{"id":"https://openalex.org/W4214897392","doi":"https://doi.org/10.1109/iscisc53448.2021.9720465","title":"A Perfect Recovery for Fragile Watermarking by Hamming Code on Distributed Pixels","display_name":"A Perfect Recovery for Fragile Watermarking by Hamming Code on Distributed Pixels","publication_year":2021,"publication_date":"2021-09-01","ids":{"openalex":"https://openalex.org/W4214897392","doi":"https://doi.org/10.1109/iscisc53448.2021.9720465"},"language":"en","primary_location":{"id":"doi:10.1109/iscisc53448.2021.9720465","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscisc53448.2021.9720465","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 18th International ISC Conference on Information Security and Cryptology (ISCISC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008303846","display_name":"Faeze Rasouli","orcid":null},"institutions":[{"id":"https://openalex.org/I166459259","display_name":"Shiraz University","ror":"https://ror.org/028qtbk54","country_code":"IR","type":"education","lineage":["https://openalex.org/I166459259"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Faeze Rasouli","raw_affiliation_strings":["School of Elec. &#x0026; Comp. Eng., Shiraz University,Computer Sci. &#x0026; Eng. &#x0026; Inf. Tech. Dept.,Shiraz,Iran"],"affiliations":[{"raw_affiliation_string":"School of Elec. &#x0026; Comp. Eng., Shiraz University,Computer Sci. &#x0026; Eng. &#x0026; Inf. Tech. Dept.,Shiraz,Iran","institution_ids":["https://openalex.org/I166459259"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023391264","display_name":"Mohammad Taheri","orcid":"https://orcid.org/0000-0003-4888-5883"},"institutions":[{"id":"https://openalex.org/I166459259","display_name":"Shiraz University","ror":"https://ror.org/028qtbk54","country_code":"IR","type":"education","lineage":["https://openalex.org/I166459259"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Mohammad Taheri","raw_affiliation_strings":["School of Elec. &#x0026; Comp. Eng., Shiraz University,Computer Sci. &#x0026; Eng. &#x0026; Inf. Tech. Dept.,Shiraz,Iran"],"affiliations":[{"raw_affiliation_string":"School of Elec. &#x0026; Comp. Eng., Shiraz University,Computer Sci. &#x0026; Eng. &#x0026; Inf. Tech. Dept.,Shiraz,Iran","institution_ids":["https://openalex.org/I166459259"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5008303846"],"corresponding_institution_ids":["https://openalex.org/I166459259"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.18947712,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"18","last_page":"22"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.8059014081954956},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.6909711956977844},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.6809461712837219},{"id":"https://openalex.org/keywords/hamming-code","display_name":"Hamming code","score":0.6693975329399109},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.652015745639801},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6117052435874939},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5662801861763},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5355228185653687},{"id":"https://openalex.org/keywords/hamming-distance","display_name":"Hamming distance","score":0.48465782403945923},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.4638827443122864},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4578198194503784},{"id":"https://openalex.org/keywords/least-significant-bit","display_name":"Least significant bit","score":0.44383418560028076},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.4243665635585785},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.37470266222953796},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.34370195865631104},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.333855003118515},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3014783263206482},{"id":"https://openalex.org/keywords/block-code","display_name":"Block code","score":0.25933295488357544},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.15278655290603638}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.8059014081954956},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.6909711956977844},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.6809461712837219},{"id":"https://openalex.org/C73150493","wikidata":"https://www.wikidata.org/wiki/Q853922","display_name":"Hamming