{"id":"https://openalex.org/W2094609186","doi":"https://doi.org/10.1117/1.3327935","title":"Security of ownership watermarking of digital images based on singular value decomposition","display_name":"Security of ownership watermarking of digital images based on singular value decomposition","publication_year":2010,"publication_date":"2010-01-01","ids":{"openalex":"https://openalex.org/W2094609186","doi":"https://doi.org/10.1117/1.3327935","mag":"2094609186"},"language":"en","primary_location":{"id":"doi:10.1117/1.3327935","is_oa":false,"landing_page_url":"https://doi.org/10.1117/1.3327935","pdf_url":null,"source":{"id":"https://openalex.org/S158511090","display_name":"Journal of Electronic Imaging","issn_l":"1017-9909","issn":["1017-9909","1560-229X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310315543","host_organization_name":"SPIE","host_organization_lineage":["https://openalex.org/P4310315543"],"host_organization_lineage_names":["SPIE"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Electronic Imaging","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068334920","display_name":"Khaled Loukhaoukha","orcid":"https://orcid.org/0000-0002-9000-4210"},"institutions":[{"id":"https://openalex.org/I43406934","display_name":"Universit\u00e9 Laval","ror":"https://ror.org/04sjchr03","country_code":"CA","type":"education","lineage":["https://openalex.org/I43406934"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Khaled Loukhaoukha","raw_affiliation_strings":["Univ. Laval (Canada)","Laval University, Department of Electrical and Computer Engineering, G1K 7P4, Quebec, Canada"],"affiliations":[{"raw_affiliation_string":"Univ. Laval (Canada)","institution_ids":["https://openalex.org/I43406934"]},{"raw_affiliation_string":"Laval University, Department of Electrical and Computer Engineering, G1K 7P4, Quebec, Canada","institution_ids":["https://openalex.org/I43406934"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5068334920"],"corresponding_institution_ids":["https://openalex.org/I43406934"],"apc_list":null,"apc_paid":null,"fwci":2.231,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.89139366,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"19","issue":"1","first_page":"013007","last_page":"013007"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.9894999861717224,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.9573220014572144},{"id":"https://openalex.org/keywords/singular-value-decomposition","display_name":"Singular value decomposition","score":0.9343212842941284},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.8023415803909302},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5907819271087646},{"id":"https://openalex.org/keywords/singular-value","display_name":"Singular value","score":0.521224856376648},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.5180511474609375},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5052817463874817},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4655955731868744},{"id":"https://openalex.org/keywords/image-quality","display_name":"Image quality","score":0.42310088872909546},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.42232686281204224},{"id":"https://openalex.org/keywords/digital-image","display_name":"Digital image","score":0.4166598916053772},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4022657871246338},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.36408838629722595},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3541867733001709},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3429378271102905},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.29030507802963257},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24837303161621094}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.9573220014572144},{"id":"https://openalex.org/C22789450","wikidata":"https://www.wikidata.org/wiki/Q420904","display_name":"Singular value decomposition","level":2,"score":0.9343212842941284},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.8023415803909302},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5907819271087646},{"id":"https://openalex.org/C109282560","wikidata":"https://www.wikidata.org/wiki/Q4166054","display_name":"Singular value","level":3,"score":0.521224856376648},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.5180511474609375},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5052817463874817},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4655955731868744},{"id":"https://openalex.org/C55020928","wikidata":"https://www.wikidata.org/wiki/Q3813865","display_name":"Image quality","level":3,"score":0.42310088872909546},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.42232686281204224},{"id":"https://openalex.org/C42781572","wikidata":"https://www.wikidata.org/wiki/Q1250322","display_name":"Digital image","level":4,"score":0.4166598916053772},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4022657871246338},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.36408838629722595},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3541867733001709},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3429378271102905},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.29030507802963257},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24837303161621094},{"id":"https://openalex.org/C158693339","wikidata":"https://www.wikidata.org/wiki/Q190524","display_name":"Eigenvalues and eigenvectors","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1117/1.3327935","is_oa":false,"landing_page_url":"https://doi.org/10.1117/1.3327935","pdf_url":null,"source":{"id":"https://openalex.org/S158511090","display_name":"Journal of Electronic Imaging","issn_l":"1017-9909","issn":["1017-9909","1560-229X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310315543","host_organization_name":"SPIE","host_organization_lineage":["https://openalex.org/P4310315543"],"host_organization_lineage_names":["SPIE"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Electronic Imaging","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1974476849","https://openalex.org/W2018639540","https://openalex.org/W2040277151","https://openalex.org/W2064520788","https://openalex.org/W2070586195","https://openalex.org/W2076997498","https://openalex.org/W2091717040","https://openalex.org/W2106154558","https://openalex.org/W2118305204","https://openalex.org/W2126315928","https://openalex.org/W2131559909","https://openalex.org/W2137394636","https://openalex.org/W2168725090","https://openalex.org/W2583184779","https://openalex.org/W2954308206","https://openalex.org/W4239883254"],"related_works":["https://openalex.org/W2358993821","https://openalex.org/W1516446231","https://openalex.org/W2098152888","https://openalex.org/W1559740347","https://openalex.org/W2040356834","https://openalex.org/W2385289568","https://openalex.org/W2381486749","https://openalex.org/W1514507288","https://openalex.org/W2137394636","https://openalex.org/W2389681530"],"abstract_inverted_index":{"Recently":[0],"watermarking":[1,17,33,57,82,101],"algorithms":[2],"of":[3,67,71,78,99],"digital":[4],"images":[5,34],"based":[6],"on":[7],"singular":[8,20,40],"value":[9],"decomposition":[10],"(SVD)":[11],"have":[12],"been":[13,52],"proposed.":[14],"Most":[15],"SVD-based":[16,28,56,81],"techniques":[18,29],"use":[19],"values":[21,41],"as":[22,59],"the":[23,39,46,96],"embedding":[24],"watermark":[25],"information.":[26],"These":[27],"are":[30,88],"advantageous":[31],"for":[32],"since":[35],"slight":[36],"changes":[37],"in":[38],"do":[42],"not":[43],"significantly":[44],"affect":[45],"image":[47],"quality.":[48],"However,":[49],"it":[50],"has":[51],"reported":[53],"that":[54],"these":[55,100],"algorithms,":[58],"implemented,":[60],"suffer":[61],"from":[62],"a":[63],"very":[64],"high":[65],"probability":[66],"false":[68,74],"positive":[69,75],"detections":[70],"watermarks.":[72],"The":[73],"detection":[76],"vulnerability":[77,93],"two":[79],"recent":[80],"schemes":[83],"is":[84],"exposed.":[85],"Two":[86],"solutions":[87],"proposed":[89],"to":[90],"mitigate":[91],"this":[92],"without":[94],"changing":[95],"design":[97],"principle":[98],"algorithms.":[102]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
