{"id":"https://openalex.org/W1972793767","doi":"https://doi.org/10.1109/msp.2004.1276109","title":"Data hiding for fighting piracy","display_name":"Data hiding for fighting piracy","publication_year":2004,"publication_date":"2004-03-01","ids":{"openalex":"https://openalex.org/W1972793767","doi":"https://doi.org/10.1109/msp.2004.1276109","mag":"1972793767"},"language":"en","primary_location":{"id":"doi:10.1109/msp.2004.1276109","is_oa":false,"landing_page_url":"https://doi.org/10.1109/msp.2004.1276109","pdf_url":null,"source":{"id":"https://openalex.org/S120977877","display_name":"IEEE Signal Processing Magazine","issn_l":"1053-5888","issn":["1053-5888","1558-0792"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Signal Processing Magazine","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007836692","display_name":"Mauro Barni","orcid":"https://orcid.org/0000-0002-7368-0866"},"institutions":[{"id":"https://openalex.org/I102064193","display_name":"University of Siena","ror":"https://ror.org/01tevnk56","country_code":"IT","type":"education","lineage":["https://openalex.org/I102064193"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"M. Barni","raw_affiliation_strings":["Universita degli Studi di Siena, Siena, Toscana, IT","Dept of Inf. Eng., Siena Univ., Italy"],"affiliations":[{"raw_affiliation_string":"Universita degli Studi di Siena, Siena, Toscana, IT","institution_ids":["https://openalex.org/I102064193"]},{"raw_affiliation_string":"Dept of Inf. Eng., Siena Univ., Italy","institution_ids":["https://openalex.org/I102064193"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110014313","display_name":"F. Bartolini","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"F. Bartolini","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5007836692"],"corresponding_institution_ids":["https://openalex.org/I102064193"],"apc_list":null,"apc_paid":null,"fwci":9.989,"has_fulltext":false,"cited_by_count":107,"citation_normalized_percentile":{"value":0.9841209,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"21","issue":"2","first_page":"28","last_page":"39"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9886999726295471,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.8384469747543335},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.824847936630249},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7819352149963379},{"id":"https://openalex.org/keywords/digital-rights-management","display_name":"Digital rights management","score":0.7080613374710083},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7032486200332642},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.6755269765853882},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5458004474639893},{"id":"https://openalex.org/keywords/digital-content","display_name":"Digital content","score":0.5449714064598083},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.4954599142074585},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.4504682123661041},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.42034071683883667},{"id":"https://openalex.org/keywords/copy-protection","display_name":"Copy protection","score":0.41454073786735535},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.28731125593185425},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.13655316829681396},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.12184756994247437},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.11443895101547241}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.8384469747543335},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.824847936630249},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7819352149963379},{"id":"https://openalex.org/C537843408","wikidata":"https://www.wikidata.org/wiki/Q192532","display_name":"Digital rights management","level":2,"score":0.7080613374710083},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7032486200332642},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.6755269765853882},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5458004474639893},{"id":"https://openalex.org/C2779344036","wikidata":"https://www.wikidata.org/wiki/Q11320476","display_name":"Digital content","level":2,"score":0.5449714064598083},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.4954599142074585},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.4504682123661041},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.42034071683883667},{"id":"https://openalex.org/C2780581891","wikidata":"https://www.wikidata.org/wiki/Q15738686","display_name":"Copy