{"id":"https://openalex.org/W2101160944","doi":"https://doi.org/10.1109/infcom.2011.5935064","title":"Long PN code based DSSS watermarking","display_name":"Long PN code based DSSS watermarking","publication_year":2011,"publication_date":"2011-04-01","ids":{"openalex":"https://openalex.org/W2101160944","doi":"https://doi.org/10.1109/infcom.2011.5935064","mag":"2101160944"},"language":"en","primary_location":{"id":"doi:10.1109/infcom.2011.5935064","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infcom.2011.5935064","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 Proceedings IEEE INFOCOM","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101914950","display_name":"Junwei Huang","orcid":"https://orcid.org/0009-0007-1034-7058"},"institutions":[{"id":"https://openalex.org/I133738476","display_name":"University of Massachusetts Lowell","ror":"https://ror.org/03hamhx47","country_code":"US","type":"education","lineage":["https://openalex.org/I133738476"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Junwei Huang","raw_affiliation_strings":["University of Massachusetts, Lowell, USA","University of Massachusetts Lowell - USA"],"affiliations":[{"raw_affiliation_string":"University of Massachusetts, Lowell, USA","institution_ids":["https://openalex.org/I133738476"]},{"raw_affiliation_string":"University of Massachusetts Lowell - USA","institution_ids":["https://openalex.org/I133738476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101657710","display_name":"Xian Pan","orcid":"https://orcid.org/0000-0001-8492-2050"},"institutions":[{"id":"https://openalex.org/I133738476","display_name":"University of Massachusetts Lowell","ror":"https://ror.org/03hamhx47","country_code":"US","type":"education","lineage":["https://openalex.org/I133738476"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xian Pan","raw_affiliation_strings":["University of Massachusetts, Lowell, USA","University of Massachusetts Lowell - USA"],"affiliations":[{"raw_affiliation_string":"University of Massachusetts, Lowell, USA","institution_ids":["https://openalex.org/I133738476"]},{"raw_affiliation_string":"University of Massachusetts Lowell - USA","institution_ids":["https://openalex.org/I133738476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063375840","display_name":"Xinwen Fu","orcid":"https://orcid.org/0000-0003-2391-7789"},"institutions":[{"id":"https://openalex.org/I133738476","display_name":"University of Massachusetts Lowell","ror":"https://ror.org/03hamhx47","country_code":"US","type":"education","lineage":["https://openalex.org/I133738476"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xinwen Fu","raw_affiliation_strings":["University of Massachusetts, Lowell, USA","University of Massachusetts Lowell - USA"],"affiliations":[{"raw_affiliation_string":"University of Massachusetts, Lowell, USA","institution_ids":["https://openalex.org/I133738476"]},{"raw_affiliation_string":"University of Massachusetts Lowell - USA","institution_ids":["https://openalex.org/I133738476"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100440074","display_name":"Jie Wang","orcid":"https://orcid.org/0000-0002-3249-9219"},"institutions":[{"id":"https://openalex.org/I133738476","display_name":"University of Massachusetts Lowell","ror":"https://ror.org/03hamhx47","country_code":"US","type":"education","lineage":["https://openalex.org/I133738476"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jie Wang","raw_affiliation_strings":["University of Massachusetts, Lowell, USA","University of Massachusetts Lowell - USA"],"affiliations":[{"raw_affiliation_string":"University of Massachusetts, Lowell, USA","institution_ids":["https://openalex.org/I133738476"]},{"raw_affiliation_string":"University of Massachusetts Lowell - USA","institution_ids":["https://openalex.org/I133738476"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101914950"],"corresponding_institution_ids":["https://openalex.org/I133738476"],"apc_list":null,"apc_paid":null,"fwci":3.9472,"has_fulltext":false,"cited_by_count":23,"citation_normalized_percentile":{"value":0.93822774,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"2426","last_page":"2434"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.8531378507614136},{"id":"https://openalex.org/keywords/direct-sequence-spread-spectrum","display_name":"Direct-sequence spread spectrum","score":0.8513933420181274},{"id":"https://openalex.org/keywords/spread-spectrum","display_name":"Spread spectrum","score":0.758630633354187},{"id":"https://openalex.org/keywords/tracing","display_name":"Tracing","score":0.7506873607635498},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7430310845375061},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.6939562559127808},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.675977885723114},{"id":"https://openalex.org/keywords/suspect","display_name":"Suspect","score":0.5321872234344482},{"id":"https://openalex.org/keywords/signal","display_name":"SIGNAL (programming language)","score":0.4660550057888031},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.4570903182029724},{"id":"https://openalex.org/keywords/pseudorandom-noise","display_name":"Pseudorandom noise","score":0.456726610660553},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44632479548454285},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3246191740036011},{"id":"https://openalex.org/keywords/code-division-multiple-access","display_name":"Code division multiple access","score":0.1645662784576416},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.1074196994304657},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09582409262657166},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.06820425391197205},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.06745266914367676},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.06326362490653992}],"concepts":[{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.8531378507614136},{"id":"https://openalex.org/C194491627","wikidata":"https://www.wikidata.org/wiki/Q1334354","display_name":"Direct-sequence