{"id":"https://openalex.org/W2409389744","doi":"https://doi.org/10.1109/iccsce.2015.7482218","title":"Printout verification using a new image hash algorithm based on Radon, Wavelet, and Fast Fourier transforms","display_name":"Printout verification using a new image hash algorithm based on Radon, Wavelet, and Fast Fourier transforms","publication_year":2015,"publication_date":"2015-11-01","ids":{"openalex":"https://openalex.org/W2409389744","doi":"https://doi.org/10.1109/iccsce.2015.7482218","mag":"2409389744"},"language":"en","primary_location":{"id":"doi:10.1109/iccsce.2015.7482218","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccsce.2015.7482218","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE International Conference on Control System, Computing and Engineering (ICCSCE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004876421","display_name":"Paradorn Athichitsakul","orcid":null},"institutions":[{"id":"https://openalex.org/I158708052","display_name":"Chulalongkorn University","ror":"https://ror.org/028wp3y58","country_code":"TH","type":"education","lineage":["https://openalex.org/I158708052"]}],"countries":["TH"],"is_corresponding":true,"raw_author_name":"Paradorn Athichitsakul","raw_affiliation_strings":["Department of Mathematics and Computer Science, Chulalongkorn University, Bangkok, Thailand"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Chulalongkorn University, Bangkok, Thailand","institution_ids":["https://openalex.org/I158708052"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028724616","display_name":"Suphakant Phimoltares","orcid":"https://orcid.org/0000-0002-4352-1864"},"institutions":[{"id":"https://openalex.org/I158708052","display_name":"Chulalongkorn University","ror":"https://ror.org/028wp3y58","country_code":"TH","type":"education","lineage":["https://openalex.org/I158708052"]}],"countries":["TH"],"is_corresponding":false,"raw_author_name":"Suphakant Phimoltares","raw_affiliation_strings":["Department of Mathematics and Computer Science, Chulalongkorn University, Bangkok, Thailand"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Chulalongkorn University, Bangkok, Thailand","institution_ids":["https://openalex.org/I158708052"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080645829","display_name":"Atchara Mahaweerawat","orcid":null},"institutions":[{"id":"https://openalex.org/I58196637","display_name":"Ramkhamhaeng University","ror":"https://ror.org/00mrw8k38","country_code":"TH","type":"education","lineage":["https://openalex.org/I58196637"]}],"countries":["TH"],"is_corresponding":false,"raw_author_name":"Atchara Mahaweerawat","raw_affiliation_strings":["Department of Computer Science, Ramkhamhaeng University, Bangkok, Thailand"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Ramkhamhaeng University, Bangkok, Thailand","institution_ids":["https://openalex.org/I58196637"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5004876421"],"corresponding_institution_ids":["https://openalex.org/I158708052"],"apc_list":null,"apc_paid":null,"fwci":0.20873662,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.645335,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"11","issue":null,"first_page":"395","last_page":"400"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10627","display_name":"Advanced Image and Video Retrieval Techniques","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7970657348632812},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.7400217056274414},{"id":"https://openalex.org/keywords/feature-hashing","display_name":"Feature hashing","score":0.6622284054756165},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.517428457736969},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.5148293375968933},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.4472879469394684},{"id":"https://openalex.org/keywords/wavelet","display_name":"Wavelet","score":0.43979835510253906},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3682594895362854},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3669884502887726},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3661075830459595},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.36338651180267334},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.32723167538642883},{"id":"https://openalex.org/keywords/double-hashing","display_name":"Double hashing","score":0.15305635333061218},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.11730918288230896}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7970657348632812},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.7400217056274414},{"id":"https://openalex.org/C133667856","wikidata":"https://www.wikidata.org/wiki/Q5439682","display_name":"Feature