{"id":"https://openalex.org/W4396667847","doi":"https://doi.org/10.1109/tifs.2024.3397043","title":"Client-Side Embedding of Screen-Shooting Resilient Image Watermarking","display_name":"Client-Side Embedding of Screen-Shooting Resilient Image Watermarking","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4396667847","doi":"https://doi.org/10.1109/tifs.2024.3397043"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2024.3397043","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3397043","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057787077","display_name":"Xiangli Xiao","orcid":"https://orcid.org/0000-0002-3250-0603"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiangli Xiao","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0002-3250-0603","affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085698418","display_name":"Yushu Zhang","orcid":"https://orcid.org/0000-0001-8183-8435"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yushu Zhang","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0001-8183-8435","affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007080915","display_name":"Zhongyun Hua","orcid":"https://orcid.org/0000-0002-3529-0541"},"institutions":[{"id":"https://openalex.org/I158809036","display_name":"Shenzhen Institute of Information Technology","ror":"https://ror.org/03wrf9427","country_code":"CN","type":"education","lineage":["https://openalex.org/I158809036"]},{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhongyun Hua","raw_affiliation_strings":["School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen Campus, Shenzhen, China","School of Computer Science and Technology, Shenzhen Campus of Harbin Institute of Technology, Shenzhen, China"],"raw_orcid":"https://orcid.org/0000-0002-3529-0541","affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen Campus, Shenzhen, China","institution_ids":["https://openalex.org/I158809036","https://openalex.org/I204983213"]},{"raw_affiliation_string":"School of Computer Science and Technology, Shenzhen Campus of Harbin Institute of Technology, Shenzhen, China","institution_ids":["https://openalex.org/I158809036","https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005319671","display_name":"Zhihua Xia","orcid":"https://orcid.org/0000-0001-6860-647X"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhihua Xia","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, China"],"raw_orcid":"https://orcid.org/0000-0001-6860-647X","affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082041657","display_name":"Jian Weng","orcid":null},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Weng","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, China"],"raw_orcid":"https://orcid.org/0000-0003-4067-8230","affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5057787077"],"corresponding_institution_ids":["https://openalex.org/I9842412"],"apc_list":null,"apc_paid":null,"fwci":5.4758,"has_fulltext":false,"cited_by_count":23,"citation_normalized_percentile":{"value":0.96816406,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"19","issue":null,"first_page":"5357","last_page":"5372"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.8820054531097412},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.859960675239563},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8512101173400879},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.6593140959739685},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6531871557235718},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6123535633087158},{"id":"https://openalex.org/keywords/client-side","display_name":"Client-side","score":0.4945809543132782},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.4816107451915741},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.4782615900039673},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4241606295108795},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.41482847929000854},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.40328407287597656},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37541258335113525},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.17283901572227478},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10440203547477722}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.8820054531097412},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.859960675239563},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8512101173400879},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.6593140959739685},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6531871557235718},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6123535633087158},{"id":"https://openalex.org/C202477664","wikidata":"https://www.wikidata.org/wiki/Q1352449","display_name":"Client-side","level":2,"score":0.4945809543132782},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4816107451915741},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4782615900039673},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4241606295108795},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.41482847929000854},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.40328407287597656},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37541258335113525},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.17283901572227478},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10440203547477722},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2024.3397043","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3397043","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Climate