{"id":"https://openalex.org/W2089905445","doi":"https://doi.org/10.1109/isit.2005.1523669","title":"A theoretical study of watermarking security","display_name":"A theoretical study of watermarking security","publication_year":2005,"publication_date":"2005-01-01","ids":{"openalex":"https://openalex.org/W2089905445","doi":"https://doi.org/10.1109/isit.2005.1523669","mag":"2089905445"},"language":"en","primary_location":{"id":"doi:10.1109/isit.2005.1523669","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2005.1523669","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015357432","display_name":"Fran\u00e7ois Cayre","orcid":"https://orcid.org/0000-0002-6634-9147"},"institutions":[{"id":"https://openalex.org/I2802519937","display_name":"Institut de Recherche en Informatique et Syst\u00e8mes Al\u00e9atoires","ror":"https://ror.org/00myn0z94","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I205703379","https://openalex.org/I2802204017","https://openalex.org/I2802519937","https://openalex.org/I28221208","https://openalex.org/I4210127572","https://openalex.org/I4210159245","https://openalex.org/I56067802"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"F. Cayre","raw_affiliation_strings":["Campus de Beaulieu, Rennes, France","TEMICS-IRISA, Rennes"],"affiliations":[{"raw_affiliation_string":"Campus de Beaulieu, Rennes, France","institution_ids":[]},{"raw_affiliation_string":"TEMICS-IRISA, Rennes","institution_ids":["https://openalex.org/I2802519937"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113649187","display_name":"Caroline Fontaine","orcid":null},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"government","lineage":["https://openalex.org/I1294671590"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"C. Fontaine","raw_affiliation_strings":["CNRS-LIFL, Universit\u00e9 des sciences et des technologies de Lille, Villeneuve d'Ascq, France","Digital image processing, modeling and communication"],"affiliations":[{"raw_affiliation_string":"CNRS-LIFL, Universit\u00e9 des sciences et des technologies de Lille, Villeneuve d'Ascq, France","institution_ids":["https://openalex.org/I1294671590"]},{"raw_affiliation_string":"Digital image processing, modeling and communication","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062906790","display_name":"Teddy Furon","orcid":"https://orcid.org/0000-0002-1565-765X"},"institutions":[{"id":"https://openalex.org/I2802519937","display_name":"Institut de Recherche en Informatique et Syst\u00e8mes Al\u00e9atoires","ror":"https://ror.org/00myn0z94","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I205703379","https://openalex.org/I2802204017","https://openalex.org/I2802519937","https://openalex.org/I28221208","https://openalex.org/I4210127572","https://openalex.org/I4210159245","https://openalex.org/I56067802"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"T. Furon","raw_affiliation_strings":["Campus de Beaulieu, TEMICS/IRISA, Rennes, France","Digital image processing, modeling and communication"],"affiliations":[{"raw_affiliation_string":"Campus de Beaulieu, TEMICS/IRISA, Rennes, France","institution_ids":["https://openalex.org/I2802519937"]},{"raw_affiliation_string":"Digital image processing, modeling and communication","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5015357432"],"corresponding_institution_ids":["https://openalex.org/I2802519937"],"apc_list":null,"apc_paid":null,"fwci":0.28306425,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.5857979,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"1525","issue":null,"first_page":"1868","last_page":"1872"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.7588058710098267},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.7107685208320618},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6732581853866577},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6298642158508301},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.6014150381088257},{"id":"https://openalex.org/keywords/information-theory","display_name":"Information theory","score":0.5374394655227661},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5310262441635132},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5290604829788208},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.49387603998184204},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4681703448295593},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4090762734413147},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2574211359024048},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.14577925205230713},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.13209569454193115},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.10530510544776917}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.7588058710098267},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.7107685208320618},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6732581853866577},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6298642158508301},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.6014150381088257},{"id":"https://openalex.org/C52622258","wikidata":"https://www.wikidata.org/wiki/Q131222","display_name":"Information theory","level":2,"score":0.5374394655227661},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5310262441635132},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5290604829788208},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.49387603998184204},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4681703448295593},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4090762734413147},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2574211359024048},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.14577925205230713},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.13209569454193115},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.10530510544776917}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit.2005.1523669","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2005.1523669","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1547456042","https://openalex.org/W1578893750","https://openalex.org/W1744890312","https://openalex.org/W1860627900","https://openalex.org/W1963947746","https://openalex.org/W1979967251","https://openalex.org/W2000169078","https://openalex.org/W2006145362","https://openalex.org/W2040356834","https://openalex.org/W2045772719","https://openalex.org/W2049063033","https://openalex.org/W2060825484","https://openalex.org/W2083014862","https://openalex.org/W2107465879","https://openalex.org/W2108800434","https://openalex.org/W2108854705","https://openalex.org/W2109394932","https://openalex.org/W2119647652","https://openalex.org/W2124195644","https://openalex.org/W2128768657","https://openalex.org/W2133633282","https://openalex.org/W2139490206","https://openalex.org/W2149074144","https://openalex.org/W2156186849","https://openalex.org/W2156645663","https://openalex.org/W2160921333","https://openalex.org/W2163678127","https://openalex.org/W2167873441","https://openalex.org/W6676076315"],"related_works":["https://openalex.org/W2594793944","https://openalex.org/W83545226","https://openalex.org/W2392897293","https://openalex.org/W397814502","https://openalex.org/W2005090527","https://openalex.org/W2741288029","https://openalex.org/W2946162884","https://openalex.org/W2183198227","https://openalex.org/W1582638358","https://openalex.org/W2167136065"],"abstract_inverted_index":{"This":[0,76],"article":[1],"proposes":[2],"a":[3,10],"theory":[4,42,77],"of":[5,13,33,54,65,102],"watermarking":[6,83],"security":[7,57,95],"based":[8,92],"on":[9],"cryptanalysis":[11],"point":[12],"view.":[14],"The":[15,56],"main":[16],"idea":[17],"is":[18,59,78],"that":[19],"information":[20,41,45,48],"about":[21],"the":[22,27,37,63,67,73,85,89],"secret":[23,74],"key":[24],"leaks":[25],"from":[26,40],"observations,":[28],"for":[29],"instance":[30],"watermarked":[31],"pieces":[32],"content,":[34],"available":[35],"to":[36,70,80],"opponent.":[38],"Tools":[39],"(Shannon's":[43],"mutual":[44],"and":[46,88],"Fisher's":[47],"matrix)":[49],"can":[50],"measure":[51],"this":[52],"leakage":[53],"information.":[55],"level":[58],"then":[60],"defined":[61],"as":[62],"number":[64],"observations":[66],"attacker":[68],"needs":[69],"successfully":[71],"estimate":[72],"key.":[75],"applied":[79],"two":[81],"common":[82],"methods:":[84],"substitutive":[86],"scheme":[87],"spread":[90],"spectrum":[91],"techniques.":[93],"Their":[94],"levels":[96],"are":[97],"calculated":[98],"against":[99],"three":[100],"kinds":[101],"attack":[103]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
