{"id":"https://openalex.org/W3093768290","doi":"https://doi.org/10.1109/icccnt49239.2020.9225668","title":"Image Segmentation Based Hybrid Watermarking Algorithm for Copyright Protection","display_name":"Image Segmentation Based Hybrid Watermarking Algorithm for Copyright Protection","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3093768290","doi":"https://doi.org/10.1109/icccnt49239.2020.9225668","mag":"3093768290"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt49239.2020.9225668","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt49239.2020.9225668","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003213162","display_name":"Y. Bhavani","orcid":"https://orcid.org/0000-0002-8578-7126"},"institutions":[{"id":"https://openalex.org/I28210344","display_name":"Kakatiya University","ror":"https://ror.org/012zpbg81","country_code":"IN","type":"education","lineage":["https://openalex.org/I28210344"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Y. Bhavani","raw_affiliation_strings":["Kakatiya Institute of Technology & Science, Warangal, India"],"raw_orcid":"https://orcid.org/0000-0002-8578-7126","affiliations":[{"raw_affiliation_string":"Kakatiya Institute of Technology & Science, Warangal, India","institution_ids":["https://openalex.org/I28210344"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086886590","display_name":"Sai Srikar Puppala","orcid":null},"institutions":[{"id":"https://openalex.org/I28210344","display_name":"Kakatiya University","ror":"https://ror.org/012zpbg81","country_code":"IN","type":"education","lineage":["https://openalex.org/I28210344"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sai Srikar Puppala","raw_affiliation_strings":["Kakatiya Institute of Technology & Science, Warangal, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Kakatiya Institute of Technology & Science, Warangal, India","institution_ids":["https://openalex.org/I28210344"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056335947","display_name":"Spoorthy Shivani Pabba","orcid":null},"institutions":[{"id":"https://openalex.org/I28210344","display_name":"Kakatiya University","ror":"https://ror.org/012zpbg81","country_code":"IN","type":"education","lineage":["https://openalex.org/I28210344"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Spoorthy Shivani Pabba","raw_affiliation_strings":["Kakatiya Institute of Technology & Science, Warangal, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Kakatiya Institute of Technology & Science, Warangal, India","institution_ids":["https://openalex.org/I28210344"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021171191","display_name":"Kavya Sri Kasarla","orcid":null},"institutions":[{"id":"https://openalex.org/I28210344","display_name":"Kakatiya University","ror":"https://ror.org/012zpbg81","country_code":"IN","type":"education","lineage":["https://openalex.org/I28210344"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Kavya Sri Kasarla","raw_affiliation_strings":["Kakatiya Institute of Technology & Science, Warangal, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Kakatiya Institute of Technology & Science, Warangal, India","institution_ids":["https://openalex.org/I28210344"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112574500","display_name":"Kadipaka Anvitha","orcid":null},"institutions":[{"id":"https://openalex.org/I28210344","display_name":"Kakatiya University","ror":"https://ror.org/012zpbg81","country_code":"IN","type":"education","lineage":["https://openalex.org/I28210344"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Kadipaka Anvitha","raw_affiliation_strings":["Kakatiya Institute of Technology & Science, Warangal, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Kakatiya Institute of Technology & Science, Warangal, India","institution_ids":["https://openalex.org/I28210344"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5003213162"],"corresponding_institution_ids":["https://openalex.org/I28210344"],"apc_list":null,"apc_paid":null,"fwci":0.6868,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.72630811,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.8888532519340515},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.7973178625106812},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7320530414581299},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6089688539505005},{"id":"https://openalex.org/keywords/singular-value-decomposition","display_name":"Singular value decomposition","score":0.4925842881202698},{"id":"https://openalex.org/keywords/copy-protection","display_name":"Copy