{"id":"https://openalex.org/W4283730305","doi":"https://doi.org/10.1109/codit55151.2022.9803968","title":"Robust approach linking cryptography,3D watermarking using RSA algorithm and spherical harmonics transform to secure multiresolution meshes transmission","display_name":"Robust approach linking cryptography,3D watermarking using RSA algorithm and spherical harmonics transform to secure multiresolution meshes transmission","publication_year":2022,"publication_date":"2022-05-17","ids":{"openalex":"https://openalex.org/W4283730305","doi":"https://doi.org/10.1109/codit55151.2022.9803968"},"language":"en","primary_location":{"id":"doi:10.1109/codit55151.2022.9803968","is_oa":false,"landing_page_url":"https://doi.org/10.1109/codit55151.2022.9803968","pdf_url":null,"source":{"id":"https://openalex.org/S4363607900","display_name":"2022 8th International Conference on Control, Decision and Information Technologies (CoDIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 8th International Conference on Control, Decision and Information Technologies (CoDIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012749372","display_name":"Malika Jallouli","orcid":"https://orcid.org/0000-0002-1373-763X"},"institutions":[{"id":"https://openalex.org/I8636806","display_name":"University of Sousse","ror":"https://ror.org/00dmpgj58","country_code":"TN","type":"education","lineage":["https://openalex.org/I8636806"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Malika Jallouli","raw_affiliation_strings":["Universit&#x00E9; de Sousse,Ecole Nationale d&#x0027;Ing&#x00E9;nieurs de Sousse, LATIS Laboratory of Advanced Technology and Intelligent Systems,Sousse,Tunisie,4023"],"affiliations":[{"raw_affiliation_string":"Universit&#x00E9; de Sousse,Ecole Nationale d&#x0027;Ing&#x00E9;nieurs de Sousse, LATIS Laboratory of Advanced Technology and Intelligent Systems,Sousse,Tunisie,4023","institution_ids":["https://openalex.org/I8636806"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064264435","display_name":"Ikbel Sayahi","orcid":"https://orcid.org/0000-0002-0743-339X"},"institutions":[{"id":"https://openalex.org/I166928557","display_name":"University of Monastir","ror":"https://ror.org/00nhtcg76","country_code":"TN","type":"education","lineage":["https://openalex.org/I166928557"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Ikbel Sayahi","raw_affiliation_strings":["University of sfax,Research Groups on Intelligent Machines Laboratory, Private National Engineering School of Monastir,Monastir,Tunisia","Research Groups on Intelligent Machines Laboratory, Private National Engineering School of Monastir, University of sfax, Monastir, Tunisia"],"affiliations":[{"raw_affiliation_string":"University of sfax,Research Groups on Intelligent Machines Laboratory, Private National Engineering School of Monastir,Monastir,Tunisia","institution_ids":["https://openalex.org/I166928557"]},{"raw_affiliation_string":"Research Groups on Intelligent Machines Laboratory, Private National Engineering School of Monastir, University of sfax, Monastir, Tunisia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020210821","display_name":"Anouar Ben Mabrouk","orcid":"https://orcid.org/0000-0002-2571-1066"},"institutions":[{"id":"https://openalex.org/I55167344","display_name":"University of Kairouan","ror":"https://ror.org/024mpte60","country_code":"TN","type":"education","lineage":["https://openalex.org/I55167344"]},{"id":"https://openalex.org/I72264486","display_name":"University of Tabuk","ror":"https://ror.org/04yej8x59","country_code":"SA","type":"education","lineage":["https://openalex.org/I72264486"]}],"countries":["SA","TN"],"is_corresponding":false,"raw_author_name":"Anouar Ben Mabrouk","raw_affiliation_strings":["University of Kairouan,Higher Institute of Applied Mathematics and Computer Science,Department of Mathematics,Kairouan,Tunisia,3100","Department of Mathematics, Faculty of Science, University of Tabuk, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"University of Kairouan,Higher Institute of Applied Mathematics and Computer Science,Department of Mathematics,Kairouan,Tunisia,3100","institution_ids":["https://openalex.org/I55167344"]},{"raw_affiliation_string":"Department of Mathematics, Faculty of Science, University of Tabuk, Saudi Arabia","institution_ids":["https://openalex.org/I72264486"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000463539","display_name":"Mohamed