{"id":"https://openalex.org/W2902025334","doi":"https://doi.org/10.1109/icacci.2018.8554891","title":"Multilevel Authentication using QR code based watermarking with mobile OTP and Hadamard transformation","display_name":"Multilevel Authentication using QR code based watermarking with mobile OTP and Hadamard transformation","publication_year":2018,"publication_date":"2018-09-01","ids":{"openalex":"https://openalex.org/W2902025334","doi":"https://doi.org/10.1109/icacci.2018.8554891","mag":"2902025334"},"language":"en","primary_location":{"id":"doi:10.1109/icacci.2018.8554891","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2018.8554891","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081388340","display_name":"Jisha Mary Thomas","orcid":"https://orcid.org/0000-0002-3491-0294"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Jisha Thomas","raw_affiliation_strings":["Department of Computer network engineering, VTU, Belagavi"],"affiliations":[{"raw_affiliation_string":"Department of Computer network engineering, VTU, Belagavi","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070889906","display_name":"R. H. Goudar","orcid":"https://orcid.org/0000-0002-4590-7744"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"R.H Goudar","raw_affiliation_strings":["Department of Computer network engineering, VTU, Belagavi"],"affiliations":[{"raw_affiliation_string":"Department of Computer network engineering, VTU, Belagavi","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5081388340"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.3134,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.63246521,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"3","issue":null,"first_page":"2421","last_page":"2425"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.819157600402832},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.5843052268028259},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4973640739917755},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.49714162945747375},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.47907716035842896},{"id":"https://openalex.org/keywords/mobile-banking","display_name":"Mobile banking","score":0.4752790033817291},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4552955627441406},{"id":"https://openalex.org/keywords/one-time-password","display_name":"One-time password","score":0.4500468373298645},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.419174462556839},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.28241050243377686},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.17782509326934814},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.13607317209243774},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.09182286262512207}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.819157600402832},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.5843052268028259},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4973640739917755},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.49714162945747375},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.47907716035842896},{"id":"https://openalex.org/C2775930393","wikidata":"https://www.wikidata.org/wiki/Q1941439","display_name":"Mobile banking","level":2,"score":0.4752790033817291},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4552955627441406},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.4500468373298645},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.419174462556839},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.28241050243377686},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.17782509326934814},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.13607317209243774},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.09182286262512207},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icacci.2018.8554891","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2018.8554891","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1525986896","https://openalex.org/W1786665502","https://openalex.org/W1921672672","https://openalex.org/W1978200802","https://openalex.org/W1993353637","https://openalex.org/W2040691809","https://openalex.org/W2184022509","https://openalex.org/W2315677078","https://openalex.org/W2316087628","https://openalex.org/W2317918414","https://openalex.org/W2558271308","https://openalex.org/W2735626136","https://openalex.org/W2774876072","https://openalex.org/W2786655521","https://openalex.org/W2896795768","https://openalex.org/W6638338706","https://openalex.org/W6648296160","https://openalex.org/W6699366170","https://openalex.org/W6755535866"],"related_works":["https://openalex.org/W2021087413","https://openalex.org/W2359085393","https://openalex.org/W2377774403","https://openalex.org/W2237863779","https://openalex.org/W2156083280","https://openalex.org/W2387329106","https://openalex.org/W2969720675","https://openalex.org/W1844709308","https://openalex.org/W4388720174","https://openalex.org/W2949495265"],"abstract_inverted_index":{"In":[0],"this":[1,137],"era":[2],"of":[3,20,40,50,62,122,136,155,161],"high-speed":[4],"internet,":[5],"online":[6,132],"banking":[7,42],"facilities":[8],"improve":[9],"the":[10,14,31,48,51,60,79,82,90,98,109,114,117,131,141,159,170,174],"user":[11],"transactions":[12],"with":[13,59,151],"bank":[15],"within":[16],"a":[17,56,148],"few":[18],"moments":[19],"time.":[21],"This":[22,38],"improved":[23],"communications":[24],"also":[25],"leads":[26],"to":[27,30,81,112],"many":[28],"vulnerabilities":[29],"virtual":[32],"world":[33],"like":[34],"phishing,":[35],"pharming":[36],"etc.":[37],"issue":[39],"mobile":[41,175],"can":[43,94,144,166],"take":[44],"care":[45],"by":[46],"verifying":[47],"authenticity":[49],"user.":[52],"Here":[53,92],"we":[54],"propose":[55],"hybrid":[57],"mechanism":[58],"use":[61,160],"Quick":[63],"Response":[64],"code(QR":[65],"code),":[66],"One":[67],"Time":[68],"Password(OTP),":[69],"and":[70,124],"digital":[71],"watermarking-a":[72],"data":[73],"hiding":[74],"technique.":[75],"Taking":[76],"OTP":[77,93,123],"as":[78],"key":[80],"watermark":[83,125],"sequence":[84,115,126],"QR":[85,142],"code":[86,143],"is":[87,106,139],"generated":[88],"at":[89],"bank.":[91],"be":[95,145,167],"used":[96,107],"for":[97,102,116],"first":[99],"level":[100,119],"verification":[101],"authenticity.":[103],"Hadamard":[104],"transformation":[105],"in":[108,147],"watermarking":[110],"process":[111],"hide":[113],"second":[118],"verification.":[120],"Combination":[121],"enables":[127],"high":[128],"security":[129],"during":[130],"transaction.":[133],"An":[134],"advantage":[135],"approach":[138],"that":[140],"designed":[146],"small":[149],"constraint":[150],"an":[152,162],"appropriate":[153],"way":[154],"real-time":[156,171],"extraction.":[157],"By":[158],"android":[163],"application,":[164],"performance":[165],"evaluated,":[168],"including":[169],"extraction":[172],"using":[173],"phone.":[176]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