spread spectrum","level":4,"score":0.8513933420181274},{"id":"https://openalex.org/C105344744","wikidata":"https://www.wikidata.org/wiki/Q958957","display_name":"Spread spectrum","level":3,"score":0.758630633354187},{"id":"https://openalex.org/C138673069","wikidata":"https://www.wikidata.org/wiki/Q322229","display_name":"Tracing","level":2,"score":0.7506873607635498},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7430310845375061},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.6939562559127808},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.675977885723114},{"id":"https://openalex.org/C2778223634","wikidata":"https://www.wikidata.org/wiki/Q224952","display_name":"Suspect","level":2,"score":0.5321872234344482},{"id":"https://openalex.org/C2779843651","wikidata":"https://www.wikidata.org/wiki/Q7390335","display_name":"SIGNAL (programming language)","level":2,"score":0.4660550057888031},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.4570903182029724},{"id":"https://openalex.org/C151881341","wikidata":"https://www.wikidata.org/wiki/Q910571","display_name":"Pseudorandom noise","level":4,"score":0.456726610660553},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44632479548454285},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3246191740036011},{"id":"https://openalex.org/C47696715","wikidata":"https://www.wikidata.org/wiki/Q233394","display_name":"Code division multiple access","level":2,"score":0.1645662784576416},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.1074196994304657},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09582409262657166},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.06820425391197205},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.06745266914367676},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.06326362490653992},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/infcom.2011.5935064","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infcom.2011.5935064","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 Proceedings IEEE INFOCOM","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.385.8839","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.385.8839","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.uml.edu/~xinwenfu/paper/Long_PN_code_based_DSSS_watermarking.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.386.501","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.386.501","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.uml.edu/~xinwenfu/paper/Infocom11_LongPNCode_Fu.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8100000023841858,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W84267113","https://openalex.org/W1600930409","https://openalex.org/W1655958391","https://openalex.org/W1869319442","https://openalex.org/W2043681328","https://openalex.org/W2112178441","https://openalex.org/W2125657162","https://openalex.org/W2127264212","https://openalex.org/W2127295197","https://openalex.org/W2128627435","https://openalex.org/W2137803891","https://openalex.org/W2139978474","https://openalex.org/W2146148058","https://openalex.org/W2150248082","https://openalex.org/W2151114655","https://openalex.org/W2167901844","https://openalex.org/W2169991041","https://openalex.org/W2182112064","https://openalex.org/W2314661760","https://openalex.org/W2340792008","https://openalex.org/W4256079738","https://openalex.org/W6603464622","https://openalex.org/W6636140842","https://openalex.org/W6637080381","https://openalex.org/W6678955139","https://openalex.org/W6678958711","https://openalex.org/W6678969601","https://openalex.org/W6680726893"],"related_works":["https://openalex.org/W2170234906","https://openalex.org/W4206000784","https://openalex.org/W2134823206","https://openalex.org/W2349942164","https://openalex.org/W2385187332","https://openalex.org/W2055047396","https://openalex.org/W2352355952","https://openalex.org/W2394108910","https://openalex.org/W2936594478","https://openalex.org/W2358386710"],"abstract_inverted_index":{"Cyber":[0],"crimes":[1,12],"often":[2],"involve":[3],"complicated":[4],"scenes.":[5],"In":[6],"this":[7],"paper,":[8],"we":[9,152],"investigate":[10],"unidentified":[11],"committed":[13],"through":[14],"anonymous":[15,38,101],"communication":[16],"networks.":[17,102],"We":[18,117],"developed":[19],"a":[20,43,55,70,74,143],"long":[21,75,125,158],"Pseudo-Noise":[22],"(PN)":[23],"code":[24,108,127,160],"based":[25,161],"Direct":[26],"Sequence":[27],"Spread":[28],"Spectrum":[29],"(DSSS)":[30],"flow":[31,96],"marking":[32],"technique":[33],"for":[34],"invisibly":[35],"tracing":[36,79],"suspect":[37,95],"flows.":[39],"By":[40,78],"interfering":[41],"with":[42,69],"sender's":[44,62],"traffic":[45],"and":[46,91,148],"marginally":[47],"varying":[48],"its":[49,110],"rate,":[50],"an":[51],"investigator":[52,86],"can":[53,87],"embed":[54],"secret":[56],"spread":[57],"spectrum":[58],"signal":[59,65,83],"into":[60],"the":[61,81,85,89,94,98,105,121,138,154,157],"traffic.":[63],"Each":[64],"bit":[66],"is":[67],"modulated":[68],"small":[71],"segment":[72],"of":[73,93,100,104,124,145,156],"PN":[76,107,126,159],"code.":[77],"where":[80],"embedded":[82],"goes,":[84],"trace":[88],"sender":[90],"receiver":[92],"despite":[97],"use":[99,120],"Benefits":[103],"Long":[106],"include":[109],"resistance":[111],"to":[112,131],"previous":[113],"discovered":[114],"detection":[115],"approaches.":[116],"may":[118],"also":[119],"vast":[122],"number":[123],"at":[128],"different":[129],"phases":[130],"conduct":[132],"parallel":[133],"tracback":[134],"without":[135],"worrying":[136],"about":[137],"interference":[139],"between":[140],"codes.":[141],"Using":[142],"combination":[144],"analytical":[146],"modeling":[147],"experiments":[149],"on":[150],"Anonymizer,":[151],"demonstrate":[153],"effectiveness":[155],"DSSS":[162],"watermarking":[163],"technique.":[164]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":4}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
