{"id":"https://openalex.org/W2957806527","doi":"https://doi.org/10.1109/icc.2019.8761382","title":"Efficiency-Aware Watermarking using Different Wavelet Families for the Internet of Things","display_name":"Efficiency-Aware Watermarking using Different Wavelet Families for the Internet of Things","publication_year":2019,"publication_date":"2019-05-01","ids":{"openalex":"https://openalex.org/W2957806527","doi":"https://doi.org/10.1109/icc.2019.8761382","mag":"2957806527"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2019.8761382","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2019.8761382","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032169982","display_name":"Tamara K. Al-Shayea","orcid":null},"institutions":[{"id":"https://openalex.org/I17389662","display_name":"University of Nicosia","ror":"https://ror.org/04v18t651","country_code":"CY","type":"education","lineage":["https://openalex.org/I17389662"]}],"countries":["CY"],"is_corresponding":true,"raw_author_name":"Tamara K. Al-Shayea","raw_affiliation_strings":["Department of Computer Science, University of Nicosia, Nicosia, Cyprus"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Nicosia, Nicosia, Cyprus","institution_ids":["https://openalex.org/I17389662"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050729772","display_name":"Constandinos X. Mavromoustakis","orcid":"https://orcid.org/0000-0003-0333-8034"},"institutions":[{"id":"https://openalex.org/I17389662","display_name":"University of Nicosia","ror":"https://ror.org/04v18t651","country_code":"CY","type":"education","lineage":["https://openalex.org/I17389662"]}],"countries":["CY"],"is_corresponding":false,"raw_author_name":"Constandinos X. Mavromoustakis","raw_affiliation_strings":["Department of Computer Science, University of Nicosia, Nicosia, Cyprus"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Nicosia, Nicosia, Cyprus","institution_ids":["https://openalex.org/I17389662"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064274622","display_name":"Jordi Mongay Batalla","orcid":"https://orcid.org/0000-0002-1489-5138"},"institutions":[{"id":"https://openalex.org/I108403487","display_name":"Warsaw University of Technology","ror":"https://ror.org/00y0xnp53","country_code":"PL","type":"education","lineage":["https://openalex.org/I108403487"]},{"id":"https://openalex.org/I4210125529","display_name":"National Institute of Telecommunications","ror":"https://ror.org/03053v606","country_code":"PL","type":"facility","lineage":["https://openalex.org/I4210125529"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Jordi Mongay Batalla","raw_affiliation_strings":["National Institute of Telecommunications and Warsaw, University of Technology, Warsaw, Poland"],"affiliations":[{"raw_affiliation_string":"National Institute of Telecommunications and Warsaw, University of Technology, Warsaw, Poland","institution_ids":["https://openalex.org/I4210125529","https://openalex.org/I108403487"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030161759","display_name":"George Mastorakis","orcid":"https://orcid.org/0000-0002-6733-5652"},"institutions":[{"id":"https://openalex.org/I28710699","display_name":"Hellenic Mediterranean University","ror":"https://ror.org/039ce0m20","country_code":"GR","type":"education","lineage":["https://openalex.org/I28710699"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"George Mastorakis","raw_affiliation_strings":["Department of Business Administration, Technological Educational Institute of Crete, Crete, Greece"],"affiliations":[{"raw_affiliation_string":"Department of Business Administration, Technological Educational Institute of Crete, Crete, Greece","institution_ids":["https://openalex.org/I28710699"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066710236","display_name":"Mithun Mukherjee","orcid":"https://orcid.org/0000-0002-6605-180X"},"institutions":[{"id":"https://openalex.org/I4210128140","display_name":"Guangdong University of Petrochemical Technology","ror":"https://ror.org/030ffke25","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210128140"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mithun Mukherjee","raw_affiliation_strings":["Key Lab of Petrochemical Equipment Fault Diagnosis, Guangdong University of Petrochemical Technology, Maoming, China"],"affiliations":[{"raw_affiliation_string":"Key Lab of Petrochemical Equipment Fault Diagnosis, Guangdong University of Petrochemical Technology, Maoming, China","institution_ids":["https://openalex.org/I4210128140"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077616678","display_name":"Periklis Chatzimisios","orcid":"https://orcid.org/0000-0003-2366-1365"},"institutions":[{"id":"https://openalex.org/I77990126","display_name":"Alexander Technological Educational Institute of Thessaloniki","ror":"https://ror.org/04h36ea57","country_code":"GR","type":"education","lineage":["https://openalex.org/I77990126"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Periklis Chatzimisios","raw_affiliation_strings":["CSSN Research Lab, Alexander Technological Educational Institute of Thessaloniki, Thessaloniki, Greece"],"affiliations":[{"raw_affiliation_string":"CSSN Research Lab, Alexander Technological Educational Institute of Thessaloniki, Thessaloniki, Greece","institution_ids":["https://openalex.org/I77990126"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5032169982"],"corresponding_institution_ids":["https://openalex.org/I17389662"],"apc_list":null,"apc_paid":null,"fwci":1.3159,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.84379592,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.7605031728744507},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.727409839630127},{"id":"https://openalex.org/keywords/wavelet","display_name":"Wavelet","score":0.6336157321929932},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.5995895266532898},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5963286757469177},{"id":"https://openalex.org/keywords/biorthogonal-system","display_name":"Biorthogonal system","score":0.592759370803833},{"id":"https://openalex.org/keywords/biorthogonal-wavelet","display_name":"Biorthogonal