Ali Mahjoub","orcid":"https://orcid.org/0000-0002-8181-4684"},"institutions":[{"id":"https://openalex.org/I8636806","display_name":"University of Sousse","ror":"https://ror.org/00dmpgj58","country_code":"TN","type":"education","lineage":["https://openalex.org/I8636806"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Mohamed Ali Mahjoub","raw_affiliation_strings":["Universit&#x00E9; de Sousse,Ecole Nationale d&#x0027;Ing&#x00E9;nieurs de Sousse, LATIS Laboratory of Advanced Technology and Intelligent Systems,Sousse,Tunisie,4023"],"affiliations":[{"raw_affiliation_string":"Universit&#x00E9; de Sousse,Ecole Nationale d&#x0027;Ing&#x00E9;nieurs de Sousse, LATIS Laboratory of Advanced Technology and Intelligent Systems,Sousse,Tunisie,4023","institution_ids":["https://openalex.org/I8636806"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036168795","display_name":"Chokri Ben Amar","orcid":"https://orcid.org/0000-0002-0129-7577"},"institutions":[{"id":"https://openalex.org/I166928557","display_name":"University of Monastir","ror":"https://ror.org/00nhtcg76","country_code":"TN","type":"education","lineage":["https://openalex.org/I166928557"]},{"id":"https://openalex.org/I179331831","display_name":"Taif University","ror":"https://ror.org/014g1a453","country_code":"SA","type":"education","lineage":["https://openalex.org/I179331831"]}],"countries":["SA","TN"],"is_corresponding":false,"raw_author_name":"Chokri Ben Amar","raw_affiliation_strings":["University of sfax,Research Groups on Intelligent Machines Laboratory, Private National Engineering School of Monastir,Monastir,Tunisia","Research Groups on Intelligent Machines Laboratory, Private National Engineering School of Monastir, University of sfax, Monastir, Tunisia","College of Computers and Information Technology, Taif University, Taif, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"University of sfax,Research Groups on Intelligent Machines Laboratory, Private National Engineering School of Monastir,Monastir,Tunisia","institution_ids":["https://openalex.org/I166928557"]},{"raw_affiliation_string":"Research Groups on Intelligent Machines Laboratory, Private National Engineering School of Monastir, University of sfax, Monastir, Tunisia","institution_ids":[]},{"raw_affiliation_string":"College of Computers and Information Technology, Taif University, Taif, Saudi Arabia","institution_ids":["https://openalex.org/I179331831"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5012749372"],"corresponding_institution_ids":["https://openalex.org/I8636806"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.04434621,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"14","issue":null,"first_page":"513","last_page":"518"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10481","display_name":"Computer Graphics and Visualization Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1704","display_name":"Computer Graphics and Computer-Aided Design"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/polygon-mesh","display_name":"Polygon mesh","score":0.8331194519996643},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.7010248899459839},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.6557621359825134},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6440690159797668},{"id":"https://openalex.org/keywords/spherical-harmonics","display_name":"Spherical harmonics","score":0.5164530277252197},{"id":"https://openalex.org/keywords/grayscale","display_name":"Grayscale","score":0.48610711097717285},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.4510915279388428},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4368625283241272},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.428234338760376},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4269416630268097},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4090564250946045},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.28768694400787354},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2588319182395935},{"id":"https://openalex.org/keywords/computer-graphics","display_name":"Computer graphics (images)","score":0.09780505299568176}],"concepts":[{"id":"https://openalex.org/C31487907","wikidata":"https://www.wikidata.org/wiki/Q1154597","display_name":"Polygon