{"id":"https://openalex.org/W2162291413","doi":"https://doi.org/10.1109/icme.2010.5583256","title":"Watermarking video content using visual cryptography and scene averaged image","display_name":"Watermarking video content using visual cryptography and scene averaged image","publication_year":2010,"publication_date":"2010-07-01","ids":{"openalex":"https://openalex.org/W2162291413","doi":"https://doi.org/10.1109/icme.2010.5583256","mag":"2162291413"},"language":"en","primary_location":{"id":"doi:10.1109/icme.2010.5583256","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icme.2010.5583256","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 IEEE International Conference on Multimedia and Expo","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072922547","display_name":"Aditya Vashistha","orcid":"https://orcid.org/0000-0001-5693-3326"},"institutions":[{"id":"https://openalex.org/I110675161","display_name":"Infosys (India)","ror":"https://ror.org/03bs18y54","country_code":"IN","type":"company","lineage":["https://openalex.org/I110675161"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Aditya Vashistha","raw_affiliation_strings":["SETLabs, Infosys Technologies Limited, Bangalore, India"],"affiliations":[{"raw_affiliation_string":"SETLabs, Infosys Technologies Limited, Bangalore, India","institution_ids":["https://openalex.org/I110675161"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078319134","display_name":"Rajarathnam Nallusamy","orcid":null},"institutions":[{"id":"https://openalex.org/I110675161","display_name":"Infosys (India)","ror":"https://ror.org/03bs18y54","country_code":"IN","type":"company","lineage":["https://openalex.org/I110675161"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Rajarathnam Nallusamy","raw_affiliation_strings":["SETLabs, Infosys Technologies Limited, Bangalore, India"],"affiliations":[{"raw_affiliation_string":"SETLabs, Infosys Technologies Limited, Bangalore, India","institution_ids":["https://openalex.org/I110675161"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090590044","display_name":"A. Das","orcid":"https://orcid.org/0000-0002-5000-4451"},"institutions":[{"id":"https://openalex.org/I110675161","display_name":"Infosys (India)","ror":"https://ror.org/03bs18y54","country_code":"IN","type":"company","lineage":["https://openalex.org/I110675161"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Amitabha Das","raw_affiliation_strings":["SETLabs, Infosys Technologies Limited, Bangalore, India"],"affiliations":[{"raw_affiliation_string":"SETLabs, Infosys Technologies Limited, Bangalore, India","institution_ids":["https://openalex.org/I110675161"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074925082","display_name":"Sanjoy Kumar Paul","orcid":"https://orcid.org/0000-0001-9523-179X"},"institutions":[{"id":"https://openalex.org/I110675161","display_name":"Infosys (India)","ror":"https://ror.org/03bs18y54","country_code":"IN","type":"company","lineage":["https://openalex.org/I110675161"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sanjoy Paul","raw_affiliation_strings":["SETLabs, Infosys Technologies Limited, Bangalore, India"],"affiliations":[{"raw_affiliation_string":"SETLabs, Infosys Technologies Limited, Bangalore, India","institution_ids":["https://openalex.org/I110675161"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5072922547"],"corresponding_institution_ids":["https://openalex.org/I110675161"],"apc_list":null,"apc_paid":null,"fwci":1.2749,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.8277063,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"2659","issue":null,"first_page":"1641","last_page":"1646"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11439","display_name":"Video Analysis and Summarization","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10741","display_name":"Video Coding and Compression Technologies","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.9159342050552368},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8096532821655273},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.806449294090271},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.7138257026672363},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6163825988769531},{"id":"https://openalex.org/keywords/copying","display_name":"Copying","score":0.6044613718986511},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5362557172775269},{"id":"https://openalex.org/keywords/visual-cryptography","display_name":"Visual cryptography","score":0.5321729779243469},{"id":"https://openalex.org/keywords/digital-media","display_name":"Digital media","score":0.4973278343677521},{"id":"https://openalex.org/keywords/frame","display_name":"Frame (networking)","score":0.44931381940841675},{"id":"https://openalex.org/keywords/copy-protection","display_name":"Copy protection","score":0.4334317445755005},{"id":"https://openalex.org/keywords/digital-image","display_name":"Digital image","score":0.43198826909065247},{"id":"https://openalex.org/keywords/digital-content","display_name":"Digital