{"id":"https://openalex.org/W2079736071","doi":"https://doi.org/10.1109/tifs.2014.2333592","title":"A New Watermarking Scheme Based on Antipodal Binary Dirty Paper Coding","display_name":"A New Watermarking Scheme Based on Antipodal Binary Dirty Paper Coding","publication_year":2014,"publication_date":"2014-06-27","ids":{"openalex":"https://openalex.org/W2079736071","doi":"https://doi.org/10.1109/tifs.2014.2333592","mag":"2079736071"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2014.2333592","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2014.2333592","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112286956","display_name":"Andrea Abrardo","orcid":"https://orcid.org/0009-0009-8733-8381"},"institutions":[{"id":"https://openalex.org/I102064193","display_name":"University of Siena","ror":"https://ror.org/01tevnk56","country_code":"IT","type":"education","lineage":["https://openalex.org/I102064193"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Andrea Abrardo","raw_affiliation_strings":["National University Consortium for Telecommunications Research Unit, University of Siena, Siena, Italy","Department of Information Engineering and Mathematics, University of Siena, Siena, ITALY"],"affiliations":[{"raw_affiliation_string":"National University Consortium for Telecommunications Research Unit, University of Siena, Siena, Italy","institution_ids":["https://openalex.org/I102064193"]},{"raw_affiliation_string":"Department of Information Engineering and Mathematics, University of Siena, Siena, ITALY","institution_ids":["https://openalex.org/I102064193"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007836692","display_name":"Mauro Barni","orcid":"https://orcid.org/0000-0002-7368-0866"},"institutions":[{"id":"https://openalex.org/I102064193","display_name":"University of Siena","ror":"https://ror.org/01tevnk56","country_code":"IT","type":"education","lineage":["https://openalex.org/I102064193"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Mauro Barni","raw_affiliation_strings":["National University Consortium for Telecommunications Research Unit, University of Siena, Siena, Italy","Department of Information Engineering and Mathematics, University of Siena, Siena, ITALY"],"affiliations":[{"raw_affiliation_string":"National University Consortium for Telecommunications Research Unit, University of Siena, Siena, Italy","institution_ids":["https://openalex.org/I102064193"]},{"raw_affiliation_string":"Department of Information Engineering and Mathematics, University of Siena, Siena, ITALY","institution_ids":["https://openalex.org/I102064193"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5112286956"],"corresponding_institution_ids":["https://openalex.org/I102064193"],"apc_list":null,"apc_paid":null,"fwci":1.4632,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.85863059,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"9","issue":"9","first_page":"1380","last_page":"1393"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/antipodal-point","display_name":"Antipodal point","score":0.9012551307678223},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.900235652923584},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.7581867575645447},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7195473909378052},{"id":"https://openalex.org/keywords/binary-code","display_name":"Binary code","score":0.6396529674530029},{"id":"https://openalex.org/keywords/encoder","display_name":"Encoder","score":0.6190636157989502},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.5761731266975403},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5752760171890259},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.5010769367218018},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.46877187490463257},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.40744370222091675},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.21915531158447266},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.21811622381210327},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.17573577165603638},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.17573344707489014},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.1495838463306427},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.10581645369529724}],"concepts":[{"id":"https://openalex.org/C70943382","wikidata":"https://www.wikidata.org/wiki/Q505356","display_name":"Antipodal point","level":2,"score":0.9012551307678223},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.900235652923584},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.7581867575645447},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7195473909378052},{"id":"https://openalex.org/C63435697","wikidata":"https://www.wikidata.org/wiki/Q864135","display_name":"Binary