protection","level":4,"score":0.41454073786735535},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.28731125593185425},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.13655316829681396},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12184756994247437},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.11443895101547241},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/msp.2004.1276109","is_oa":false,"landing_page_url":"https://doi.org/10.1109/msp.2004.1276109","pdf_url":null,"source":{"id":"https://openalex.org/S120977877","display_name":"IEEE Signal Processing Magazine","issn_l":"1053-5888","issn":["1053-5888","1558-0792"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Signal Processing Magazine","raw_type":"journal-article"},{"id":"pmh:oai:usiena-air.unisi.it:11365/17550","is_oa":false,"landing_page_url":"http://hdl.handle.net/11365/17550","pdf_url":null,"source":{"id":"https://openalex.org/S4377196319","display_name":"Use Siena air (University of Siena)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I102064193","host_organization_name":"University of Siena","host_organization_lineage":["https://openalex.org/I102064193"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5400000214576721,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1482329882","https://openalex.org/W1508990441","https://openalex.org/W1509542376","https://openalex.org/W1538438244","https://openalex.org/W1563530395","https://openalex.org/W1653712242","https://openalex.org/W1965280641","https://openalex.org/W1976109068","https://openalex.org/W2045870677","https://openalex.org/W2056455153","https://openalex.org/W2065695365","https://openalex.org/W2083014862","https://openalex.org/W2092368531","https://openalex.org/W2100964406","https://openalex.org/W2103368949","https://openalex.org/W2107465879","https://openalex.org/W2120400964","https://openalex.org/W2128779749","https://openalex.org/W2139761830","https://openalex.org/W2147444658","https://openalex.org/W2152545485","https://openalex.org/W2154890510","https://openalex.org/W2162719060","https://openalex.org/W2163812818","https://openalex.org/W2168771823","https://openalex.org/W2170436791","https://openalex.org/W2531981238","https://openalex.org/W2611745365","https://openalex.org/W2912490486","https://openalex.org/W3169111758","https://openalex.org/W4256048031","https://openalex.org/W6628608916","https://openalex.org/W6632215247","https://openalex.org/W6633744868","https://openalex.org/W6679279813"],"related_works":["https://openalex.org/W1562323537","https://openalex.org/W2132585739","https://openalex.org/W2098827397","https://openalex.org/W2305027798","https://openalex.org/W2076224808","https://openalex.org/W2171296023","https://openalex.org/W2350923430","https://openalex.org/W3147694637","https://openalex.org/W1588399168","https://openalex.org/W2303438967"],"abstract_inverted_index":{"The":[0,106,139],"problem":[1],"of":[2,25,81,99,113,117,127,150,158,160],"digital":[3,30,42],"content":[4,14,89],"piracy":[5],"is":[6,38,46],"becoming":[7],"more":[8,10],"and":[9,12,35,53,136],"critical,":[11],"major":[13],"producers":[15],"are":[16],"risking":[17],"seeing":[18],"their":[19],"business":[20],"being":[21],"drastically":[22],"reduced":[23],"because":[24],"the":[26,39,56,88,96,114,118,143,156],"ease":[27],"by":[28,146],"which":[29],"contents":[31],"can":[32,60],"be":[33],"copied":[34],"distributed.":[36],"This":[37],"reason":[40],"why":[41],"rights":[43],"management":[44],"(DRM)":[45],"currently":[47],"garnering":[48],"much":[49],"attention":[50],"from":[51,155],"industry":[52],"research.":[54],"Among":[55],"various":[57],"technologies":[58],"that":[59],"contribute":[61],"to":[62,78,87],"set":[63],"up":[64],"a":[65,110],"reliable":[66],"DRM":[67,104],"system,":[68],"data":[69,100,121],"hiding":[70,101,122],"(watermarking)":[71],"has":[72],"found":[73],"an":[74],"important":[75],"place":[76],"due":[77],"its":[79],"potentiality":[80],"persistent":[82],"attaching":[83],"some":[84],"additional":[85],"information":[86],"itself.":[90],"In":[91],"this":[92],"article,":[93],"we":[94],"analyzed":[95],"possible":[97],"use":[98],"technology":[102],"in":[103,153],"systems.":[105],"article":[107,140],"also":[108,141],"gives":[109],"brief":[111],"survey":[112],"main":[115],"characteristics":[116],"most":[119],"common":[120],"methods":[123],"such":[124],"as":[125],"proof":[126],"ownership,":[128],"watermark,":[129],"copyright":[130],"protection,":[131],"infringement":[132],"tracking,":[133],"copy":[134],"control,":[135],"item":[137],"identification.":[138],"investigates":[142],"different":[144],"approaches":[145],"highlighting":[147],"critical":[148],"points":[149],"each":[151],"approach":[152],"particular":[154],"point":[157],"view":[159],"hostile":[161],"attacks.":[162]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":5},{"year":2013,"cited_by_count":10},{"year":2012,"cited_by_count":2}],"updated_date":"2026-03-25T14:56:36.534964","created_date":"2025-10-10T00:00:00"}