code","level":4,"score":0.6693975329399109},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.652015745639801},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6117052435874939},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5662801861763},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5355228185653687},{"id":"https://openalex.org/C193319292","wikidata":"https://www.wikidata.org/wiki/Q272172","display_name":"Hamming distance","level":2,"score":0.48465782403945923},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.4638827443122864},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4578198194503784},{"id":"https://openalex.org/C4305246","wikidata":"https://www.wikidata.org/wiki/Q3885225","display_name":"Least significant bit","level":2,"score":0.44383418560028076},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.4243665635585785},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.37470266222953796},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.34370195865631104},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.333855003118515},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3014783263206482},{"id":"https://openalex.org/C157125643","wikidata":"https://www.wikidata.org/wiki/Q884707","display_name":"Block code","level":3,"score":0.25933295488357544},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.15278655290603638},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscisc53448.2021.9720465","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscisc53448.2021.9720465","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 18th International ISC Conference on Information Security and Cryptology (ISCISC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1962827045","https://openalex.org/W1978683153","https://openalex.org/W1980073965","https://openalex.org/W1992330443","https://openalex.org/W2034146725","https://openalex.org/W2045834321","https://openalex.org/W2118224871","https://openalex.org/W2174709207","https://openalex.org/W2611193340","https://openalex.org/W2793868905","https://openalex.org/W2915597988","https://openalex.org/W2964526437","https://openalex.org/W2991531878","https://openalex.org/W2995913938","https://openalex.org/W3007944202","https://openalex.org/W3163923435"],"related_works":["https://openalex.org/W2137394636","https://openalex.org/W2358993821","https://openalex.org/W1516446231","https://openalex.org/W2098152888","https://openalex.org/W1559740347","https://openalex.org/W2040356834","https://openalex.org/W2080353903","https://openalex.org/W2385289568","https://openalex.org/W2381486749","https://openalex.org/W1514507288"],"abstract_inverted_index":{"Fragile":[0],"watermarking":[1,38],"is":[2,62,85,118,125,139],"the":[3,20,40,43,48,54,70,95,108,111,119,136,155,159,162,172],"task":[4],"of":[5,35,47,53,107,110,145,170],"embedding":[6],"a":[7,63,99,105,128,142],"watermark":[8,41],"in":[9,19,42,66,87,127,154,168,175],"an":[10],"image":[11,21,49],"such":[12],"that":[13,68,122],"even":[14,26],"small":[15],"changes,":[16],"called":[17],"tamper,":[18],"can":[22],"be":[23],"detected":[24],"or":[25],"recovered":[27],"to":[28,50,76,90,158,177],"preserve":[29],"unauthorized":[30],"alteration.":[31],"A":[32],"well-known":[33],"type":[34],"spatial":[36],"fragile":[37],"embeds":[39],"least":[44],"significant":[45,56],"bits":[46,147],"measure":[51],"correctness":[52],"most":[55],"bits.":[57],"In":[58],"addition,":[59],"Hamming":[60,137],"code":[61,138],"coding":[64],"algorithm":[65],"communication":[67],"transmits":[69],"data-bits":[71],"by":[72,98],"augmenting":[73],"some":[74],"check-bits":[75],"exactly":[77],"detect":[78,91],"and":[79,92],"recover":[80,94],"single-bit":[81],"modifications.":[82],"This":[83],"property":[84],"used,":[86],"this":[88,117,134],"paper,":[89],"perfectly":[93],"images":[96],"modified":[97],"tamper":[100],"with":[101],"diameter":[102,109],"less":[103],"than":[104],"half":[106],"image.":[112,156],"Based":[113],"on":[114,141],"our":[115],"knowledge,":[116],"first":[120],"time":[121],"perfect":[123],"reconstruction":[124],"guaranteed":[126],"high":[129],"probable":[130],"condition.":[131],"To":[132],"achieve":[133],"goal,":[135],"applied":[140],"distributed":[143],"pixel":[144],"which":[146],"are":[148],"extracted":[149],"from":[150],"far":[151],"sufficient":[152],"pixels":[153],"According":[157],"experimental":[160],"results,":[161],"proposed":[163],"method":[164],"achieves":[165],"better":[166],"performance,":[167],"terms":[169],"recovering":[171],"tampered":[173],"areas,":[174],"comparison":[176],"state-of-the-art.":[178]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
