{"id":"https://openalex.org/W4291701226","doi":"https://doi.org/10.1109/icccs55155.2022.9846251","title":"Comparison of Data Hiding Techniques for Video Watermarking Applications","display_name":"Comparison of Data Hiding Techniques for Video Watermarking Applications","publication_year":2022,"publication_date":"2022-04-22","ids":{"openalex":"https://openalex.org/W4291701226","doi":"https://doi.org/10.1109/icccs55155.2022.9846251"},"language":"en","primary_location":{"id":"doi:10.1109/icccs55155.2022.9846251","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccs55155.2022.9846251","pdf_url":null,"source":{"id":"https://openalex.org/S4363608130","display_name":"2022 7th International Conference on Computer and Communication Systems (ICCCS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 7th International Conference on Computer and Communication Systems (ICCCS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023883460","display_name":"Farnaz Arab","orcid":"https://orcid.org/0000-0001-6243-7636"},"institutions":[{"id":"https://openalex.org/I91781278","display_name":"Felician College","ror":"https://ror.org/030101v90","country_code":"US","type":"education","lineage":["https://openalex.org/I91781278"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Farnaz Arab","raw_affiliation_strings":["Felician University,Rutherford,NJ,USA","Felician University, Rutherford, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Felician University,Rutherford,NJ,USA","institution_ids":["https://openalex.org/I91781278"]},{"raw_affiliation_string":"Felician University, Rutherford, NJ, USA","institution_ids":["https://openalex.org/I91781278"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023033707","display_name":"Mazdak Zamani","orcid":"https://orcid.org/0000-0002-6421-0053"},"institutions":[{"id":"https://openalex.org/I91781278","display_name":"Felician College","ror":"https://ror.org/030101v90","country_code":"US","type":"education","lineage":["https://openalex.org/I91781278"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mazdak Zamani","raw_affiliation_strings":["Felician University,Rutherford,NJ,USA","Felician University, Rutherford, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Felician University,Rutherford,NJ,USA","institution_ids":["https://openalex.org/I91781278"]},{"raw_affiliation_string":"Felician University, Rutherford, NJ, USA","institution_ids":["https://openalex.org/I91781278"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075461674","display_name":"Sasan Karamizadeh","orcid":"https://orcid.org/0000-0001-9445-8044"},"institutions":[{"id":"https://openalex.org/I4210086765","display_name":"Aerospace Research Institute","ror":"https://ror.org/000m4se28","country_code":"IR","type":"facility","lineage":["https://openalex.org/I4210086765"]},{"id":"https://openalex.org/I4210102178","display_name":"ICT Research Institute","ror":"https://ror.org/01a3g2z22","country_code":"IR","type":"facility","lineage":["https://openalex.org/I4210102178"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Sasan Karamizadeh","raw_affiliation_strings":["ICT Research Institute,Iran","ICT Research Institute, Iran"],"affiliations":[{"raw_affiliation_string":"ICT Research Institute,Iran","institution_ids":["https://openalex.org/I4210086765"]},{"raw_affiliation_string":"ICT Research Institute, Iran","institution_ids":["https://openalex.org/I4210102178"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046464010","display_name":"Mojtaba Alizadeh","orcid":"https://orcid.org/0000-0002-5601-8387"},"institutions":[{"id":"https://openalex.org/I3123046734","display_name":"Lorestan University","ror":"https://ror.org/051bats05","country_code":"IR","type":"education","lineage":["https://openalex.org/I3123046734"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Mojtaba Alizadeh","raw_affiliation_strings":["Lorestan University,Iran","Lorestan University, Iran"],"affiliations":[{"raw_affiliation_string":"Lorestan University,Iran","institution_ids":["https://openalex.org/I3123046734"]},{"raw_affiliation_string":"Lorestan University, Iran","institution_ids":["https://openalex.org/I3123046734"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041014454","display_name":"Saman Shojae Chaeikar","orcid":"https://orcid.org/0000-0002-2958-6901"},"institutions":[{"id":"https://openalex.org/I99043593","display_name":"Macquarie University","ror":"https://ror.org/01sf06y89","country_code":"AU","type":"education","lineage":["https://openalex.org/I99043593"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Saman Shojae Chaeikar","raw_affiliation_strings":["Macquarie University,Australia","Macquarie University, Australia"],"affiliations":[{"raw_affiliation_string":"Macquarie University,Australia","institution_ids":["https://openalex.org/I99043593"]},{"raw_affiliation_string":"Macquarie University, Australia","institution_ids":["https://openalex.org/I99043593"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017191404","display_name":"Touraj Khodadadi","orcid":"https://orcid.org/0000-0002-4914-0544"},"institutions":[{"id":"https://openalex.org/I4210147344","display_name":"Malaysia University of Science and Technology","ror":"https://ror.org/04frcff47","country_code":"MY","type":"education","lineage":["https://openalex.org/I4210147344"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Touraj