code","level":3,"score":0.6396529674530029},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.6190636157989502},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.5761731266975403},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5752760171890259},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.5010769367218018},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.46877187490463257},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.40744370222091675},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.21915531158447266},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.21811622381210327},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.17573577165603638},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17573344707489014},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.1495838463306427},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.10581645369529724},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2014.2333592","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2014.2333592","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:usiena-air.unisi.it:11365/922442","is_oa":false,"landing_page_url":"http://hdl.handle.net/11365/922442","pdf_url":null,"source":{"id":"https://openalex.org/S4377196319","display_name":"Use Siena air (University of Siena)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I102064193","host_organization_name":"University of Siena","host_organization_lineage":["https://openalex.org/I102064193"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1486135334","https://openalex.org/W1491163994","https://openalex.org/W1534160973","https://openalex.org/W1604949508","https://openalex.org/W1971636791","https://openalex.org/W1972208085","https://openalex.org/W1976109068","https://openalex.org/W2010124162","https://openalex.org/W2061712963","https://openalex.org/W2085693394","https://openalex.org/W2096015107","https://openalex.org/W2099111195","https://openalex.org/W2101568629","https://openalex.org/W2107465879","https://openalex.org/W2111257476","https://openalex.org/W2111554620","https://openalex.org/W2112589306","https://openalex.org/W2116467012","https://openalex.org/W2128301448","https://openalex.org/W2139490206","https://openalex.org/W2140432907","https://openalex.org/W2143664144","https://openalex.org/W2145714519","https://openalex.org/W2154890510","https://openalex.org/W2160921333","https://openalex.org/W2161134513","https://openalex.org/W2162752880","https://openalex.org/W2167799804","https://openalex.org/W2626219245","https://openalex.org/W3169111758","https://openalex.org/W6796564892"],"related_works":["https://openalex.org/W2358156753","https://openalex.org/W2142132655","https://openalex.org/W16791530","https://openalex.org/W2079736071","https://openalex.org/W2540816192","https://openalex.org/W2279238589","https://openalex.org/W1782157216","https://openalex.org/W2059122306","https://openalex.org/W2380654838","https://openalex.org/W4229449499"],"abstract_inverted_index":{"We":[0,106],"investigate":[1],"the":[2,10,35,47,73,77,81,100,108,111,124,136,148,159],"performance":[3,133,154],"of":[4,26,37,53,72,76,110,138,161],"a":[5,16,63,69,117],"watermarking":[6,119,160],"system":[7,120],"in":[8,135],"which":[9,50],"encoder":[11,82],"is":[12,83],"forced":[13,84],"to":[14,85,97,115],"use":[15,25,86],"binning":[17,30,65,113],"strategy":[18],"based":[19],"on":[20,39,62,143],"antipodal":[21,27,88],"binary-valued":[22],"sequences.":[23],"The":[24],"binary":[28,43,89],"random":[29,91],"has":[31],"several":[32],"advantages,":[33],"including":[34],"possibility":[36],"relying":[38,61],"simple":[40],"and":[41,46,121],"effective":[42],"code":[44],"constructions":[45],"ease":[48],"with":[49,57,103],"this":[51],"kind":[52],"schemes":[54],"can":[55],"cope":[56],"amplitude":[58],"scaling.":[59],"By":[60],"novel":[64],"strategy,":[66,114],"we":[67],"derive":[68],"lower":[70],"bound":[71,101],"Gelfand-Pinsker":[74],"capacity":[75],"watermark":[78],"channel":[79],"when":[80,156],"an":[87],"auxiliary":[90],"variable,":[92],"showing":[93],"that":[94,123,147],"for":[95,158],"low":[96],"moderate":[98],"bit-rates,":[99],"coincides":[102],"Costa's":[104],"capacity.":[105],"exploit":[107],"properties":[109],"new":[112,125,149],"develop":[116],"practical":[118],"show":[122,146],"scheme":[126,150],"outperforms":[127],"previous":[128],"constructions,":[129],"exhibiting":[130],"very":[131],"good":[132,153],"also":[134,155],"presence":[137],"gain":[139],"attack.":[140],"Preliminary":[141],"results":[142],"audio":[144],"signals":[145],"retains":[151],"its":[152],"used":[157],"real":[162],"multimedia":[163],"data.":[164]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":4},{"year":2015,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