wavelet","score":0.49550092220306396},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49483174085617065},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.44764208793640137},{"id":"https://openalex.org/keywords/discrete-wavelet-transform","display_name":"Discrete wavelet transform","score":0.4356970489025116},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.41572675108909607},{"id":"https://openalex.org/keywords/wavelet-transform","display_name":"Wavelet transform","score":0.4105372726917267},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.40481990575790405},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.39327603578567505},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3859637379646301},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.2786085605621338},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.13651087880134583}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.7605031728744507},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.727409839630127},{"id":"https://openalex.org/C47432892","wikidata":"https://www.wikidata.org/wiki/Q831390","display_name":"Wavelet","level":2,"score":0.6336157321929932},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.5995895266532898},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5963286757469177},{"id":"https://openalex.org/C158453530","wikidata":"https://www.wikidata.org/wiki/Q864692","display_name":"Biorthogonal system","level":4,"score":0.592759370803833},{"id":"https://openalex.org/C2778869661","wikidata":"https://www.wikidata.org/wiki/Q4915256","display_name":"Biorthogonal wavelet","level":5,"score":0.49550092220306396},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49483174085617065},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.44764208793640137},{"id":"https://openalex.org/C46286280","wikidata":"https://www.wikidata.org/wiki/Q2414958","display_name":"Discrete wavelet transform","level":4,"score":0.4356970489025116},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.41572675108909607},{"id":"https://openalex.org/C196216189","wikidata":"https://www.wikidata.org/wiki/Q2867","display_name":"Wavelet transform","level":3,"score":0.4105372726917267},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.40481990575790405},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.39327603578567505},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3859637379646301},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.2786085605621338},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.13651087880134583},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc.2019.8761382","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2019.8761382","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W228380312","https://openalex.org/W1508120902","https://openalex.org/W1581583463","https://openalex.org/W2006931102","https://openalex.org/W2130150062","https://openalex.org/W2168725090","https://openalex.org/W2345246736","https://openalex.org/W2471366717","https://openalex.org/W2479191003","https://openalex.org/W2557108776","https://openalex.org/W2559623368","https://openalex.org/W2600387315","https://openalex.org/W2677785100","https://openalex.org/W2728123565","https://openalex.org/W2732477316","https://openalex.org/W2758420377","https://openalex.org/W2761245316","https://openalex.org/W2765116744","https://openalex.org/W2784071846","https://openalex.org/W2790485884","https://openalex.org/W2792257088","https://openalex.org/W2830267586","https://openalex.org/W4233130698","https://openalex.org/W4239883254"],"related_works":["https://openalex.org/W2137394636","https://openalex.org/W2358993821","https://openalex.org/W1516446231","https://openalex.org/W2098152888","https://openalex.org/W1559740347","https://openalex.org/W2040356834","https://openalex.org/W2080353903","https://openalex.org/W2385289568","https://openalex.org/W2381486749","https://openalex.org/W1514507288"],"abstract_inverted_index":{"Efficient":[0],"image":[1,91],"transfer":[2,62],"in":[3],"the":[4,20,68,104,110,113,132,174,177,182],"Internet":[5,26,69],"of":[6,22,27,53,55,70,89,112,167,176,181,203],"Things":[7,28],"(IoT)":[8],"Era,":[9],"has":[10],"many":[11],"requirements":[12],"that":[13,33,103],"need":[14,43],"to":[15,44,47,80,101,206],"be":[16,45,78,99],"satisfied":[17],"based":[18,130],"on":[19,131],"nature":[21],"each":[23],"underlying":[24],"application.":[25],"is":[29,107,190],"a":[30,126,147,200],"research":[31],"paradigm":[32],"empowers":[34],"data,":[35],"data":[36,61,105,183],"fusion":[37],"and":[38,87,109,120,139,153,171,179,198,210],"encompasses":[39],"embedded":[40],"images,":[41],"which":[42],"transmitted":[46],"numerous":[48],"interconnected":[49],"devices.":[50],"The":[51,187],"risks":[52],"contravention":[54],"owner's":[56],"rights":[57,83,111],"are":[58,115,161],"increasing,":[59],"while":[60,144],"creates":[63],"new":[64],"demands":[65],"for":[66,149,173],"securing":[67],"Things.":[71],"In":[72],"this":[73],"respect,":[74],"watermarking":[75,97,128],"schemes":[76],"can":[77,98],"used":[79,100,106],"save":[81],"those":[82],"from":[84],"illegal":[85],"usage":[86],"copying":[88],"digital":[90,96],"data.":[92],"For":[93],"IoT":[94,185],"applications":[95],"guarantee":[102],"protected":[108],"owner":[114],"secured":[116],"(i.e.":[117],"both":[118],"user":[119],"machine":[121],"generated).":[122],"This":[123],"work":[124],"proposes":[125],"novel":[127],"scheme":[129],"biorthogonal":[133,137,140],"family,":[134],"(biorthogonal":[135],"2.2,":[136],"3.5":[138],"5.5)":[141],"wavelet":[142,151,155,158],"transform,":[143],"it":[145],"uses":[146],"convolution":[148],"symlets":[150],"transform":[152],"coiflets":[154],"transform.":[156],"These":[157],"family":[159],"approaches":[160],"highly":[162],"robust":[163],"against":[164,196],"various":[165],"types":[166],"attacks":[168,197],"(both":[169],"passive":[170],"active),":[172],"prevention":[175],"piracy":[178],"authentication":[180],"over":[184],"ecosystems.":[186],"proposed":[188],"framework":[189],"thoroughly":[191],"evaluated":[192],"showing":[193],"great":[194],"robustness":[195],"allowing":[199],"higher":[201],"level":[202],"protection":[204],"compared":[205],"other":[207],"available":[208],"frameworks":[209],"schemes.":[211]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
