{"id":"https://openalex.org/W2138845967","doi":"https://doi.org/10.1109/tcsvt.2009.2020263","title":"Dual Digital Watermarking for Internet Media Based on Hybrid Strategies","display_name":"Dual Digital Watermarking for Internet Media Based on Hybrid Strategies","publication_year":2009,"publication_date":"2009-04-08","ids":{"openalex":"https://openalex.org/W2138845967","doi":"https://doi.org/10.1109/tcsvt.2009.2020263","mag":"2138845967"},"language":"en","primary_location":{"id":"doi:10.1109/tcsvt.2009.2020263","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsvt.2009.2020263","pdf_url":null,"source":{"id":"https://openalex.org/S115173108","display_name":"IEEE Transactions on Circuits and Systems for Video Technology","issn_l":"1051-8215","issn":["1051-8215","1558-2205"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Circuits and Systems for Video Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075986807","display_name":"Pei-Yu Lin","orcid":"https://orcid.org/0000-0001-8809-1063"},"institutions":[{"id":"https://openalex.org/I148099254","display_name":"National Chung Cheng University","ror":"https://ror.org/0028v3876","country_code":"TW","type":"education","lineage":["https://openalex.org/I148099254"]},{"id":"https://openalex.org/I99908691","display_name":"Yuan Ze University","ror":"https://ror.org/01fv1ds98","country_code":"TW","type":"education","lineage":["https://openalex.org/I99908691"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Pei-Yu Lin","raw_affiliation_strings":["Department of Computer Science and Information Engineering, National Chung Cheng University, Chiayi, Taiwan","Department of Information Communication, Yuan-Ze University, Chungli, Taiwan","[Department of Information Communication, Yuan-Ze University, Chungli, Taiwan]"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Engineering, National Chung Cheng University, Chiayi, Taiwan","institution_ids":["https://openalex.org/I148099254"]},{"raw_affiliation_string":"Department of Information Communication, Yuan-Ze University, Chungli, Taiwan","institution_ids":["https://openalex.org/I99908691"]},{"raw_affiliation_string":"[Department of Information Communication, Yuan-Ze University, Chungli, Taiwan]","institution_ids":["https://openalex.org/I99908691"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034470100","display_name":"Jung-San Lee","orcid":"https://orcid.org/0000-0001-7030-2985"},"institutions":[{"id":"https://openalex.org/I4880106","display_name":"Feng Chia University","ror":"https://ror.org/05vhczg54","country_code":"TW","type":"education","lineage":["https://openalex.org/I4880106"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Jung-San Lee","raw_affiliation_strings":["Department of Information Engineering and Computer Science, Feng Chia University FCU, Taichung, Taiwan","[Dept. of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan]"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering and Computer Science, Feng Chia University FCU, Taichung, Taiwan","institution_ids":["https://openalex.org/I4880106"]},{"raw_affiliation_string":"[Dept. of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan]","institution_ids":["https://openalex.org/I4880106"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027171565","display_name":"C. C. Chang","orcid":"https://orcid.org/0000-0001-9345-7728"},"institutions":[{"id":"https://openalex.org/I4880106","display_name":"Feng Chia University","ror":"https://ror.org/05vhczg54","country_code":"TW","type":"education","lineage":["https://openalex.org/I4880106"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Chin-Chen Chang","raw_affiliation_strings":["Department of Information Engineering and Computer Science, Feng Chia University FCU, Taichung, Taiwan","[Dept. of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan]"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering and Computer Science, Feng Chia University FCU, Taichung, Taiwan","institution_ids":["https://openalex.org/I4880106"]},{"raw_affiliation_string":"[Dept. of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan]","institution_ids":["https://openalex.org/I4880106"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5075986807"],"corresponding_institution_ids":["https://openalex.org/I148099254","https://openalex.org/I99908691"],"apc_list":null,"apc_paid":null,"fwci":1.9414,"has_fulltext":false,"cited_by_count":53,"citation_normalized_percentile":{"value":0.88166625,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"19","issue":"8","first_page":"1169","last_page":"1177"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9800999760627747,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.9369263052940369},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7547467947006226},{"id":"https://openalex.org/keywords/digital-watermarking-alliance","display_name":"Digital Watermarking Alliance","score":0.6272894740104675},{"id":"https://openalex.org/keywords/visibility","display_name":"Visibility","score":0.5897890329360962},{"id":"https://openalex.org/keywords/digital-media","display_name":"Digital media","score":0.5587660074234009},{"id":"https://openalex.org/keywords/dual","display_name":"Dual (grammatical number)","score":0.5285108685493469},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5201778411865234},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5180392861366272},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4583297669887543},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.443854421377182},{"id":"https://openalex.org/keywords/copy-protection","display_name":"Copy protection","score":0.4399745762348175},{"id":"https://openalex.org/keywords/inpainting","display_name":"Inpainting","score":0.43585652112960815},{"id":"https://openalex.org/keywords/protection-mechanism","display_name":"Protection