{"id":"https://openalex.org/W4415366622","doi":"https://doi.org/10.1109/tmm.2025.3623522","title":"A Novel Robust Reversible Watermarking Scheme Using Fractional-Order Polar Complex Exponential Transform","display_name":"A Novel Robust Reversible Watermarking Scheme Using Fractional-Order Polar Complex Exponential Transform","publication_year":2025,"publication_date":"2025-10-20","ids":{"openalex":"https://openalex.org/W4415366622","doi":"https://doi.org/10.1109/tmm.2025.3623522"},"language":null,"primary_location":{"id":"doi:10.1109/tmm.2025.3623522","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmm.2025.3623522","pdf_url":null,"source":{"id":"https://openalex.org/S137030581","display_name":"IEEE Transactions on Multimedia","issn_l":"1520-9210","issn":["1520-9210","1941-0077"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Multimedia","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058234371","display_name":"Yichao Tang","orcid":"https://orcid.org/0000-0003-3117-193X"},"institutions":[{"id":"https://openalex.org/I101479585","display_name":"South China Agricultural University","ror":"https://ror.org/05v9jqt67","country_code":"CN","type":"education","lineage":["https://openalex.org/I101479585"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yichao Tang","raw_affiliation_strings":["College of Mathematics and Informatics, South China Agricultural University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Informatics, South China Agricultural University, Guangzhou, China","institution_ids":["https://openalex.org/I101479585"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004008982","display_name":"Shuai Wang","orcid":"https://orcid.org/0000-0003-3862-230X"},"institutions":[{"id":"https://openalex.org/I101479585","display_name":"South China Agricultural University","ror":"https://ror.org/05v9jqt67","country_code":"CN","type":"education","lineage":["https://openalex.org/I101479585"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuai Wang","raw_affiliation_strings":["College of Mathematics and Informatics, South China Agricultural University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Informatics, South China Agricultural University, Guangzhou, China","institution_ids":["https://openalex.org/I101479585"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5107881754","display_name":"R. Han","orcid":null},"institutions":[{"id":"https://openalex.org/I101479585","display_name":"South China Agricultural University","ror":"https://ror.org/05v9jqt67","country_code":"CN","type":"education","lineage":["https://openalex.org/I101479585"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruowei Han","raw_affiliation_strings":["College of Mathematics and Informatics, South China Agricultural University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Informatics, South China Agricultural University, Guangzhou, China","institution_ids":["https://openalex.org/I101479585"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064383463","display_name":"Chuntao Wang","orcid":"https://orcid.org/0000-0002-5482-1766"},"institutions":[{"id":"https://openalex.org/I101479585","display_name":"South China Agricultural University","ror":"https://ror.org/05v9jqt67","country_code":"CN","type":"education","lineage":["https://openalex.org/I101479585"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chuntao Wang","raw_affiliation_strings":["College of Mathematics and Informatics, South China Agricultural University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Informatics, South China Agricultural University, Guangzhou, China","institution_ids":["https://openalex.org/I101479585"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5058234371"],"corresponding_institution_ids":["https://openalex.org/I101479585"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.29436677,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"28","issue":null,"first_page":"241","last_page":"255"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.9782999753952026,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.8773000240325928},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.7699999809265137},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.7174000144004822},{"id":"https://openalex.org/keywords/quantization","display_name":"Quantization (signal processing)","score":0.5828999876976013},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.5612999796867371},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.4339999854564667},{"id":"https://openalex.org/keywords/exponential-function","display_name":"Exponential function","score":0.3903000056743622},{"id":"https://openalex.org/keywords/image-quality","display_name":"Image quality","score":0.3562999963760376}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.8773000240325928},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.7699999809265137},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.7174000144004822},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7075999975204468},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.6220999956130981},{"id":"https://openalex.org/C28855332","wikidata":"https://www.wikidata.org/wiki/Q198099","display_name":"Quantization (signal processing)","level":2,"score":0.5828999876976013},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.5612999796867371},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.4339999854564667},{"id":"https://openalex.org/C151376022","wikidata":"https://www.wikidata.org/wiki/Q168698","display_name":"Exponential function","level":2,"score":0.3903000056743622},{"id":"https://openalex.org/C55020928","wikidata":"https://www.wikidata.org/wiki/Q3813865","display_name":"Image quality","level":3,"score":0.3562999963760376},{"id":"https://openalex.org/C104267543","wikidata":"https://www.wikidata.org/wiki/Q208163","display_name":"Signal processing","level":3,"score":0.3440000116825104},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.335099995136261},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.33230000734329224},{"id":"https://openalex.org/C207467116","wikidata":"https://www.wikidata.org/wiki/Q4385666","display_name":"Inverse","level":2,"score":0.31299999356269836},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.2913999855518341},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.2896000146865845},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.28450000286102295},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.2840999960899353},{"id":"https://openalex.org/C103088060","wikidata":"https://www.wikidata.org/wiki/Q1062839","display_name":"Error detection and correction","level":2,"score":0.28360000252723694},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.27959999442100525},{"id":"https://openalex.org/C112972136","wikidata":"https://www.wikidata.org/wiki/Q7595718","display_name":"Stability (learning theory)","level":2,"score":0.26759999990463257},{"id":"https://openalex.org/C88682704","wikidata":"https://www.wikidata.org/wiki/Q2907415","display_name":"DC bias","level":3,"score":0.25369998812675476},{"id":"https://openalex.org/C136886441","wikidata":"https://www.wikidata.org/wiki/Q926129","display_name":"Normalization (sociology)","level":2,"score":0.25270000100135803},{"id":"https://openalex.org/C42781572","wikidata":"https://www.wikidata.org/wiki/Q1250322","display_name":"Digital image","level":4,"score":0.2524000108242035}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tmm.2025.3623522","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmm.2025.3623522","pdf_url":null,"source":{"id":"https://openalex.org/S137030581","display_name":"IEEE Transactions on Multimedia","issn_l":"1520-9210","issn":["1520-9210","1941-0077"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Multimedia","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W1519543599","https://openalex.org/W1971331173","https://openalex.org/W1981991528","https://openalex.org/W1993961222","https://openalex.org/W2009592814","https://openalex.org/W2017643398","https://openalex.org/W2033518960","https://openalex.org/W2035062046","https://openalex.org/W2080935464","https://openalex.org/W2106950225","https://openalex.org/W2117314358","https://openalex.org/W2118085659","https://openalex.org/W2134314852","https://openalex.org/W2146913416","https://openalex.org/W2164137544","https://openalex.org/W2167999072","https://openalex.org/W2169013230","https://openalex.org/W2944049061","https://openalex.org/W2969448873","https://openalex.org