{"id":"https://openalex.org/W2165699688","doi":"https://doi.org/10.1109/cis.2009.135","title":"A Novel Robust Watermarking Algorithm Based on DWT and DCT","display_name":"A Novel Robust Watermarking Algorithm Based on DWT and DCT","publication_year":2009,"publication_date":"2009-01-01","ids":{"openalex":"https://openalex.org/W2165699688","doi":"https://doi.org/10.1109/cis.2009.135","mag":"2165699688"},"language":"en","primary_location":{"id":"doi:10.1109/cis.2009.135","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cis.2009.135","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 International Conference on Computational Intelligence and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100461427","display_name":"Na Wang","orcid":"https://orcid.org/0000-0002-9786-8548"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wang Na","raw_affiliation_strings":["College of Information Engineering, Shenzhen University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"College of Information Engineering, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049738433","display_name":"Wang Yunjin","orcid":null},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wang Yunjin","raw_affiliation_strings":["College of Information Engineering, Shenzhen University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"College of Information Engineering, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100445591","display_name":"Xia Li","orcid":"https://orcid.org/0000-0002-8043-9966"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Xia","raw_affiliation_strings":["College of Information Engineering, Shenzhen University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"College of Information Engineering, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100461427"],"corresponding_institution_ids":["https://openalex.org/I180726961"],"apc_list":null,"apc_paid":null,"fwci":0.9707,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.79958503,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"29","issue":null,"first_page":"437","last_page":"441"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.887168288230896},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.8333791494369507},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.7512142658233643},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.7061898112297058},{"id":"https://openalex.org/keywords/discrete-wavelet-transform","display_name":"Discrete wavelet transform","score":0.6666220426559448},{"id":"https://openalex.org/keywords/transform-coding","display_name":"Transform coding","score":0.6168440580368042},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5864666104316711},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5706206560134888},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5027780532836914},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.4621458947658539},{"id":"https://openalex.org/keywords/just-noticeable-difference","display_name":"Just-noticeable difference","score":0.41792091727256775},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.415205180644989},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.37357425689697266},{"id":"https://openalex.org/keywords/wavelet-transform","display_name":"Wavelet transform","score":0.36540672183036804},{"id":"https://openalex.org/keywords/wavelet","display_name":"Wavelet","score":0.31986474990844727},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.317111074924469}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.887168288230896},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.8333791494369507},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.7512142658233643},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.7061898112297058},{"id":"https://openalex.org/C46286280","wikidata":"https://www.wikidata.org/wiki/Q2414958","display_name":"Discrete wavelet transform","level":4,"score":0.6666220426559448},{"id":"https://openalex.org/C169805256","wikidata":"https://www.wikidata.org/wiki/Q1361381","display_name":"Transform coding","level":4,"score":0.6168440580368042},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5864666104316711},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5706206560134888},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5027780532836914},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4621458947658539},{"id":"https://openalex.org/C59111918","wikidata":"https://www.wikidata.org/wiki/Q1224386","display_name":"Just-noticeable difference","level":2,"score":0.41792091727256775},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.415205180644989},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.37357425689697266},{"id":"https://openalex.org/C196216189","wikidata":"https://www.wikidata.org/wiki/Q2867","display_name":"Wavelet transform","level":3,"score":0.36540672183036804},{"id":"https://openalex.org/C47432892","wikidata":"https://www.wikidata.org/wiki/Q831390","display_name":"Wavelet","level":2,"score":0.31986474990844727},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.317111074924469},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cis.2009.135","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cis.2009.135","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 International Conference on Computational Intelligence and Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1965280641","https://openalex.org/W2076033735","https://openalex.org/W2084112876","https://openalex.org/W2116467012","https://openalex.org/W2120451963","https://openalex.org/W2129621632","https://openalex.org/W2133720040","https://openalex.org/W2134654392","https://openalex.org/W2134797150","https://openalex.org/W2142423797","https://openalex.org/W2154903558","https://openalex.org/W2377275161","https://openalex.org/W2393998524","https://openalex.org/W2534742317","https://openalex.org/W6679375988"],"related_works":["https://openalex.org/W1967073369","https://openalex.org/W2281180546","https://openalex.org/W3200179225","https://openalex.org/W2094583657","https://openalex.org/W2906192557","https://openalex.org/W2367020991","https://openalex.org/W2336053056","https://openalex.org/W1594300462","https://openalex.org/W1988858539","https://openalex.org/W2386401927"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"a":[3,39,111],"novel":[4],"robust":[5],"watermarking":[6,71],"algorithm":[7],"is":[8,18,52,80,97],"presented":[9],"in":[10,57],"mixed":[11],"transform":[12,36,63,86],"domain.":[13],"The":[14,95],"original":[15,101],"host":[16],"image":[17],"first":[19],"decomposed":[20],"into":[21,44,83],"four":[22],"sub-bands":[23],"by":[24,34,74],"Discrete":[25],"Wavelet":[26],"Transform":[27],"(DWT).":[28],"Then":[29],"approximate":[30],"coefficients":[31,87],"are":[32],"relocated":[33],"Arnold":[35,75],"to":[37,64,89],"create":[38],"noise-like":[40],"version":[41],"and":[42,55,68],"divided":[43],"non-overlapping":[45],"8":[46,48],"\u00d7":[47],"blocks.":[49],"Each":[50],"block":[51],"Zig-zag":[53],"scanned":[54],"sorted":[56],"descending":[58],"order":[59],"before":[60],"the":[61,84,100,107],"DCT":[62,85],"obtain":[65],"high":[66],"robustness":[67,113],"transparency.":[69],"A":[70],"sequence":[72],"encrypted":[73],"transformation":[76],"with":[77],"secret":[78],"keys":[79],"afterwards":[81],"embedded":[82],"according":[88],"JND":[90],"(Just":[91],"Noticeable":[92],"Difference)":[93],"model.":[94],"watermark":[96],"extracted":[98],"without":[99],"image.":[102],"Experimental":[103],"results":[104],"indicate":[105],"that":[106],"proposed":[108],"strategy":[109],"has":[110],"good":[112],"against":[114],"common":[115],"attacks,":[116],"such":[117],"as":[118],"noise,":[119],"filtering,":[120],"JPEG":[121],"compression.":[122]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":4},{"year":2015,"cited_by_count":2},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