mechanism","score":0.4266262352466583},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.4157010316848755},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.3864269554615021},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.11124968528747559},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10077866911888123}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.9369263052940369},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7547467947006226},{"id":"https://openalex.org/C193470923","wikidata":"https://www.wikidata.org/wiki/Q5276026","display_name":"Digital Watermarking Alliance","level":4,"score":0.6272894740104675},{"id":"https://openalex.org/C123403432","wikidata":"https://www.wikidata.org/wiki/Q654068","display_name":"Visibility","level":2,"score":0.5897890329360962},{"id":"https://openalex.org/C17632256","wikidata":"https://www.wikidata.org/wiki/Q1076968","display_name":"Digital media","level":2,"score":0.5587660074234009},{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.5285108685493469},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5201778411865234},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5180392861366272},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4583297669887543},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.443854421377182},{"id":"https://openalex.org/C2780581891","wikidata":"https://www.wikidata.org/wiki/Q15738686","display_name":"Copy protection","level":4,"score":0.4399745762348175},{"id":"https://openalex.org/C11727466","wikidata":"https://www.wikidata.org/wiki/Q1628157","display_name":"Inpainting","level":3,"score":0.43585652112960815},{"id":"https://openalex.org/C2778717966","wikidata":"https://www.wikidata.org/wiki/Q4189076","display_name":"Protection mechanism","level":3,"score":0.4266262352466583},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4157010316848755},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.3864269554615021},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.11124968528747559},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10077866911888123},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C124952713","wikidata":"https://www.wikidata.org/wiki/Q8242","display_name":"Literature","level":1,"score":0.0},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcsvt.2009.2020263","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsvt.2009.2020263","pdf_url":null,"source":{"id":"https://openalex.org/S115173108","display_name":"IEEE Transactions on Circuits and Systems for Video Technology","issn_l":"1051-8215","issn":["1051-8215","1558-2205"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Circuits and Systems for Video Technology","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1893984302","https://openalex.org/W1974641035","https://openalex.org/W1980911770","https://openalex.org/W2003119559","https://openalex.org/W2020677950","https://openalex.org/W2025884404","https://openalex.org/W2053142874","https://openalex.org/W2054321433","https://openalex.org/W2060056785","https://openalex.org/W2078271453","https://openalex.org/W2084112876","https://openalex.org/W2088290595","https://openalex.org/W2098564397","https://openalex.org/W2116467012","https://openalex.org/W2121036560","https://openalex.org/W2129022562","https://openalex.org/W2132089535","https://openalex.org/W2135459805","https://openalex.org/W2143330717","https://openalex.org/W2146913416","https://openalex.org/W2148351147","https://openalex.org/W2153715559","https://openalex.org/W2155285666","https://openalex.org/W2161840740","https://openalex.org/W2162707586","https://openalex.org/W2169111714","https://openalex.org/W2170236946","https://openalex.org/W6639632369","https://openalex.org/W6656766816"],"related_works":["https://openalex.org/W3168409739","https://openalex.org/W2168370821","https://openalex.org/W2163217894","https://openalex.org/W2534819845","https://openalex.org/W2105743766","https://openalex.org/W4200462593","https://openalex.org/W1506704732","https://openalex.org/W261210528","https://openalex.org/W2997669408","https://openalex.org/W2386369059"],"abstract_inverted_index":{"This":[0,96],"paper":[1],"presents":[2],"a":[3,13],"novel":[4,70],"dual":[5,91],"watermarking":[6,30,92],"mechanism":[7,80],"for":[8,33,101],"digital":[9,49],"media":[10,50],"that":[11,68],"embeds":[12],"recognizable":[14],"pattern":[15],"into":[16,24],"the":[17,25,42,54,69,78],"spatial":[18],"domain":[19],"and":[20,57,104],"an":[21,86],"invisible":[22],"logo":[23],"frequency":[26],"domain.":[27],"Undoubtedly,":[28],"visible":[29],"is":[31],"important":[32],"protecting":[34,102],"online":[35],"resources":[36],"from":[37],"unauthorized":[38],"reproduction.":[39],"Due":[40],"to":[41,53,84],"visibility":[43],"of":[44],"embedded":[45],"patterns,":[46],"however,":[47],"watermarked":[48],"are":[51],"vulnerable":[52],"inpainting":[55],"attack":[56],"common":[58],"signal":[59],"processing":[60],"operations.":[61],"Utilizing":[62],"hybrid":[63],"strategies,":[64],"simulation":[65],"results":[66],"show":[67],"method":[71],"can":[72],"resist":[73],"these":[74],"attacks.":[75],"In":[76],"particular,":[77],"new":[79],"allows":[81],"legal":[82],"subscribers":[83],"restore":[85],"unmarked":[87],"image,":[88],"whereas":[89],"other":[90],"schemes":[93],"do":[94],"not.":[95],"feature":[97],"makes":[98],"it":[99],"suitable":[100],"artistic":[103],"valuable":[105],"media.":[106]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":8},{"year":2015,"cited_by_count":5},{"year":2014,"cited_by_count":6},{"year":2013,"cited_by_count":5},{"year":2012,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