/W2970373593","https://openalex.org/W3004014092","https://openalex.org/W3010700265","https://openalex.org/W3034706159","https://openalex.org/W3092514202","https://openalex.org/W3098705456","https://openalex.org/W3128902306","https://openalex.org/W3172131108","https://openalex.org/W3190041284","https://openalex.org/W3203222604","https://openalex.org/W3212599909","https://openalex.org/W3215774363","https://openalex.org/W4205814753","https://openalex.org/W4281673957","https://openalex.org/W4297832709","https://openalex.org/W4309834001","https://openalex.org/W4313147134","https://openalex.org/W4321089583","https://openalex.org/W4377715515","https://openalex.org/W4385649047","https://openalex.org/W4387547290","https://openalex.org/W4387747436","https://openalex.org/W4388271799","https://openalex.org/W4392144040","https://openalex.org/W4392405568","https://openalex.org/W4399762262","https://openalex.org/W4401567718","https://openalex.org/W4403563850"],"related_works":[],"abstract_inverted_index":{"Robust":[0],"reversible":[1],"watermarking":[2],"(RRW)":[3],"techniques":[4],"have":[5,32],"been":[6,33],"proposed":[7,235,265],"in":[8,218],"the":[9,13,81,86,95,144,155,158,161,173,184,192,200,203,212,215,219,227,234,251,259,264],"literature":[10],"to":[11,35,209],"protect":[12],"copyrights":[14],"of":[15,85,97,104,125,157,221,263],"high-fidelity":[16],"digital":[17],"images":[18],"while":[19],"achieving":[20],"robustness,":[21],"reversibility,":[22],"invisibility,":[23],"and":[24,50,74,172,187,214,243,255,261],"large":[25],"capacity":[26,254],"simultaneously.":[27],"Most":[28],"studies":[29],"on":[30,116],"RRW":[31,64],"designed":[34],"resist":[36],"common":[37],"signal":[38],"processing":[39],"(CSP)":[40],"attacks,":[41,133],"but":[42],"only":[43,225],"a":[44,62,67,150],"few":[45],"can":[46],"withstand":[47],"both":[48,211],"CSP":[49,108,242],"geometric":[51],"deformation":[52],"(GD)":[53],"attacks.":[54],"To":[55],"address":[56],"this":[57,59],"problem,":[58],"study":[60],"proposes":[61],"novel":[63],"method":[65,236],"using":[66,94],"fractional-order":[68],"polar":[69],"complex":[70],"exponential":[71],"transform":[72],"(FrPCET)":[73],"optimized":[75],"quantization":[76],"index":[77],"modulation":[78],"(QIM).":[79],"Specifically,":[80],"optimal":[82],"fractional":[83],"parameter":[84],"FrPCET":[87,105,126],"is":[88,109,146],"determined":[89],"through":[90],"numerical":[91],"simulation":[92,114,230],"experiments":[93,231],"criterion":[96],"minimum":[98],"image":[99,163,217],"reconstruction":[100],"errors.":[101],"The":[102,166],"stability":[103],"moments":[106,127],"against":[107,240],"evaluated":[110],"by":[111,148,169],"performing":[112],"attack":[113],"tests":[115],"500":[117],"images,":[118],"revealing":[119],"that":[120,233],"differences":[121],"between":[122],"specific":[123],"pairs":[124],"exhibits":[128],"similar":[129],"variation":[130],"patterns":[131],"under":[132,160,250],"thus":[134],"making":[135],"them":[136],"suitable":[137],"for":[138,177],"use":[139],"as":[140,183],"embedding":[141,171,253],"carriers.":[142],"Then,":[143],"watermark":[145,159,170,213],"embedded":[147,190],"optimizing":[149],"conventional":[151],"QIM,":[152],"which":[153],"improves":[154],"robustness":[156,239],"same":[162,252],"quality":[164],"conditions.":[165],"distortions":[167],"caused":[168],"hash":[174],"sequences":[175],"used":[176],"integrity":[178],"authentication":[179],"are":[180,188],"subsequently":[181],"taken":[182],"auxiliary":[185],"information":[186],"reversibly":[189],"via":[191],"prediction":[193],"error":[194],"expansion-histogram":[195],"shift":[196],"method.":[197],"After":[198],"receiving":[199],"watermarked":[201],"image,":[202],"receiver":[204],"performs":[205],"an":[206],"inverse":[207],"operation":[208],"recover":[210],"original":[216],"absence":[220],"attacks;":[222],"otherwise,":[223],"it":[224],"extracts":[226],"watermark.":[228],"Extensive":[229],"demonstrate":[232],"has":[237],"greater":[238],"various":[241],"GD":[244],"attacks":[245],"than":[246],"do":[247],"state-of-the-art":[248],"methods":[249],"invisibility.":[256],"This":[257],"indicates":[258],"feasibility":[260],"effectiveness":[262],"scheme.":[266]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-21T00:00:00"}