mesh","level":2,"score":0.8331194519996643},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.7010248899459839},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.6557621359825134},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6440690159797668},{"id":"https://openalex.org/C3768446","wikidata":"https://www.wikidata.org/wiki/Q877100","display_name":"Spherical harmonics","level":2,"score":0.5164530277252197},{"id":"https://openalex.org/C78201319","wikidata":"https://www.wikidata.org/wiki/Q685727","display_name":"Grayscale","level":3,"score":0.48610711097717285},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.4510915279388428},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4368625283241272},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.428234338760376},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4269416630268097},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4090564250946045},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.28768694400787354},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2588319182395935},{"id":"https://openalex.org/C121684516","wikidata":"https://www.wikidata.org/wiki/Q7600677","display_name":"Computer graphics (images)","level":1,"score":0.09780505299568176},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/codit55151.2022.9803968","is_oa":false,"landing_page_url":"https://doi.org/10.1109/codit55151.2022.9803968","pdf_url":null,"source":{"id":"https://openalex.org/S4363607900","display_name":"2022 8th International Conference on Control, Decision and Information Technologies (CoDIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 8th International Conference on Control, Decision and Information Technologies (CoDIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W76330425","https://openalex.org/W88086765","https://openalex.org/W1547368035","https://openalex.org/W2041627096","https://openalex.org/W2045145094","https://openalex.org/W2065296537","https://openalex.org/W2078329793","https://openalex.org/W2090996968","https://openalex.org/W2100177310","https://openalex.org/W2105261509","https://openalex.org/W2208997004","https://openalex.org/W2329811335","https://openalex.org/W2343888462","https://openalex.org/W2395137177","https://openalex.org/W2600976641","https://openalex.org/W2761356015","https://openalex.org/W2898237357","https://openalex.org/W2898277866","https://openalex.org/W2969961944","https://openalex.org/W3208944373","https://openalex.org/W3210724127","https://openalex.org/W6603108838","https://openalex.org/W6603593186","https://openalex.org/W6632764352","https://openalex.org/W6712017156"],"related_works":["https://openalex.org/W2137394636","https://openalex.org/W2358993821","https://openalex.org/W1516446231","https://openalex.org/W2098152888","https://openalex.org/W1559740347","https://openalex.org/W2040356834","https://openalex.org/W2080353903","https://openalex.org/W2385289568","https://openalex.org/W2381486749","https://openalex.org/W1514507288"],"abstract_inverted_index":{"In":[0],"order":[1],"to":[2,4,36,74,106],"contribute":[3],"safe":[5],"sharing":[6],"of":[7,14,25,94,111,120,131],"3D":[8],"mul-tiresolution":[9],"meshes,":[10],"a":[11,108,128],"new":[12],"approach":[13,19,103],"crypto-watermarking":[15],"is":[16,20,35,63,87,104],"proposed.":[17],"This":[18],"based":[21],"on":[22,45,54,92],"the":[23,38,46,55,76,90,115,121],"use":[24,91],"RSA":[26,82],"algorithm":[27,136],"and":[28,49],"spherical":[29,66],"harmonics":[30,67],"transform.":[31,68],"The":[32,118],"aim":[33],"being":[34],"increase":[37],"integration":[39],"rate":[40],"while":[41],"maintaining":[42],"mesh":[43,62,86,116],"quality":[44],"one":[47],"hand":[48],"extract":[50],"correctly":[51],"inserted":[52],"image":[53,78],"other":[56],"hand.":[57],"To":[58],"embed":[59],"data,":[60],"host":[61],"decomposed":[64],"using":[65,81],"Resulting":[69],"coefficients":[70,95],"are":[71],"watermarked":[72,85],"twice":[73],"insert":[75,107],"grayscale":[77],"already":[79,96,133],"encrypted":[80],"algorithm.":[83],"Finally,":[84],"reconstructed":[88],"through":[89],"10%":[93],"calculated.":[97],"Found":[98],"results":[99],"prove":[100],"that":[101],"our":[102],"able":[105],"high":[109],"amount":[110],"data":[112,132],"without":[113],"influencing":[114],"quality.":[117],"application":[119],"most":[122],"popular":[123],"attacks":[124],"does":[125],"not":[126],"prevent":[127],"correct":[129],"extraction":[130],"inserted.":[134],"Our":[135],"is,then,robust":[137],"against":[138],"these":[139],"attacks.":[140]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
