{"id":"https://openalex.org/W4392982187","doi":"https://doi.org/10.1109/cvmi59935.2023.10464554","title":"Advanced Encryption Standard (AES) Based Robust Watermarking Scheme","display_name":"Advanced Encryption Standard (AES) Based Robust Watermarking Scheme","publication_year":2023,"publication_date":"2023-12-10","ids":{"openalex":"https://openalex.org/W4392982187","doi":"https://doi.org/10.1109/cvmi59935.2023.10464554"},"language":"en","primary_location":{"id":"doi:10.1109/cvmi59935.2023.10464554","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/cvmi59935.2023.10464554","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Conference on Computer Vision and Machine Intelligence (CVMI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074629782","display_name":"Deepak Rai","orcid":"https://orcid.org/0000-0002-7635-3801"},"institutions":[{"id":"https://openalex.org/I3129773123","display_name":"Bennett University","ror":"https://ror.org/00an5hx75","country_code":"IN","type":"education","lineage":["https://openalex.org/I3129773123"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Deepak Rai","raw_affiliation_strings":["School of CSE and Technology, Bennett University,Greater Noida,India","School of CSE and Technology, Bennett University, Greater Noida, India"],"raw_orcid":"https://orcid.org/0000-0002-7635-3801","affiliations":[{"raw_affiliation_string":"School of CSE and Technology, Bennett University,Greater Noida,India","institution_ids":["https://openalex.org/I3129773123"]},{"raw_affiliation_string":"School of CSE and Technology, Bennett University, Greater Noida, India","institution_ids":["https://openalex.org/I3129773123"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091167597","display_name":"Shyam Singh Rajput","orcid":"https://orcid.org/0000-0002-1244-7366"},"institutions":[{"id":"https://openalex.org/I11793825","display_name":"National Institute of Technology Patna","ror":"https://ror.org/056wyhh33","country_code":"IN","type":"education","lineage":["https://openalex.org/I11793825","https://openalex.org/I4210152752"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Shayam Singh Rajput","raw_affiliation_strings":["National Institute of Technology Patna,Department of CSE,Patna,India","Department of CSE, National Institute of Technology Patna, Patna, India"],"raw_orcid":"https://orcid.org/0000-0002-1244-7366","affiliations":[{"raw_affiliation_string":"National Institute of Technology Patna,Department of CSE,Patna,India","institution_ids":["https://openalex.org/I11793825"]},{"raw_affiliation_string":"Department of CSE, National Institute of Technology Patna, Patna, India","institution_ids":["https://openalex.org/I11793825"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055521846","display_name":"K. V. Arya","orcid":"https://orcid.org/0000-0001-7117-1745"},"institutions":[{"id":"https://openalex.org/I9747756","display_name":"Atal Bihari Vajpayee Indian Institute of Information Technology and Management","ror":"https://ror.org/008b3ap06","country_code":"IN","type":"education","lineage":["https://openalex.org/I9747756"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"K.V. Arya","raw_affiliation_strings":["ABV-IIITM Gwalior,Department of CSE,Gwalior,India","Department of CSE, ABV-IIITM Gwalior, Gwalior, India"],"raw_orcid":"https://orcid.org/0000-0001-7117-1745","affiliations":[{"raw_affiliation_string":"ABV-IIITM Gwalior,Department of CSE,Gwalior,India","institution_ids":["https://openalex.org/I9747756"]},{"raw_affiliation_string":"Department of CSE, ABV-IIITM Gwalior, Gwalior, India","institution_ids":["https://openalex.org/I9747756"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004117460","display_name":"Prince Pranav","orcid":null},"institutions":[{"id":"https://openalex.org/I11793825","display_name":"National Institute of Technology Patna","ror":"https://ror.org/056wyhh33","country_code":"IN","type":"education","lineage":["https://openalex.org/I11793825","https://openalex.org/I4210152752"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Prince Pranav","raw_affiliation_strings":["National Institute of Technology Patna,Department of CSE,Patna,India","Department of CSE, National Institute of Technology Patna, Patna, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"National Institute of Technology Patna,Department of CSE,Patna,India","institution_ids":["https://openalex.org/I11793825"]},{"raw_affiliation_string":"Department of CSE, National Institute of Technology Patna, Patna, India","institution_ids":["https://openalex.org/I11793825"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101781207","display_name":"Shikha Singh","orcid":"https://orcid.org/0000-0001-7949-5293"},"institutions":[{"id":"https://openalex.org/I11793825","display_name":"National Institute of Technology Patna","ror":"https://ror.org/056wyhh33","country_code":"IN","type":"education","lineage":["https://openalex.org/I11793825","https://openalex.org/I4210152752"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Shikha Singh","raw_affiliation_strings":["National Institute of Technology Patna,Department of CSE,Patna,India","Department of CSE, National Institute of Technology Patna, Patna, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"National Institute of Technology Patna,Department of CSE,Patna,India","institution_ids":["https://openalex.org/I11793825"]},{"raw_affiliation_string":"Department of CSE, National Institute of Technology Patna, Patna, India","institution_ids":["https://openalex.org/I11793825"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082190685","display_name":"Aditi Sinha","orcid":"https://orcid.org/0000-0002-9566-3370"},"institutions":[{"id":"https://openalex.org/I11793825","display_name":"National Institute of Technology Patna","ror":"https://ror.org/056wyhh33","country_code":"IN","type":"education","lineage":["https://openalex.org/I11793825","https://openalex.org/I4210152752"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Aditi Sinha","raw_affiliation_strings":["National Institute of Technology Patna,Department of CSE,Patna,India","Department of CSE, National Institute of Technology Patna, Patna, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"National Institute of Technology Patna,Department of CSE,Patna,India","institution_ids":["https://openalex.org/I11793825"]},{"raw_affiliation_string":"Department of CSE, National Institute of Technology