{"id":"https://openalex.org/W3196942802","doi":"https://doi.org/10.1109/tsp52935.2021.9522620","title":"Medical Image Watermarking Scheme in Transform Domain based on Asymmetric crypto-system and Arnold Chaotic Map","display_name":"Medical Image Watermarking Scheme in Transform Domain based on Asymmetric crypto-system and Arnold Chaotic Map","publication_year":2021,"publication_date":"2021-07-26","ids":{"openalex":"https://openalex.org/W3196942802","doi":"https://doi.org/10.1109/tsp52935.2021.9522620","mag":"3196942802"},"language":"en","primary_location":{"id":"doi:10.1109/tsp52935.2021.9522620","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsp52935.2021.9522620","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 44th International Conference on Telecommunications and Signal Processing (TSP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053031641","display_name":"Nadhir Nou\u0131oua","orcid":"https://orcid.org/0000-0002-1563-4685"},"institutions":[{"id":"https://openalex.org/I4210125514","display_name":"Universit\u00e9 Djilali de Sidi Bel Abb\u00e8s","ror":"https://ror.org/0378szg41","country_code":"DZ","type":"education","lineage":["https://openalex.org/I4210125514"]}],"countries":["DZ"],"is_corresponding":true,"raw_author_name":"Nouioua Nadhir","raw_affiliation_strings":["Djillali Liabes University,Telecommunications and Digital Signal Processing Laboratory,Sidi Bel Abbes,Algeria","Telecommunications and Digital Signal Processing Laboratory, Djillali Liabes University, Sidi Bel Abbes, Algeria"],"affiliations":[{"raw_affiliation_string":"Djillali Liabes University,Telecommunications and Digital Signal Processing Laboratory,Sidi Bel Abbes,Algeria","institution_ids":["https://openalex.org/I4210125514"]},{"raw_affiliation_string":"Telecommunications and Digital Signal Processing Laboratory, Djillali Liabes University, Sidi Bel Abbes, Algeria","institution_ids":["https://openalex.org/I4210125514"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024265292","display_name":"Ali Sedd\u0131k\u0131","orcid":"https://orcid.org/0000-0001-9845-5457"},"institutions":[{"id":"https://openalex.org/I4210125514","display_name":"Universit\u00e9 Djilali de Sidi Bel Abb\u00e8s","ror":"https://ror.org/0378szg41","country_code":"DZ","type":"education","lineage":["https://openalex.org/I4210125514"]}],"countries":["DZ"],"is_corresponding":false,"raw_author_name":"Seddiki Ali","raw_affiliation_strings":["Djillali Liabes University,Telecommunications and Digital Signal Processing Laboratory,Sidi Bel Abbes,Algeria","Telecommunications and Digital Signal Processing Laboratory, Djillali Liabes University, Sidi Bel Abbes, Algeria"],"affiliations":[{"raw_affiliation_string":"Djillali Liabes University,Telecommunications and Digital Signal Processing Laboratory,Sidi Bel Abbes,Algeria","institution_ids":["https://openalex.org/I4210125514"]},{"raw_affiliation_string":"Telecommunications and Digital Signal Processing Laboratory, Djillali Liabes University, Sidi Bel Abbes, Algeria","institution_ids":["https://openalex.org/I4210125514"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009694787","display_name":"Abdelkrim Ghaz","orcid":"https://orcid.org/0000-0002-7592-0464"},"institutions":[{"id":"https://openalex.org/I4210125514","display_name":"Universit\u00e9 Djilali de Sidi Bel Abb\u00e8s","ror":"https://ror.org/0378szg41","country_code":"DZ","type":"education","lineage":["https://openalex.org/I4210125514"]}],"countries":["DZ"],"is_corresponding":false,"raw_author_name":"Ghaz Abdelkrim","raw_affiliation_strings":["Djillali Liabes University,Communication Networks, Architectures and Multimedia Laboratory,Sidi Bel Abbes,Algeria","Communication Networks, Architectures and Multimedia Laboratory, Djillali Liabes University, Sidi Bel Abbes, Algeria"],"affiliations":[{"raw_affiliation_string":"Djillali Liabes University,Communication Networks, Architectures and Multimedia Laboratory,Sidi Bel Abbes,Algeria","institution_ids":["https://openalex.org/I4210125514"]},{"raw_affiliation_string":"Communication Networks, Architectures and Multimedia Laboratory, Djillali Liabes University, Sidi Bel Abbes, Algeria","institution_ids":["https://openalex.org/I4210125514"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5053031641"],"corresponding_institution_ids":["https://openalex.org/I4210125514"],"apc_list":null,"apc_paid":null,"fwci":0.4803,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.6498366,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":"31","issue":null,"first_page":"267","last_page":"272"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.7442483305931091},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7039333581924438},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.6791194677352905},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6597923040390015},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5770108103752136},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.49352729320526123},{"id":"https://openalex.org/keywords/discrete-wavelet-transform","display_name":"Discrete