{"id":"https://openalex.org/W2137002160","doi":"https://doi.org/10.1109/icassp.2003.1199529","title":"An invertible watermarking scheme for authentication of Electronic Clinical Brain Atlas","display_name":"An invertible watermarking scheme for authentication of Electronic Clinical Brain Atlas","publication_year":2003,"publication_date":"2003-12-22","ids":{"openalex":"https://openalex.org/W2137002160","doi":"https://doi.org/10.1109/icassp.2003.1199529","mag":"2137002160"},"language":"en","primary_location":{"id":"doi:10.1109/icassp.2003.1199529","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icassp.2003.1199529","pdf_url":null,"source":{"id":"https://openalex.org/S4363608982","display_name":"2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03).","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03).","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102279390","display_name":"Yanjiang Yang","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yanjiang Yang","raw_affiliation_strings":["Laboratories for Information Technology, Singapore","Lab. for Inf. Technol., Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Laboratories for Information Technology, Singapore","institution_ids":[]},{"raw_affiliation_string":"Lab. for Inf. Technol., Singapore, Singapore","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108377350","display_name":"Feng Bao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Feng Bao","raw_affiliation_strings":["Laboratories for Information Technology, Singapore","Lab. for Inf. Technol., Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Laboratories for Information Technology, Singapore","institution_ids":[]},{"raw_affiliation_string":"Lab. for Inf. Technol., Singapore, Singapore","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5102279390"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.5465,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.88709677,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"3","issue":null,"first_page":"III","last_page":"533"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9812999963760376,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10901","display_name":"Advanced Data Compression Techniques","score":0.9190999865531921,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.8705482482910156},{"id":"https://openalex.org/keywords/invertible-matrix","display_name":"Invertible matrix","score":0.7764110565185547},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.663506031036377},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.651391863822937},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5842012166976929},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.48551464080810547},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4824565052986145},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.4166858494281769},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3882233798503876},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3384934067726135},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3330039978027344},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2945367097854614},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2341548204421997},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.16361311078071594}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.8705482482910156},{"id":"https://openalex.org/C96442724","wikidata":"https://www.wikidata.org/wiki/Q242188","display_name":"Invertible matrix","level":2,"score":0.7764110565185547},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.663506031036377},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.651391863822937},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5842012166976929},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.48551464080810547},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4824565052986145},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.4166858494281769},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3882233798503876},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3384934067726135},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3330039978027344},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2945367097854614},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2341548204421997},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.16361311078071594},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icassp.2003.1199529","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icassp.2003.1199529","pdf_url":null,"source":{"id":"https://openalex.org/S4363608982","display_name":"2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03).","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03).","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1507005573","https://openalex.org/W1581202029","https://openalex.org/W1744890312","https://openalex.org/W1945093115","https://openalex.org/W2085640111","https://openalex.org/W2105745054","https://openalex.org/W2611745365","https://openalex.org/W4247934040","https://openalex.org/W6630366655","https://openalex.org/W6634676185","https://openalex.org/W6636139328"],"related_works":["https://openalex.org/W2137394636","https://openalex.org/W2358993821","https://openalex.org/W1516446231","https://openalex.org/W2098152888","https://openalex.org/W1559740347","https://openalex.org/W2040356834","https://openalex.org/W2080353903","https://openalex.org/W2385289568","https://openalex.org/W2381486749","https://openalex.org/W1514507288"],"abstract_inverted_index":{"The":[0],"difficulty":[1],"in":[2,9],"watermarking":[3,13,32,40,71],"medical":[4],"imagery":[5],"for":[6,74,93,109],"authentication":[7,75,111],"lies":[8],"the":[10,24,29,37,46,77,89,96,130,136],"fact":[11],"that":[12],"itself":[14],"should":[15],"not":[16,43],"introduce":[17],"even":[18],"one":[19],"bit":[20],"of":[21,57,76,88],"alteration":[22],"to":[23,45,63,99],"images.":[25],"To":[26],"this":[27],"point,":[28],"recent":[30],"invertible":[31,39,70,110,132],"technique":[33],"can":[34],"help.":[35],"However,":[36],"existing":[38,117],"schemes":[41,118],"are":[42],"adaptable":[44],"Electronic":[47,78],"Clinical":[48,79],"Brain":[49,80],"Atlas":[50],"(Nowinski":[51],"et":[52],"al.":[53],"(1998)),":[54],"a":[55,101,106],"kind":[56],"\"unnatural\"":[58],"palette":[59],"images":[60],"with":[61],"respect":[62],"their":[64],"uncorrelated":[65],"contents.":[66],"We":[67],"develop":[68],"an":[69,128],"scheme":[72,85,98,133,139],"exclusively":[73],"Atlas.":[81],"What":[82],"makes":[83],"our":[84],"special":[86],"consists":[87],"candidate":[90],"points":[91],"chosen":[92],"embedding":[94],"and":[95,119],"encoding":[97],"encode":[100],"bitstream.":[102],"Furthermore,":[103],"we":[104],"present":[105],"general":[107],"framework":[108],"watermarking,":[112],"which":[113],"encompasses":[114],"virtually":[115],"all":[116],"more":[120],"importantly,":[121],"provides":[122],"higher":[123],"security":[124],"over":[125],"them.":[126],"As":[127],"example,":[129],"proposed":[131],"follows":[134],"faithfully":[135],"framework.":[137],"Our":[138],"really":[140],"solves":[141],"what":[142],"others":[143],"cannot.":[144]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
