dominated":[120],"Sorting":[121],"Genetic":[122],"Algorithm":[123],"(NSGA-II).":[124],"We":[125],"reviewed":[126],"related":[127],"work":[128],"investigated":[130],"two":[131],"spaces":[133],"(YCbCr":[134],"HSV)":[136],"addition":[138],"gray":[140],"scale":[141],"where":[143],"embedding":[144],"conducted":[146],"different":[148],"frames":[149],"are":[153,163],"applied":[154],"before":[155],"extraction":[157],"results":[162],"compared":[164],"cases":[167],"under":[168],"similar":[169],"conditions.":[170]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