content","score":0.43101271986961365},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.30725449323654175},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.28910762071609497},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.27276286482810974},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.2603472173213959},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.08850172162055969},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.08020693063735962}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.9159342050552368},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8096532821655273},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.806449294090271},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.7138257026672363},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6163825988769531},{"id":"https://openalex.org/C2779151265","wikidata":"https://www.wikidata.org/wiki/Q1156791","display_name":"Copying","level":2,"score":0.6044613718986511},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5362557172775269},{"id":"https://openalex.org/C2779072331","wikidata":"https://www.wikidata.org/wiki/Q1597418","display_name":"Visual cryptography","level":4,"score":0.5321729779243469},{"id":"https://openalex.org/C17632256","wikidata":"https://www.wikidata.org/wiki/Q1076968","display_name":"Digital media","level":2,"score":0.4973278343677521},{"id":"https://openalex.org/C126042441","wikidata":"https://www.wikidata.org/wiki/Q1324888","display_name":"Frame (networking)","level":2,"score":0.44931381940841675},{"id":"https://openalex.org/C2780581891","wikidata":"https://www.wikidata.org/wiki/Q15738686","display_name":"Copy protection","level":4,"score":0.4334317445755005},{"id":"https://openalex.org/C42781572","wikidata":"https://www.wikidata.org/wiki/Q1250322","display_name":"Digital image","level":4,"score":0.43198826909065247},{"id":"https://openalex.org/C2779344036","wikidata":"https://www.wikidata.org/wiki/Q11320476","display_name":"Digital content","level":2,"score":0.43101271986961365},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30725449323654175},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.28910762071609497},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.27276286482810974},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.2603472173213959},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.08850172162055969},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.08020693063735962},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icme.2010.5583256","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icme.2010.5583256","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 IEEE International Conference on Multimedia and Expo","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6800000071525574,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1507661437","https://openalex.org/W1534835865","https://openalex.org/W1776985898","https://openalex.org/W2091247306","https://openalex.org/W2134190498","https://openalex.org/W2143368133","https://openalex.org/W2148176610","https://openalex.org/W2220912430","https://openalex.org/W2273178196","https://openalex.org/W2735205754","https://openalex.org/W2742147378","https://openalex.org/W2913419753","https://openalex.org/W6638180245","https://openalex.org/W6681929622","https://openalex.org/W6694255780","https://openalex.org/W6741120340","https://openalex.org/W6742314891","https://openalex.org/W6758417790"],"related_works":["https://openalex.org/W1161240414","https://openalex.org/W1905517991","https://openalex.org/W192651037","https://openalex.org/W1490264596","https://openalex.org/W1594550932","https://openalex.org/W2050525133","https://openalex.org/W1514507288","https://openalex.org/W2129534840","https://openalex.org/W2161157315","https://openalex.org/W2351793298"],"abstract_inverted_index":{"With":[0],"the":[1,32,57,77,80,83,95,103,108,117,139,145,152,166,172],"increasing":[2],"convergence":[3],"of":[4,11,59,69,94,99,147,169],"network,":[5],"services,":[6],"and":[7,27,40,67,89,127,179],"devices,":[8],"more":[9,35],"number":[10],"end":[12],"user":[13],"devices":[14],"are":[15],"accessing":[16],"digital":[17,33,49],"media":[18,34],"content":[19],"which":[20],"were":[21],"hitherto":[22],"accessible":[23],"mainly":[24],"from":[25],"computers":[26],"television":[28],"sets.":[29],"This":[30],"makes":[31,171],"prone":[36],"to":[37,158],"illegal":[38,177],"copying":[39,178],"distribution.":[41,180],"In":[42,82],"this":[43],"paper,":[44],"we":[45],"propose":[46],"a":[47],"robust":[48,120,142],"video":[50,105,173],"watermarking":[51,110],"scheme":[52],"for":[53,161,176],"copyright":[54],"protection":[55],"using":[56],"principles":[58],"visual":[60],"cryptography,":[61],"scene":[62,71],"change":[63],"detection":[64],"in":[65,79,107,144],"videos,":[66],"conversion":[68],"each":[70],"into":[72,102,133],"an":[73,162],"image":[74],"by":[75],"averaging":[76],"frames":[78],"scene.":[81],"proposed":[84],"method,":[85],"data":[86,101,114,131],"is":[87,115,119,141],"extracted":[88],"stored":[90],"as":[91,106],"one":[92],"share":[93],"watermark":[96,122],"pattern":[97],"instead":[98],"embedding":[100],"original":[104],"conventional":[109],"schemes.":[111],"Since":[112],"no":[113],"embedded,":[116],"method":[118,140],"against":[121,165],"attacks":[123],"aimed":[124],"at":[125],"detecting":[126],"destroying":[128],"or":[129],"distorting":[130],"embedded":[132],"videos.":[134],"Simulation":[135],"results":[136],"show":[137],"that":[138],"even":[143],"case":[146],"50%":[148],"frame":[149],"drop.":[150],"All":[151],"watermarked":[153],"scenes,":[154],"not":[155],"frames,":[156],"need":[157],"be":[159],"dropped":[160],"effective":[163],"attack":[164],"watermark.":[167],"Dropping":[168],"scenes":[170],"less":[174],"attractive":[175]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