hashing","level":5,"score":0.6622284054756165},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.517428457736969},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.5148293375968933},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.4472879469394684},{"id":"https://openalex.org/C47432892","wikidata":"https://www.wikidata.org/wiki/Q831390","display_name":"Wavelet","level":2,"score":0.43979835510253906},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3682594895362854},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3669884502887726},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3661075830459595},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.36338651180267334},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.32723167538642883},{"id":"https://openalex.org/C138111711","wikidata":"https://www.wikidata.org/wiki/Q478351","display_name":"Double hashing","level":4,"score":0.15305635333061218},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.11730918288230896}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccsce.2015.7482218","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccsce.2015.7482218","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE International Conference on Control System, Computing and Engineering (ICCSCE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6399999856948853,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W35660749","https://openalex.org/W1509633120","https://openalex.org/W1568572680","https://openalex.org/W1647732624","https://openalex.org/W1950989567","https://openalex.org/W1973040917","https://openalex.org/W1998847659","https://openalex.org/W2026569173","https://openalex.org/W2089981451","https://openalex.org/W2092103303","https://openalex.org/W2114550641","https://openalex.org/W2115247187","https://openalex.org/W2119559185","https://openalex.org/W2126554342","https://openalex.org/W2138943674","https://openalex.org/W2153809950","https://openalex.org/W2185917628","https://openalex.org/W2188443842","https://openalex.org/W3139628049","https://openalex.org/W6630577039","https://openalex.org/W6634129627","https://openalex.org/W6686858752","https://openalex.org/W6687169367"],"related_works":["https://openalex.org/W2886054806","https://openalex.org/W2157568185","https://openalex.org/W1674074891","https://openalex.org/W1487949331","https://openalex.org/W1987209102","https://openalex.org/W2613610283","https://openalex.org/W2949619078","https://openalex.org/W2242320573","https://openalex.org/W3001987467","https://openalex.org/W2010706134"],"abstract_inverted_index":{"Certificate":[0],"and":[1,85,116,126,167,190],"document":[2,12,65,83],"issuing":[3],"processes":[4],"are":[5],"often":[6],"in":[7,183],"a":[8,14,74,87],"form":[9],"of":[10,21,104,124,129,154,185],"printing":[11,30,53],"to":[13,81,96,120,140,160],"paper.":[15],"Some":[16],"might":[17],"improve":[18],"the":[19,135,171],"trustworthiness":[20],"their":[22,130],"paper":[23,27],"via":[24],"using":[25,77,108],"secure":[26,29,52],"or":[28,147],"method":[31],"such":[32,144,164],"as":[33,145,165],"watermark,":[34],"hologram":[35],"etc.":[36],"The":[37,101],"interesting":[38],"problem":[39],"is":[40,45,94,107,138,158],"that":[41],"this":[42,72,98,105],"security":[43,75],"mechanism":[44],"not":[46],"enough":[47],"because":[48],"nowadays":[49],"printer":[50],"with":[51],"module":[54],"can":[55,66],"be":[56,67],"obtained":[57],"easier":[58],"than":[59],"before,":[60],"which":[61],"means":[62],"reproducing":[63],"counterfeit":[64],"done":[68],"uncomplicatedly.":[69],"To":[70],"solve":[71],"problem,":[73],"framework":[76,106],"image":[78,109,168,180],"hashing":[79,110,181],"function":[80],"capture":[82,121],"fingerprint":[84,99],"perform":[86],"digital":[88],"signature":[89],"based":[90,112],"on":[91,113],"PKI-enabled":[92],"infrastructures":[93],"proposed":[95,136,175],"guarantee":[97],"integrity.":[100],"key":[102],"component":[103],"algorithm":[111,137],"Radon,":[114],"Wavelet":[115],"Fast":[117],"Fourier":[118],"transforms":[119],"perceptual":[122],"appearance":[123],"printout":[125],"verify":[127],"integrity":[128],"document.":[131],"Hash":[132],"value":[133],"from":[134],"invariant":[139],"some":[141,148,161],"unintentional":[142],"factors":[143],"noise":[146],"duplication":[149],"process":[150],"without":[151],"any":[152],"change":[153],"content":[155],"while":[156],"it":[157],"robust":[159],"intentional":[162],"attacks":[163],"text":[166],"editing.":[169],"With":[170],"experimental":[172],"results,":[173],"our":[174],"scheme":[176],"outperforms":[177],"other":[178],"existing":[179],"algorithms":[182],"terms":[184],"both":[186],"false":[187,191],"acceptance":[188],"rate":[189],"rejection":[192],"rate.":[193]},"counts_by_year":[{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