wavelet transform","score":0.47404906153678894},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.46875619888305664},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.44321489334106445},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4398100972175598},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.40868139266967773},{"id":"https://openalex.org/keywords/wavelet-transform","display_name":"Wavelet transform","score":0.3794668912887573},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3757237195968628},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3096127510070801},{"id":"https://openalex.org/keywords/wavelet","display_name":"Wavelet","score":0.20834359526634216}],"concepts":[{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.7442483305931091},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7039333581924438},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.6791194677352905},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6597923040390015},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5770108103752136},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.49352729320526123},{"id":"https://openalex.org/C46286280","wikidata":"https://www.wikidata.org/wiki/Q2414958","display_name":"Discrete wavelet transform","level":4,"score":0.47404906153678894},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.46875619888305664},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.44321489334106445},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4398100972175598},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.40868139266967773},{"id":"https://openalex.org/C196216189","wikidata":"https://www.wikidata.org/wiki/Q2867","display_name":"Wavelet transform","level":3,"score":0.3794668912887573},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3757237195968628},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3096127510070801},{"id":"https://openalex.org/C47432892","wikidata":"https://www.wikidata.org/wiki/Q831390","display_name":"Wavelet","level":2,"score":0.20834359526634216},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tsp52935.2021.9522620","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsp52935.2021.9522620","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 44th International Conference on Telecommunications and Signal Processing (TSP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W104683279","https://openalex.org/W201958777","https://openalex.org/W2031614119","https://openalex.org/W2082801743","https://openalex.org/W2108834246","https://openalex.org/W2127992341","https://openalex.org/W2133665775","https://openalex.org/W2156186849","https://openalex.org/W2495710757","https://openalex.org/W2499176554","https://openalex.org/W2520594535","https://openalex.org/W2545514196","https://openalex.org/W2596992873","https://openalex.org/W2792905960","https://openalex.org/W2798400304","https://openalex.org/W2947010490","https://openalex.org/W2966695073","https://openalex.org/W2968713182","https://openalex.org/W2991524589","https://openalex.org/W3020813630"],"related_works":["https://openalex.org/W2105130148","https://openalex.org/W2014129645","https://openalex.org/W2388747889","https://openalex.org/W1992692462","https://openalex.org/W2392711200","https://openalex.org/W2347997110","https://openalex.org/W2355956742","https://openalex.org/W2381740172","https://openalex.org/W2142144649","https://openalex.org/W2380250042"],"abstract_inverted_index":{"Sharing":[0],"a":[1,75],"secret":[2],"via":[3],"the":[4,90,107,115,128],"internet":[5],"needs":[6],"huge":[7],"protection":[8],"challenges":[9],"to":[10,45,105,113,126],"keep":[11],"it":[12],"in":[13,37,68,103],"clean":[14],"hands,":[15],"and":[16,27,97,109,112],"far":[17],"away":[18],"from":[19],"several":[20],"ways":[21],"of":[22,49,74,121],"maleficent":[23],"manipulations,":[24],"e.g.,":[25],"hacking":[26],"spying.":[28],"Nowadays,":[29],"experts":[30],"proposed":[31,57,129],"many":[32],"encryption":[33],"algorithms":[34],"that":[35,78],"work":[36],"spatial":[38],"domain":[39],"as":[40,42],"well":[41],"frequency":[43],"domain,":[44],"provide":[46],"certain":[47],"amount":[48],"privacy":[50],"for":[51],"this":[52],"public":[53],"network":[54],"navigators.":[55],"The":[56],"algorithm":[58,116],"is":[59,79,92,100],"about":[60],"embedding":[61],"an":[62],"encrypted":[63,93],"Electronic":[64],"Patient":[65],"Record":[66],"(EPR)":[67],"Discrete":[69,85],"Cosine":[70],"Transform":[71,87],"(DCT)":[72],"resultant":[73],"medical":[76],"image":[77],"decomposed":[80],"into":[81],"third":[82],"level":[83],"with":[84],"Wavelet":[86],"(DWT),":[88],"where":[89],"EPR":[91],"using":[94],"Elgamal":[95],"encryption,":[96],"Arnold":[98],"map":[99],"also":[101],"exerted":[102],"order":[104],"increase":[106],"randomness":[108],"unpredictability":[110],"levels":[111],"make":[114],"more":[117],"complex.":[118],"A":[119],"variety":[120],"tests":[122],"has":[123],"been":[124],"performed":[125],"prove":[127],"scheme":[130],"robustness.":[131]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
