{"id":"https://openalex.org/W4220933611","doi":"https://doi.org/10.1109/tifs.2022.3162105","title":"VILS: A Verifiable Image Licensing System","display_name":"VILS: A Verifiable Image Licensing System","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4220933611","doi":"https://doi.org/10.1109/tifs.2022.3162105"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2022.3162105","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3162105","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100713031","display_name":"Haixia Chen","orcid":"https://orcid.org/0000-0002-1511-7581"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haixia Chen","raw_affiliation_strings":["Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031931063","display_name":"Xinyi Huang","orcid":"https://orcid.org/0000-0003-0070-1707"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinyi Huang","raw_affiliation_strings":["Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081596329","display_name":"Jianting Ning","orcid":"https://orcid.org/0000-0001-7165-398X"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianting Ning","raw_affiliation_strings":["College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027615941","display_name":"Futai Zhang","orcid":"https://orcid.org/0000-0001-8984-1030"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Futai Zhang","raw_affiliation_strings":["Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037642352","display_name":"Chao Lin","orcid":"https://orcid.org/0000-0002-0101-8531"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]},{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chao Lin","raw_affiliation_strings":["College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100713031"],"corresponding_institution_ids":["https://openalex.org/I111753288"],"apc_list":null,"apc_paid":null,"fwci":0.3057,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.52493126,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"17","issue":null,"first_page":"1420","last_page":"1434"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9527999758720398,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8510767221450806},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.798670768737793},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5946140289306641},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5484240651130676},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.5014257431030273},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4748975336551666},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.46778404712677},{"id":"https://openalex.org/keywords/accumulator","display_name":"Accumulator (cryptography)","score":0.4300384223461151},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.35357293486595154},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2960411608219147},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.13717111945152283}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8510767221450806},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.798670768737793},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5946140289306641},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5484240651130676},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.5014257431030273},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4748975336551666},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.46778404712677},{"id":"https://openalex.org/C2078106","wikidata":"https://www.wikidata.org/wiki/Q14906620","display_name":"Accumulator (cryptography)","level":2,"score":0.4300384223461151},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.35357293486595154},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2960411608219147},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.13717111945152283},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2022.3162105","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3162105","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.47999998927116394,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1828293475","display_name":null,"funder_award_id":"2020J02016","funder_id":"https://openalex.org/F4320323190","funder_display_name":"Fujian Provincial Department of Science and Technology"},{"id":"https://openalex.org/G2249602513","display_name":null,"funder_award_id":"62172096","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5043465742","display_name":null,"funder_award_id":"61972094","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5044586465","display_name":null,"funder_award_id":"2042021kf1030","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G5669255772","display_name":null,"funder_award_id":"62032005","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7160647132","display_name":null,"funder_award_id":"61902070","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7406850032","display_name":null,"funder_award_id":"62102089","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320323190","display_name":"Fujian