action","score":0.4699999988079071,"id":"https://metadata.un.org/sdg/13"}],"awards":[{"id":"https://openalex.org/G6258482808","display_name":null,"funder_award_id":"62122032","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7040895958","display_name":null,"funder_award_id":"KYCX23_0397","funder_id":"https://openalex.org/F4320335473","funder_display_name":"Postdoctoral Science Foundation of Jiangsu Province"},{"id":"https://openalex.org/G7263650625","display_name":null,"funder_award_id":"U23B2023","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335473","display_name":"Postdoctoral Science Foundation of Jiangsu Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W119717784","https://openalex.org/W1528125270","https://openalex.org/W1630587103","https://openalex.org/W1974984965","https://openalex.org/W1981107414","https://openalex.org/W1981577150","https://openalex.org/W2016618067","https://openalex.org/W2047594556","https://openalex.org/W2053676937","https://openalex.org/W2060277266","https://openalex.org/W2083386243","https://openalex.org/W2124386111","https://openalex.org/W2146561208","https://openalex.org/W2164856720","https://openalex.org/W2165833729","https://openalex.org/W2166483402","https://openalex.org/W2230451675","https://openalex.org/W2268734374","https://openalex.org/W2333682396","https://openalex.org/W2423286704","https://openalex.org/W2594048902","https://openalex.org/W2753079015","https://openalex.org/W2780823890","https://openalex.org/W2786928439","https://openalex.org/W2885722305","https://openalex.org/W2899413106","https://openalex.org/W2899929168","https://openalex.org/W2928947536","https://openalex.org/W2989435086","https://openalex.org/W3023097282","https://openalex.org/W3041179219","https://openalex.org/W3042950035","https://openalex.org/W3094714353","https://openalex.org/W3098705456","https://openalex.org/W3121179220","https://openalex.org/W4200440472","https://openalex.org/W4226266471","https://openalex.org/W4296639119","https://openalex.org/W4304092681","https://openalex.org/W4317038640","https://openalex.org/W6795079321"],"related_works":["https://openalex.org/W2137394636","https://openalex.org/W2358993821","https://openalex.org/W1516446231","https://openalex.org/W2098152888","https://openalex.org/W1559740347","https://openalex.org/W2040356834","https://openalex.org/W2080353903","https://openalex.org/W2385289568","https://openalex.org/W2381486749","https://openalex.org/W1514507288"],"abstract_inverted_index":{"The":[0],"proliferation":[1],"of":[2,13,29,42,80,92,123,144,169,207,231],"portable":[3],"camera":[4],"devices,":[5],"represented":[6],"by":[7,19,103,213,223],"smartphones,":[8],"is":[9,40,136,191,211,221,234],"increasing":[10],"the":[11,24,44,49,60,67,78,85,99,105,110,114,117,137,141,155,167,188,195,205,208,215,228],"risk":[12],"sensitive":[14],"internal":[15],"data":[16],"being":[17],"leaked":[18],"screen":[20,115,185,209],"shooting.":[21,186],"To":[22],"trace":[23],"leak":[25],"source,":[26],"a":[27,121],"lot":[28],"research":[30],"has":[31],"been":[32],"done":[33],"on":[34,131],"screen-shooting":[35,55,145],"resilient":[36,56,146],"watermarking":[37,57],"technique,":[38],"which":[39,83,225],"capable":[41],"extracting":[43],"previously":[45],"embedded":[46],"watermark":[47,106,165,210],"from":[48],"screen-shot":[50],"image.":[51,118],"However,":[52],"all":[53],"existing":[54],"schemes":[58],"follow":[59],"owner-side":[61],"embedding":[62,90,96,107,143,216,233],"mode.":[63],"In":[64,148],"this":[65,134,149],"mode,":[66],"management":[68],"center":[69],"will":[70],"suffer":[71],"heavy":[72],"computational":[73],"and":[74,126,154,178,194],"communication":[75],"burden":[76],"in":[77],"case":[79],"numerous":[81],"screens,":[82],"hinders":[84],"system":[86],"scalability.":[87],"As":[88],"another":[89],"mode":[91],"digital":[93],"watermarking,":[94],"client-side":[95,142,232],"can":[97,198],"solve":[98],"above":[100],"scalability":[101],"problem":[102],"migrating":[104],"operation":[108],"to":[109,139],"same":[111],"time":[112],"when":[113],"decrypts":[116],"By":[119],"designing":[120],"pair":[122],"image":[124,190,197],"encryption":[125],"personalized":[127],"decryption":[128],"algorithms":[129],"based":[130],"matrix":[132],"operation,":[133],"paper":[135],"first":[138],"realize":[140],"watermarking.":[147],"implementation,":[150],"challenges":[151],"are":[152,159],"overcome":[153],"following":[156],"key":[157],"achievements":[158],"attained.":[160],"First,":[161],"our":[162,219],"scheme":[163,220],"embeds":[164],"using":[166],"algorithm":[168],"Fang":[170],"<italic":[171],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[172],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">et":[173],"al</i>":[174],".":[175],"without":[176],"modification,":[177],"thus":[179],"fully":[180],"inherits":[181],"its":[182],"robustness":[183],"against":[184],"Second,":[187],"original":[189],"securely":[192],"encrypted":[193],"watermarked":[196],"be":[199],"directly":[200],"retrieved":[201],"through":[202],"decryption.":[203],"Third,":[204],"secrecy":[206],"ensured":[212],"concealing":[214],"pattern.":[217],"Finally,":[218],"validated":[222],"experiments,":[224],"shows":[226],"that":[227],"efficiency":[229],"advantage":[230],"realized":[235],"while":[236],"maintaining":[237],"robustness.":[238]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":18},{"year":2024,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
