{"id":"https://openalex.org/W2161759836","doi":"https://doi.org/10.1109/hicss.2004.1265256","title":"A commutative encrypted protocol for the privacy protection of watermarks in digital contents","display_name":"A commutative encrypted protocol for the privacy protection of watermarks in digital contents","publication_year":2004,"publication_date":"2004-01-01","ids":{"openalex":"https://openalex.org/W2161759836","doi":"https://doi.org/10.1109/hicss.2004.1265256","mag":"2161759836"},"language":"en","primary_location":{"id":"doi:10.1109/hicss.2004.1265256","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hicss.2004.1265256","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034057959","display_name":"Shing-Chi Cheung","orcid":"https://orcid.org/0000-0002-3508-7172"},"institutions":[{"id":"https://openalex.org/I200769079","display_name":"Hong Kong University of Science and Technology","ror":"https://ror.org/00q4vv597","country_code":"HK","type":"education","lineage":["https://openalex.org/I200769079"]}],"countries":["HK"],"is_corresponding":true,"raw_author_name":"Shing-chi Cheung","raw_affiliation_strings":["Department of Computer Science, Hong Kong University of Science and Technology, Kowloon, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Hong Kong University of Science and Technology, Kowloon, Hong Kong, China","institution_ids":["https://openalex.org/I200769079"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022683388","display_name":"Ho-fung Leung","orcid":"https://orcid.org/0000-0003-4914-2934"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"HK","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Ho-fung Leung","raw_affiliation_strings":["Department of Computer Science and Engineering, Chinese University of Hong Kong, New Territories, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Chinese University of Hong Kong, New Territories, Hong Kong, China","institution_ids":["https://openalex.org/I177725633"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071865765","display_name":"Changjie Wang","orcid":"https://orcid.org/0009-0000-4604-1180"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"HK","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Changjie Wang","raw_affiliation_strings":["Department of Computer Science and Engineering, Chinese University of Hong Kong, New Territories, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Chinese University of Hong Kong, New Territories, Hong Kong, China","institution_ids":["https://openalex.org/I177725633"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5034057959"],"corresponding_institution_ids":["https://openalex.org/I200769079"],"apc_list":null,"apc_paid":null,"fwci":1.9131,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.87683981,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"10 pp.","last_page":"10 pp."},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.8120232820510864},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.7800843715667725},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.748479962348938},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7253574728965759},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7227468490600586},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6162901520729065},{"id":"https://openalex.org/keywords/digital-rights-management","display_name":"Digital rights management","score":0.6139600872993469},{"id":"https://openalex.org/keywords/digital-content","display_name":"Digital content","score":0.6101767420768738},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5374249815940857},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.5363937616348267},{"id":"https://openalex.org/keywords/copy-protection","display_name":"Copy protection","score":0.47623732686042786},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.4408547580242157},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.42880675196647644},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.251802921295166},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.10549384355545044},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09074464440345764},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.08479666709899902}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.8120232820510864},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.7800843715667725},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.748479962348938},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7253574728965759},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7227468490600586},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6162901520729065},{"id":"https://openalex.org/C537843408","wikidata":"https://www.wikidata.org/wiki/Q192532","display_name":"Digital