Provincial Department of Science and Technology","ror":"https://ror.org/00rgzpv08"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":58,"referenced_works":["https://openalex.org/W123374098","https://openalex.org/W1517505812","https://openalex.org/W1528195422","https://openalex.org/W1589205472","https://openalex.org/W1599846125","https://openalex.org/W1610688607","https://openalex.org/W1826437507","https://openalex.org/W1996163863","https://openalex.org/W1996973598","https://openalex.org/W2001792341","https://openalex.org/W2006037582","https://openalex.org/W2077509481","https://openalex.org/W2083014862","https://openalex.org/W2099544623","https://openalex.org/W2105064805","https://openalex.org/W2109190643","https://openalex.org/W2109376948","https://openalex.org/W2114550641","https://openalex.org/W2116380715","https://openalex.org/W2117056197","https://openalex.org/W2117797270","https://openalex.org/W2138001464","https://openalex.org/W2143998759","https://openalex.org/W2158518777","https://openalex.org/W2159401786","https://openalex.org/W2162593813","https://openalex.org/W2166462813","https://openalex.org/W2166554499","https://openalex.org/W2168870637","https://openalex.org/W2172174332","https://openalex.org/W2183964636","https://openalex.org/W2397856895","https://openalex.org/W2492364657","https://openalex.org/W2513989210","https://openalex.org/W2745062479","https://openalex.org/W2766756388","https://openalex.org/W2810013968","https://openalex.org/W2891011438","https://openalex.org/W2916319524","https://openalex.org/W2955935890","https://openalex.org/W2956615724","https://openalex.org/W2970821086","https://openalex.org/W2990502263","https://openalex.org/W2995087390","https://openalex.org/W3003177380","https://openalex.org/W3019491397","https://openalex.org/W3035651807","https://openalex.org/W3045040944","https://openalex.org/W3096605328","https://openalex.org/W3103305780","https://openalex.org/W3130254942","https://openalex.org/W3160322952","https://openalex.org/W3174937766","https://openalex.org/W3199955888","https://openalex.org/W4205092462","https://openalex.org/W4309685121","https://openalex.org/W6712529213","https://openalex.org/W6723168095"],"related_works":["https://openalex.org/W2355730523","https://openalex.org/W1512373895","https://openalex.org/W2359773540","https://openalex.org/W4221093415","https://openalex.org/W4294068482","https://openalex.org/W4327926797","https://openalex.org/W2795318091","https://openalex.org/W1669086842","https://openalex.org/W2141372244","https://openalex.org/W2062005526"],"abstract_inverted_index":{"Image":[0],"licensing":[1,61,81,142],"regulates":[2],"the":[3,45,122,159,168,173,175,179,186],"scope,":[4],"type,":[5],"and":[6,33,40,156],"limitations":[7],"of":[8,87,94,152,158,161,181],"using":[9],"an":[10,13,22,66,130,135],"image":[11,38,60,74,117,136,164,182],"through":[12],"agreement.":[14,82],"However,":[15],"it":[16],"is":[17,75,90,154],"challenging":[18],"to":[19,49,69,79],"verify":[20,70],"whether":[21],"agreement":[23,143],"has":[24,121],"been":[25],"fulfilled":[26],"honestly.":[27],"Existing":[28],"techniques,":[29],"such":[30],"as":[31],"watermarking":[32],"perceptual":[34],"hashing,":[35],"help":[36],"check":[37],"originality":[39],"editing":[41,110],"operations":[42,138,162],"specified":[43],"in":[44,116,140],"agreement,":[46],"but":[47,112,184],"fail":[48],"achieve":[50,107],"editor":[51,114],"designation.":[52],"In":[53],"this":[54],"paper,":[55],"we":[56],"propose":[57],"a":[58,72,91,100,141],"verifiable":[59],"system":[62],"(VILS)":[63],"which":[64],"provides":[65],"effective":[67],"solution":[68],"if":[71],"received":[73],"used":[76],"legally":[77],"according":[78],"its":[80],"The":[83,103,150],"core":[84],"building":[85],"block":[86],"our":[88],"design":[89,177],"new":[92,104,176],"kind":[93],"cryptographic":[95],"primitive,":[96],"called":[97],"accumulator":[98,105],"with":[99,137,167],"designated":[101],"entity.":[102],"helps":[106],"not":[108],"only":[109],"restriction,":[111],"also":[113],"designation":[115],"authentication.":[118],"Our":[119],"VILS":[120,153],"following":[123],"two":[124],"appealing":[125],"features:":[126],"(1)":[127],"Authorization:":[128],"Only":[129],"authorized":[131],"licensee":[132],"who":[133],"edits":[134],"declared":[139],"can":[144],"produce":[145],"valid":[146],"images;":[147],"(2)":[148],"Efficiency:":[149],"verification":[151,187],"efficient":[155],"independent":[157],"number":[160],"or":[163],"size.":[165],"Compared":[166],"most":[169],"relevant":[170],"schemes":[171],"from":[172],"state-of-the-art,":[174],"enriches":[178],"functionality":[180],"authentication":[183],"reduces":[185],"time":[188],"by":[189],"40%.":[190]},"counts_by_year":[{"year":2023,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