Khodadadi","raw_affiliation_strings":["MUST,Malaysia","MUST, Malaysia"],"affiliations":[{"raw_affiliation_string":"MUST,Malaysia","institution_ids":["https://openalex.org/I4210147344"]},{"raw_affiliation_string":"MUST, Malaysia","institution_ids":["https://openalex.org/I4210147344"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5023883460"],"corresponding_institution_ids":["https://openalex.org/I91781278"],"apc_list":null,"apc_paid":null,"fwci":0.1797,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.49801278,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"168","last_page":"173"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9904000163078308,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.933566153049469},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8075897693634033},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.7797415852546692},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.7704676389694214},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6864542365074158},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.638689398765564},{"id":"https://openalex.org/keywords/steganography-tools","display_name":"Steganography tools","score":0.440236359834671},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.426064133644104},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3544791042804718},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3406745195388794},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.3145884573459625},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.21183687448501587}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.933566153049469},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8075897693634033},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.7797415852546692},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.7704676389694214},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6864542365074158},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.638689398765564},{"id":"https://openalex.org/C13179402","wikidata":"https://www.wikidata.org/wiki/Q7606662","display_name":"Steganography tools","level":4,"score":0.440236359834671},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.426064133644104},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3544791042804718},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3406745195388794},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.3145884573459625},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.21183687448501587}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccs55155.2022.9846251","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccs55155.2022.9846251","pdf_url":null,"source":{"id":"https://openalex.org/S4363608130","display_name":"2022 7th International Conference on Computer and Communication Systems (ICCCS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 7th International Conference on Computer and Communication Systems (ICCCS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W57600471","https://openalex.org/W71969295","https://openalex.org/W169963849","https://openalex.org/W203367337","https://openalex.org/W866407331","https://openalex.org/W1501123782","https://openalex.org/W1519765459","https://openalex.org/W1606861697","https://openalex.org/W1689800924","https://openalex.org/W1979014151","https://openalex.org/W1991528914","https://openalex.org/W2017553762","https://openalex.org/W2037133396","https://openalex.org/W2037136594","https://openalex.org/W2054904476","https://openalex.org/W2062092408","https://openalex.org/W2108053191","https://openalex.org/W2118251698","https://openalex.org/W2144069819","https://openalex.org/W2334735478","https://openalex.org/W2465200365","https://openalex.org/W2548321233","https://openalex.org/W2571342379","https://openalex.org/W2602946560","https://openalex.org/W2739910628","https://openalex.org/W2794536053","https://openalex.org/W2971907285","https://openalex.org/W6602934680","https://openalex.org/W6606935008","https://openalex.org/W6629821499","https://openalex.org/W6636152785","https://openalex.org/W6637253840","https://openalex.org/W6719447940","https://openalex.org/W6731802979","https://openalex.org/W6735378840","https://openalex.org/W6742301301"],"related_works":["https://openalex.org/W2560172240","https://openalex.org/W3146660591","https://openalex.org/W1995538220","https://openalex.org/W3020816551","https://openalex.org/W2338095724","https://openalex.org/W2804412098","https://openalex.org/W2186632617","https://openalex.org/W83713408","https://openalex.org/W2497446005","https://openalex.org/W2171676767"],"abstract_inverted_index":{"The":[0],"basic":[1],"idea":[2],"for":[3,23],"video":[4,12,42],"watermarking":[5,29,43],"technique":[6],"is":[7],"concealing":[8],"information":[9],"in":[10],"the":[11],"host.":[13],"There":[14],"are":[15,27,34],"three":[16],"popular":[17],"techniques":[18,44],"that":[19],"can":[20],"be":[21],"used":[22],"data":[24],"hiding":[25],"those":[26],"steganography,":[28],"and":[30,36,48],"cryptography.":[31],"These":[32],"methods":[33],"compared":[35],"this":[37],"paper":[38],"intends":[39],"to":[40],"overview":[41],"of":[45],"tamper":[46],"detection":[47],"authentication.":[49]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-09T08:58:05.943551","created_date":"2025-10-10T00:00:00"}