Patna, Patna, India","institution_ids":["https://openalex.org/I11793825"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5074629782"],"corresponding_institution_ids":["https://openalex.org/I3129773123"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20695101,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"16","issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12707","display_name":"Vehicle License Plate Recognition","score":0.9886000156402588,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.982699990272522,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/advanced-encryption-standard","display_name":"Advanced Encryption Standard","score":0.8389265537261963},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7016789317131042},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.6953883171081543},{"id":"https://openalex.org/keywords/aes-implementations","display_name":"AES implementations","score":0.5423451662063599},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5398653149604797},{"id":"https://openalex.org/keywords/encryption-software","display_name":"Encryption software","score":0.4576108157634735},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.44179296493530273},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3224680721759796},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3095102310180664},{"id":"https://openalex.org/keywords/disk-encryption","display_name":"Disk encryption","score":0.22277694940567017},{"id":"https://openalex.org/keywords/multiple-encryption","display_name":"Multiple encryption","score":0.1985684633255005},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11391308903694153},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10155653953552246}],"concepts":[{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.8389265537261963},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7016789317131042},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.6953883171081543},{"id":"https://openalex.org/C46331935","wikidata":"https://www.wikidata.org/wiki/Q4651362","display_name":"AES implementations","level":4,"score":0.5423451662063599},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5398653149604797},{"id":"https://openalex.org/C158104961","wikidata":"https://www.wikidata.org/wiki/Q5375622","display_name":"Encryption software","level":5,"score":0.4576108157634735},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.44179296493530273},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3224680721759796},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3095102310180664},{"id":"https://openalex.org/C9368797","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"Disk encryption","level":4,"score":0.22277694940567017},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.1985684633255005},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11391308903694153},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10155653953552246},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cvmi59935.2023.10464554","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/cvmi59935.2023.10464554","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Conference on Computer Vision and Machine Intelligence (CVMI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W2007242835","https://openalex.org/W2050926144","https://openalex.org/W2118113978","https://openalex.org/W2158389917","https://openalex.org/W2355550369","https://openalex.org/W2785660980","https://openalex.org/W2790632460","https://openalex.org/W2809511564","https://openalex.org/W2885426244","https://openalex.org/W2899620715","https://openalex.org/W2944646475","https://openalex.org/W2946023385","https://openalex.org/W2972619690","https://openalex.org/W3035495511","https://openalex.org/W3098705456","https://openalex.org/W3160429871","https://openalex.org/W4214840246","https://openalex.org/W4283369599","https://openalex.org/W4288052270","https://openalex.org/W4312941553","https://openalex.org/W4317510592","https://openalex.org/W4320062362","https://openalex.org/W4320474970","https://openalex.org/W4320713398","https://openalex.org/W4321016065","https://openalex.org/W4321437105","https://openalex.org/W4362510712","https://openalex.org/W4378696897","https://openalex.org/W4383268712","https://openalex.org/W4386783379"],"related_works":["https://openalex.org/W2392288291","https://openalex.org/W3027054693","https://openalex.org/W2393941228","https://openalex.org/W2398445454","https://openalex.org/W2362007337","https://openalex.org/W3108355815","https://openalex.org/W2366987863","https://openalex.org/W2385743990","https://openalex.org/W2380791432","https://openalex.org/W1703859826"],"abstract_inverted_index":{"Digital":[0],"watermarking":[1,36,64,143],"is":[2,79,89,111],"a":[3,63,83,116,127],"widely":[4],"used":[5],"technique":[6,133],"for":[7,154],"embedding":[8,54],"information":[9],"into":[10,58],"digital":[11,19,156],"media":[12],"to":[13,23,38,82],"protect":[14],"intellectual":[15],"property":[16],"rights.":[17],"However,":[18],"watermarks":[20,157],"are":[21],"vulnerable":[22],"various":[24,138,159],"types":[25],"of":[26,45,85,100,106,118],"malicious":[27],"attacks.":[28,139],"In":[29],"this":[30],"paper,":[31],"we":[32],"propose":[33],"an":[34,46,149],"AES-based":[35,142],"scheme":[37,52,144],"further":[39],"improve":[40],"the":[41,55,59,69,73,92,98,101,131],"security":[42,107],"and":[43,66,87,108,113,151],"robustness":[44,136],"existing":[47],"watermark":[48,57,71],"technique.":[49],"The":[50,76,120,140],"proposed":[51,102,132,141],"involves":[53],"original":[56],"host":[60],"image":[61,78],"using":[62,72,91],"technique,":[65],"then":[67,80,88],"encrypting":[68],"embedded":[70],"AES":[74,94],"algorithm.":[75,95],"watermarked":[77],"subjected":[81],"series":[84],"attacks":[86],"decrypted":[90],"same":[93],"To":[96],"assess":[97],"performance":[99],"approach":[103],"in":[104,158],"terms":[105],"robustness,":[109],"it":[110],"implemented":[112],"tested":[114],"on":[115],"set":[117],"images.":[119],"experimental":[121],"findings":[122],"demonstrate":[123],"that,":[124],"while":[125],"maintaining":[126],"low":[128],"distortion":[129],"rate,":[130],"offers":[134],"high":[135],"against":[137],"can":[145],"be":[146],"considered":[147],"as":[148],"effective":[150],"secure":[152],"solution":[153],"protecting":[155],"applications.":[160]},"counts_by_year":[],"updated_date":"2025-12-25T23:11:45.687758","created_date":"2025-10-10T00:00:00"}
