{"id":"https://openalex.org/W2054513004","doi":"https://doi.org/10.1145/1128817.1128870","title":"Digital invisible ink","display_name":"Digital invisible ink","publication_year":2006,"publication_date":"2006-03-21","ids":{"openalex":"https://openalex.org/W2054513004","doi":"https://doi.org/10.1145/1128817.1128870","mag":"2054513004"},"language":"en","primary_location":{"id":"doi:10.1145/1128817.1128870","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1128817.1128870","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2006 ACM Symposium on Information, computer and communications security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109166990","display_name":"Chun-Hsiang Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I16733864","display_name":"National Taiwan University","ror":"https://ror.org/05bqach95","country_code":"TW","type":"education","lineage":["https://openalex.org/I16733864"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Chun-Hsiang Huang","raw_affiliation_strings":["National Taiwan University","National Taiwan University > > > > > >"],"affiliations":[{"raw_affiliation_string":"National Taiwan University","institution_ids":["https://openalex.org/I16733864"]},{"raw_affiliation_string":"National Taiwan University > > > > > >","institution_ids":["https://openalex.org/I16733864"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100812956","display_name":"Yu-Feng Kuo","orcid":null},"institutions":[{"id":"https://openalex.org/I16733864","display_name":"National Taiwan University","ror":"https://ror.org/05bqach95","country_code":"TW","type":"education","lineage":["https://openalex.org/I16733864"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Yu-Feng Kuo","raw_affiliation_strings":["National Taiwan University","National Taiwan University > > > > > >"],"affiliations":[{"raw_affiliation_string":"National Taiwan University","institution_ids":["https://openalex.org/I16733864"]},{"raw_affiliation_string":"National Taiwan University > > > > > >","institution_ids":["https://openalex.org/I16733864"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050840236","display_name":"Ja\u2010Ling Wu","orcid":"https://orcid.org/0000-0002-3631-1551"},"institutions":[{"id":"https://openalex.org/I16733864","display_name":"National Taiwan University","ror":"https://ror.org/05bqach95","country_code":"TW","type":"education","lineage":["https://openalex.org/I16733864"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Ja-Ling Wu","raw_affiliation_strings":["National Taiwan University","National Taiwan University > > > > > >"],"affiliations":[{"raw_affiliation_string":"National Taiwan University","institution_ids":["https://openalex.org/I16733864"]},{"raw_affiliation_string":"National Taiwan University > > > > > >","institution_ids":["https://openalex.org/I16733864"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5109166990"],"corresponding_institution_ids":["https://openalex.org/I16733864"],"apc_list":null,"apc_paid":null,"fwci":0.3114,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.59254171,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"355","last_page":"355"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.8942686915397644},{"id":"https://openalex.org/keywords/supervisor","display_name":"Supervisor","score":0.7217181324958801},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.6856858134269714},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.6804269552230835},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6768412590026855},{"id":"https://openalex.org/keywords/quantization","display_name":"Quantization (signal processing)","score":0.5617609620094299},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5347570180892944},{"id":"https://openalex.org/keywords/inkwell","display_name":"Inkwell","score":0.5051875710487366},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.47114649415016174},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.35134434700012207},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.33708569407463074},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.28679168224334717},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.17889606952667236},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.13406097888946533},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1006404459476471}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.8942686915397644},{"id":"https://openalex.org/C2779110517","wikidata":"https://www.wikidata.org/wiki/Q1240788","display_name":"Supervisor","level":2,"score":0.7217181324958801},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.6856858134269714},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.6804269552230835},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6768412590026855},{"id":"https://openalex.org/C28855332","wikidata":"https://www.wikidata.org/wiki/Q198099","display_name":"Quantization (signal processing)","level":2,"score":0.5617609620094299},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5347570180892944},{"id":"https://openalex.org/C109693293","wikidata":"https://www.wikidata.org/wiki/Q1496072","display_name":"Inkwell","level":2,"score":0.5051875710487366},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.47114649415016174},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.35134434700012207},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33708569407463074},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.28679168224334717},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.17889606952667236},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.13406097888946533},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1006404459476471},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1128817.1128870","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1128817.1128870","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2006 ACM Symposium on Information, computer and communications security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320313655","display_name":"Foundation for Research, Science and Technology","ror":null},{"id":"https://openalex.org/F4320321040","display_name":"National Science Council","ror":"https://ror.org/02kv4zf79"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2137394636","https://openalex.org/W2358993821","https://openalex.org/W1516446231","https://openalex.org/W2098152888","https://openalex.org/W1559740347","https://openalex.org/W2040356834","https://openalex.org/W2080353903","https://openalex.org/W2385289568","https://openalex.org/W2381486749","https://openalex.org/W1514507288"],"abstract_inverted_index":{"A":[0],"novel":[1],"steganographic":[2],"approach":[3,71],"analogy":[4],"to":[5,56,110],"the":[6,31,42,57,67,89,97,111,118,124,135],"real-world":[7],"secret":[8,13,93,114],"communication":[9,115],"mechanism,":[10],"in":[11],"which":[12],"messages":[14,94],"are":[15,27,33,82,108],"written":[16],"on":[17,73],"white":[18],"papers":[19,32],"using":[20],"invisible":[21],"ink":[22],"like":[23],"lemon":[24],"juice":[25],"and":[26,63,78,100,130],"revealed":[28],"only":[29],"after":[30],"heated,":[34],"is":[35],"proposed.":[36],"Carefully-designed":[37],"informed":[38],"embedders":[39],"now":[40],"play":[41],"role":[43],"of":[44,66],"\"invisible":[45],"ink\";":[46],"some":[47],"pre-negotiated":[48],"attacks":[49],"provided":[50],"by":[51],"common":[52],"content-processing":[53],"tools":[54],"correspond":[55],"required":[58],"\"heating\"":[59],"process.":[60],"Theoretic":[61],"models":[62],"feasible":[64],"implementations":[65],"proposed":[68,85,119],"digital-invisible-ink":[69],"watermarking":[70,77,80],"based":[72],"both":[74],"blind-detection":[75],"spread-spectrum":[76],"quantization":[79],"schemes":[81,86],"provided.":[83],"The":[84],"can":[87,121],"prevent":[88],"supervisor":[90,126],"from":[91],"interpreting":[92],"even":[95],"when":[96],"watermark":[98],"extractor":[99],"decryption":[101],"tool,":[102],"as":[103,105],"well":[104],"session":[106],"keys,":[107],"available":[109],"supervisor.":[112],"Furthermore,":[113],"systems":[116],"employing":[117],"scheme":[120],"aggressively":[122],"mislead":[123],"channel":[125],"with":[127],"fake":[128],"watermarks":[129],"transmit":[131],"genuine":[132],"secrets":[133],"at":[134],"same":[136],"time.":[137]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