rights management","level":2,"score":0.6139600872993469},{"id":"https://openalex.org/C2779344036","wikidata":"https://www.wikidata.org/wiki/Q11320476","display_name":"Digital content","level":2,"score":0.6101767420768738},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5374249815940857},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.5363937616348267},{"id":"https://openalex.org/C2780581891","wikidata":"https://www.wikidata.org/wiki/Q15738686","display_name":"Copy protection","level":4,"score":0.47623732686042786},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.4408547580242157},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.42880675196647644},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.251802921295166},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.10549384355545044},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09074464440345764},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.08479666709899902},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/hicss.2004.1265256","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hicss.2004.1265256","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5600000023841858,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W329998640","https://openalex.org/W1508301576","https://openalex.org/W1927625236","https://openalex.org/W1995320371","https://openalex.org/W2078566730","https://openalex.org/W2083122891","https://openalex.org/W2116467012","https://openalex.org/W2123983517","https://openalex.org/W2150010995","https://openalex.org/W2161157315","https://openalex.org/W2162719060","https://openalex.org/W2210874835","https://openalex.org/W2523745724","https://openalex.org/W4232836212","https://openalex.org/W4285719527","https://openalex.org/W6611465443","https://openalex.org/W6649282660"],"related_works":["https://openalex.org/W1562323537","https://openalex.org/W2121604643","https://openalex.org/W2132585739","https://openalex.org/W2098827397","https://openalex.org/W2305027798","https://openalex.org/W2171296023","https://openalex.org/W2076224808","https://openalex.org/W2350923430","https://openalex.org/W2009431509","https://openalex.org/W3147694637"],"abstract_inverted_index":{"Analysis":[0],"by":[1,94,126,131,168,174],"Forrester":[2],"research":[3],"revealed":[4],"that":[5,16,236],"18%":[6],"of":[7,19,35,52,64,77,80,96,162,190,220,223,231],"global":[8],"exports":[9],"will":[10,21],"flow":[11],"online":[12],"in":[13,32,61,194,218],"2004":[14],"and":[15,177,197,234],"the":[17,33,49,84,88,97,101,108,146,160,182,198,205,211,215],"volume":[18],"e-commerce":[20,34],"surpass":[22],"$400":[23],"billion.":[24],"Digital":[25],"rights":[26,50],"protection":[27,51],"is":[28,59,69,113,124,165,207],"a":[29,44,72,78,115,141,154,175,178,184,188,195,229],"major":[30],"issue":[31],"multimedia":[36,53,65,192],"contents.":[37,55,225],"Watermarking":[38],"technology":[39,47],"has":[40,201],"been":[41],"proposed":[42],"as":[43],"promising":[45],"enabling":[46],"for":[48],"digital":[54,224],"A":[56],"unique":[57],"watermark":[58,206],"embedded":[60,98],"each":[62],"piece":[63,79,189],"contents":[66,81,89,193],"before":[67],"it":[68],"distributed":[70,125],"to":[71,118,144,158,213],"customer.":[73],"When":[74],"unauthorized":[75,102,122,221],"copies":[76,103],"are":[82],"found,":[83],"customer":[85,129,176,185],"who":[86],"owns":[87],"can":[90,239],"be":[91],"readily":[92],"identified":[93],"means":[95],"watermark.":[99],"However,":[100],"may":[104],"also":[105,227],"come":[106],"from":[107],"content":[109,134,179,199],"provider":[110,200],"itself.":[111],"It":[112],"therefore":[114],"challenging":[116],"problem":[117,147],"determine":[119,214],"whether":[120],"an":[121,127,132],"copy":[123],"unethical":[128,133,216],"or":[130],"provider.":[135,180],"In":[136,181],"this":[137],"paper,":[138],"we":[139],"propose":[140],"watermarking":[142],"protocol":[143,152,238],"address":[145],"using":[148],"cryptographic":[149],"technologies.":[150],"Our":[151],"employs":[153],"commutative":[155],"encryption":[156,170],"algorithm":[157],"protect":[159],"privacy":[161],"watermarks.":[163],"Information":[164],"doubly":[166],"locked":[167],"two":[169],"keys":[171],"kept":[172],"separately":[173],"protocol,":[183],"only":[186],"gets":[187],"watermarked":[191],"transaction":[196],"no":[202],"idea":[203],"how":[204],"formed.":[208],"This":[209],"facilitates":[210],"authority":[212],"party":[217],"case":[219],"distribution":[222],"We":[226],"discuss":[228],"couple":[230],"common":[232],"attacks":[233],"show":[235],"our":[237],"defend":[240],"successfully":[241],"against":[242],"them.":[243]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
