{"id":"https://openalex.org/W1978884129","doi":"https://doi.org/10.1109/csndsp.2012.6292684","title":"Security improvement for audio watermarking in image using BCH coding","display_name":"Security improvement for audio watermarking in image using BCH coding","publication_year":2012,"publication_date":"2012-07-01","ids":{"openalex":"https://openalex.org/W1978884129","doi":"https://doi.org/10.1109/csndsp.2012.6292684","mag":"1978884129"},"language":"en","primary_location":{"id":"doi:10.1109/csndsp.2012.6292684","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csndsp.2012.6292684","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 8th International Symposium on Communication Systems, Networks &amp; Digital Signal Processing (CSNDSP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056289461","display_name":"Amir Reza Fazli","orcid":null},"institutions":[{"id":"https://openalex.org/I3132928613","display_name":"Sadjad University of Technology","ror":"https://ror.org/04b9hej41","country_code":"IR","type":"education","lineage":["https://openalex.org/I3132928613"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Amir R. Fazli","raw_affiliation_strings":["Department of Electrical Engineering, Sadjad Institute of Higher Education, Mashhad, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Sadjad Institute of Higher Education, Mashhad, Iran","institution_ids":["https://openalex.org/I3132928613"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026705499","display_name":"Mohammad M. Eghbali","orcid":null},"institutions":[{"id":"https://openalex.org/I3132928613","display_name":"Sadjad University of Technology","ror":"https://ror.org/04b9hej41","country_code":"IR","type":"education","lineage":["https://openalex.org/I3132928613"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Mohammad M. Eghbali","raw_affiliation_strings":["Department of Electrical Engineering, Sadjad Institute of Higher Education, Mashhad, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Sadjad Institute of Higher Education, Mashhad, Iran","institution_ids":["https://openalex.org/I3132928613"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035495215","display_name":"Zahra Kazemi","orcid":"https://orcid.org/0000-0003-1095-2681"},"institutions":[{"id":"https://openalex.org/I3132928613","display_name":"Sadjad University of Technology","ror":"https://ror.org/04b9hej41","country_code":"IR","type":"education","lineage":["https://openalex.org/I3132928613"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Zahra Kazemi","raw_affiliation_strings":["Department of Electrical Engineering, Sadjad Institute of Higher Education, Mashhad, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Sadjad Institute of Higher Education, Mashhad, Iran","institution_ids":["https://openalex.org/I3132928613"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112316088","display_name":"Ghazaleh Sarbisheie","orcid":null},"institutions":[{"id":"https://openalex.org/I3132928613","display_name":"Sadjad University of Technology","ror":"https://ror.org/04b9hej41","country_code":"IR","type":"education","lineage":["https://openalex.org/I3132928613"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Ghazaleh Sarbisheie","raw_affiliation_strings":["Department of Electrical Engineering, Sadjad Institute of Higher Education, Mashhad, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Sadjad Institute of Higher Education, Mashhad, Iran","institution_ids":["https://openalex.org/I3132928613"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5056289461"],"corresponding_institution_ids":["https://openalex.org/I3132928613"],"apc_list":null,"apc_paid":null,"fwci":0.2745,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.54066763,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"48","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10901","display_name":"Advanced Data Compression Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.9172288179397583},{"id":"https://openalex.org/keywords/bch-code","display_name":"BCH code","score":0.8693199753761292},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.7922648191452026},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6283225417137146},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4850429892539978},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4579949975013733},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.43358373641967773},{"id":"https://openalex.org/keywords/error-detection-and-correction","display_name":"Error detection and correction","score":0.3379104733467102},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.24498727917671204},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.24472364783287048},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15785488486289978}],"concepts":[{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.9172288179397583},{"id":"https://openalex.org/C42276685","wikidata":"https://www.wikidata.org/wiki/Q795705","display_name":"BCH code","level":3,"score":0.8693199753761292},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.7922648191452026},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6283225417137146},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4850429892539978},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4579949975013733},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.43358373641967773},{"id":"https://openalex.org/C103088060","wikidata":"https://www.wikidata.org/wiki/Q1062839","display_name":"Error detection and correction","level":2,"score":0.3379104733467102},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.24498727917671204},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.24472364783287048},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15785488486289978}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csndsp.2012.6292684","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csndsp.2012.6292684","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 8th International Symposium on Communication Systems, Networks &amp; Digital Signal Processing (CSNDSP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1550675871","https://openalex.org/W1578893750","https://openalex.org/W1963947746","https://openalex.org/W2006145362","https://openalex.org/W2083014862","https://openalex.org/W2110623466","https://openalex.org/W2115063515","https://openalex.org/W2117231558","https://openalex.org/W2127364031","https://openalex.org/W2136596536","https://openalex.org/W2139758408","https://openalex.org/W2160644038","https://openalex.org/W2160921333","https://openalex.org/W2164587393","https://openalex.org/W6671448017","https://openalex.org/W6684355625"],"related_works":["https://openalex.org/W2137394636","https://openalex.org/W2358993821","https://openalex.org/W1516446231","https://openalex.org/W1559740347","https://openalex.org/W2098152888","https://openalex.org/W2040356834","https://openalex.org/W2385289568","https://openalex.org/W2381486749","https://openalex.org/W1514507288","https://openalex.org/W2183032046"],"abstract_inverted_index":{"In":[0,21],"this":[1,22],"paper,":[2],"we":[3],"present":[4],"a":[5],"novel":[6],"algorithm":[7,92],"for":[8,53],"secure":[9,132],"audio":[10,58,159],"watermarking":[11,108],"in":[12,67,133],"image":[13],"using":[14,97],"BCH":[15,63,98,137],"coding":[16,79,99,138,142],"based":[17],"on":[18],"wavelet":[19,69],"transform.":[20],"context,":[23],"the":[24,35,38,42,57,62,68,74,82,88,94,106,123,127,157],"security":[25,95,101],"is":[26,44,65,110,130,148],"quantified":[27],"from":[28,50],"an":[29],"information-theoretic":[30],"point":[31],"of":[32,48,76,87,105],"view":[33],"via":[34,96,115],"equivocation":[36,43],"about":[37],"secret":[39],"parameters.":[40],"Firstly,":[41],"estimated":[45],"by":[46,61,126,150],"means":[47],"tools":[49],"information":[51],"theory":[52],"WOA":[54],"scenario.":[55],"Then,":[56],"watermark":[59,124,146,160],"encoded":[60],"technique":[64,72,129],"embedded":[66],"coefficients.":[70],"The":[71,103,144],"takes":[73],"promotes":[75],"error":[77,84],"correcting":[78],"to":[80],"decreased":[81],"bit":[83],"rate":[85],"(BER)":[86],"extracted":[89,145,162],"watermark.":[90,163],"This":[91],"improves":[93],"and":[100,113,140,161],"keys.":[102],"performance":[104],"proposed":[107,128],"method":[109],"analytically":[111],"investigated":[112],"verified":[114],"several":[116],"simulations.":[117],"Experimental":[118],"works":[119],"have":[120],"demonstrated":[121],"that":[122],"generated":[125],"more":[131],"comparison":[134],"with":[135],"non":[136],"scheme":[139],"Golay":[141],"scheme.":[143],"quality":[147],"shown":[149],"considering":[151],"normalized":[152],"correlation":[153],"(NC)":[154],"value":[155],"between":[156],"original":[158]},"counts_by_year":[{"year":2017,"cited_by_count":3},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
