{"id":"https://openalex.org/W2062383108","doi":"https://doi.org/10.1109/ic3.2013.6612238","title":"Robust blind digital image watermarking scheme based on stationary wavelet transform","display_name":"Robust blind digital image watermarking scheme based on stationary wavelet transform","publication_year":2013,"publication_date":"2013-08-01","ids":{"openalex":"https://openalex.org/W2062383108","doi":"https://doi.org/10.1109/ic3.2013.6612238","mag":"2062383108"},"language":"en","primary_location":{"id":"doi:10.1109/ic3.2013.6612238","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3.2013.6612238","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 Sixth International Conference on Contemporary Computing (IC3)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025355597","display_name":"Nagarjuna Venkat P","orcid":"https://orcid.org/0000-0001-8111-5130"},"institutions":[{"id":"https://openalex.org/I207223250","display_name":"Indian Institute of Information Technology Design and Manufacturing Jabalpur","ror":"https://ror.org/00gmd7q80","country_code":"IN","type":"education","lineage":["https://openalex.org/I207223250"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"P. V. Nagarjuna","raw_affiliation_strings":["Electronics & Communication Engineering, PDPM Indian Institute of Information Technology, Jabalpur, MP, INDIA","PDPM Indian Inst. of Inf. Technol., Electron. & Commun. Eng., Jabalpur, India"],"affiliations":[{"raw_affiliation_string":"Electronics & Communication Engineering, PDPM Indian Institute of Information Technology, Jabalpur, MP, INDIA","institution_ids":["https://openalex.org/I207223250"]},{"raw_affiliation_string":"PDPM Indian Inst. of Inf. Technol., Electron. & Commun. Eng., Jabalpur, India","institution_ids":["https://openalex.org/I207223250"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113570613","display_name":"K. Ranjeet","orcid":null},"institutions":[{"id":"https://openalex.org/I207223250","display_name":"Indian Institute of Information Technology Design and Manufacturing Jabalpur","ror":"https://ror.org/00gmd7q80","country_code":"IN","type":"education","lineage":["https://openalex.org/I207223250"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"K. Ranjeet","raw_affiliation_strings":["Electronics & Communication Engineering, PDPM Indian Institute of Information Technology, Jabalpur, MP, INDIA","PDPM Indian Inst. of Inf. Technol., Electron. & Commun. Eng., Jabalpur, India"],"affiliations":[{"raw_affiliation_string":"Electronics & Communication Engineering, PDPM Indian Institute of Information Technology, Jabalpur, MP, INDIA","institution_ids":["https://openalex.org/I207223250"]},{"raw_affiliation_string":"PDPM Indian Inst. of Inf. Technol., Electron. & Commun. Eng., Jabalpur, India","institution_ids":["https://openalex.org/I207223250"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5025355597"],"corresponding_institution_ids":["https://openalex.org/I207223250"],"apc_list":null,"apc_paid":null,"fwci":1.3608,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.83920422,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"451","last_page":"454"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10901","display_name":"Advanced Data Compression Techniques","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.8446917533874512},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.7896238565444946},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6716041564941406},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6323941349983215},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.6098913550376892},{"id":"https://openalex.org/keywords/wavelet-transform","display_name":"Wavelet transform","score":0.5800479650497437},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.549019455909729},{"id":"https://openalex.org/keywords/wavelet","display_name":"Wavelet","score":0.5342546701431274},{"id":"https://openalex.org/keywords/stationary-wavelet-transform","display_name":"Stationary wavelet transform","score":0.5279661417007446},{"id":"https://openalex.org/keywords/discrete-wavelet-transform","display_name":"Discrete wavelet transform","score":0.4863048493862152},{"id":"https://openalex.org/keywords/second-generation-wavelet-transform","display_name":"Second-generation wavelet transform","score":0.42122817039489746},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4183374047279358},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.38688787817955017}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.8446917533874512},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.7896238565444946},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6716041564941406},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6323941349983215},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.6098913550376892},{"id":"https://openalex.org/C196216189","wikidata":"https://www.wikidata.org/wiki/Q2867","display_name":"Wavelet transform","level":3,"score":0.5800479650497437},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.549019455909729},{"id":"https://openalex.org/C47432892","wikidata":"https://www.wikidata.org/wiki/Q831390","display_name":"Wavelet","level":2,"score":0.5342546701431274},{"id":"https://openalex.org/C73339587","wikidata":"https://www.wikidata.org/wiki/Q1375942","display_name":"Stationary wavelet transform","level":5,"score":0.5279661417007446},{"id":"https://openalex.org/C46286280","wikidata":"https://www.wikidata.org/wiki/Q2414958","display_name":"Discrete wavelet transform","level":4,"score":0.4863048493862152},{"id":"https://openalex.org/C111350171","wikidata":"https://www.wikidata.org/wiki/Q7443700","display_name":"Second-generation wavelet transform","level":5,"score":0.42122817039489746},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4183374047279358},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.38688787817955017},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ic3.2013.6612238","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3.2013.6612238","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 Sixth International Conference on Contemporary Computing (IC3)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/6","score":0.5299999713897705,"display_name":"Clean water and sanitation"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W51161925","https://openalex.org/W2103320971","https://openalex.org/W2106069707","https://openalex.org/W2113103255","https://openalex.org/W2113388513","https://openalex.org/W2116467012","https://openalex.org/W2159390040","https://openalex.org/W2160438444","https://openalex.org/W2161647295","https://openalex.org/W2465272556","https://openalex.org/W4285719527","https://openalex.org/W6676975911","https://openalex.org/W6719215191"],"related_works":["https://openalex.org/W2085792030","https://openalex.org/W2059234650","https://openalex.org/W2101997086","https://openalex.org/W1588899229","https://openalex.org/W4310584255","https://openalex.org/W1889651196","https://openalex.org/W4249722514","https://openalex.org/W2164576153","https://openalex.org/W2037009764","https://openalex.org/W68308810"],"abstract_inverted_index":{"In":[0],"this":[1],"manuscript":[2],"stationary":[3],"wavelet":[4],"transform":[5],"based":[6],"digital":[7],"image":[8,27,59],"watermarking":[9],"algorithm":[10,15],"is":[11,40,43],"proposed.":[12],"The":[13,49,72],"proposed":[14,50,80],"combines":[16],"the":[17,25,32,36,47,55,58,65,69,76,79],"information":[18,33,66],"of":[19,57,61,78],"low":[20],"frequency":[21],"SWT":[22],"coefficients":[23],"and":[24,42],"watermark":[26],"without":[28],"any":[29],"change":[30,63],"in":[31,35,64,68],"present":[34,67],"original":[37,70],"image.":[38,71],"Key":[39],"combination":[41],"used":[44],"to":[45],"extract":[46],"watermark.":[48],"method":[51],"will":[52],"not":[53],"affect":[54],"quality":[56],"because":[60],"no":[62],"simulation":[73],"results":[74],"demonstrate":[75],"effectiveness":[77],"algorithm.":[81]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