protection","score":0.4773048162460327},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.4765104353427887},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.46811312437057495},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4445713758468628},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.4306378662586212},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.42988112568855286},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4283002018928528},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3811385929584503},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3566626310348511},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3357918858528137}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.8888532519340515},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.7973178625106812},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7320530414581299},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6089688539505005},{"id":"https://openalex.org/C22789450","wikidata":"https://www.wikidata.org/wiki/Q420904","display_name":"Singular value decomposition","level":2,"score":0.4925842881202698},{"id":"https://openalex.org/C2780581891","wikidata":"https://www.wikidata.org/wiki/Q15738686","display_name":"Copy protection","level":4,"score":0.4773048162460327},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.4765104353427887},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.46811312437057495},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4445713758468628},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.4306378662586212},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.42988112568855286},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4283002018928528},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3811385929584503},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3566626310348511},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3357918858528137}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt49239.2020.9225668","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt49239.2020.9225668","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1542157244","https://openalex.org/W1571928851","https://openalex.org/W1969182491","https://openalex.org/W1977101275","https://openalex.org/W1996610784","https://openalex.org/W2049357246","https://openalex.org/W2056825664","https://openalex.org/W2092578570","https://openalex.org/W2100458800","https://openalex.org/W2103320971","https://openalex.org/W2130542985","https://openalex.org/W2131559909","https://openalex.org/W2155451907","https://openalex.org/W2165046009","https://openalex.org/W2772909343","https://openalex.org/W2786276737","https://openalex.org/W2941527770","https://openalex.org/W2944254724","https://openalex.org/W2963626782","https://openalex.org/W4387929000"],"related_works":["https://openalex.org/W2137394636","https://openalex.org/W2389162948","https://openalex.org/W2389681530","https://openalex.org/W2144768725","https://openalex.org/W1877781347","https://openalex.org/W1905517991","https://openalex.org/W1594550932","https://openalex.org/W2161157315","https://openalex.org/W1653712242","https://openalex.org/W1490264596"],"abstract_inverted_index":{"Today,":[0],"most":[1],"of":[2,23,48,120,163,168],"the":[3,7,30,137,149,161,181,187],"information":[4,25],"shared":[5],"across":[6],"globe":[8],"is":[9,34,171],"in":[10,58],"multimedia":[11],"form":[12],"like":[13],"audio,":[14],"video":[15],"and":[16,33,104,156,178],"image.":[17],"With":[18],"increased":[19],"globalization,":[20],"any":[21],"type":[22],"such":[24],"can":[26,157],"be":[27,158],"broadcasted":[28],"throughout":[29],"world":[31],"easily":[32],"accessible":[35],"to":[36,45,68,110,148],"multiple":[37],"users":[38],"for":[39],"varied":[40],"applications.":[41],"This":[42,166],"may":[43],"lead":[44],"fraudulent":[46],"claiming":[47],"data":[49],"ownership":[50],"which":[51,78,128],"makes":[52],"copyright":[53,69,164],"protection":[54,70],"a":[55,65,88,117],"major":[56],"priority":[57],"today's":[59],"world.":[60],"Digital":[61],"Watermarking":[62],"serves":[63,79],"as":[64,80,145],"prime":[66],"solution":[67],"where":[71],"we":[72,86,115],"embed":[73],"watermark":[74],"into":[75],"digital":[76,121,189],"image":[77],"an":[81],"authenticator.":[82],"In":[83],"this":[84],"paper,":[85],"proposed":[87,116],"hybrid":[89,169],"algorithm":[90,155],"using":[91,131,151],"Image":[92],"segmentation,":[93],"SVD":[94],"(Singular":[95],"value":[96],"decomposition),":[97],"DWT":[98],"(Discrete":[99],"wavelet":[100],"transformation),":[101],"Homomorphic":[102],"filtering":[103],"RSA":[105],"encryption":[106],"technique":[107,170],"that":[108],"helps":[109],"overcome":[111],"various":[112],"threats.":[113],"Here,":[114],"new":[118],"approach":[119,167],"watermarking":[122,190],"by":[123,174],"embedding":[124],"two":[125,132],"segmented":[126],"watermarks":[127],"are":[129,143],"obtained":[130],"distinct":[133],"threshold":[134,141],"values":[135,142],"on":[136],"original":[138],"watermark.":[139],"These":[140],"sent":[144],"secret":[146],"keys":[147],"receiver":[150],"Diffie-Hellman":[152],"key":[153],"exchange":[154],"used":[159],"at":[160],"time":[162],"verification.":[165],"being":[172],"tested":[173],"applying":[175],"Gaussian":[176],"Noise":[177],"it":[179],"gave":[180],"best":[182],"results":[183],"when":[184],"compared":[185],"with":[186],"other":[188],"techniques.":[191]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":1}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
