{"id":"https://openalex.org/W2057339428","doi":"https://doi.org/10.1145/1551722.1551731","title":"Security in collaborative multimedia art communities","display_name":"Security in collaborative multimedia art communities","publication_year":2009,"publication_date":"2009-06-03","ids":{"openalex":"https://openalex.org/W2057339428","doi":"https://doi.org/10.1145/1551722.1551731","mag":"2057339428"},"language":"en","primary_location":{"id":"doi:10.1145/1551722.1551731","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1551722.1551731","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2009 Euro American Conference on Telematics and Information Systems: New Opportunities to increase Digital Citizenship","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037888697","display_name":"Dimitrios Koukopoulos","orcid":"https://orcid.org/0000-0001-7019-4224"},"institutions":[{"id":"https://openalex.org/I194019607","display_name":"University of Ioannina","ror":"https://ror.org/01qg3j183","country_code":"GR","type":"education","lineage":["https://openalex.org/I194019607"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Dimitrios Koukopoulos","raw_affiliation_strings":["University of Ioannina, Greece"],"affiliations":[{"raw_affiliation_string":"University of Ioannina, Greece","institution_ids":["https://openalex.org/I194019607"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026929474","display_name":"Georgios Styliaras","orcid":"https://orcid.org/0000-0002-4799-4626"},"institutions":[{"id":"https://openalex.org/I194019607","display_name":"University of Ioannina","ror":"https://ror.org/01qg3j183","country_code":"GR","type":"education","lineage":["https://openalex.org/I194019607"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Georgios D. Styliaras","raw_affiliation_strings":["University of Ioannina, Greece"],"affiliations":[{"raw_affiliation_string":"University of Ioannina, Greece","institution_ids":["https://openalex.org/I194019607"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5037888697"],"corresponding_institution_ids":["https://openalex.org/I194019607"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10725279,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9861999750137329,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.8954583406448364},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.883354663848877},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8138618469238281},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.6213201284408569},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6087099313735962},{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.5626991987228394},{"id":"https://openalex.org/keywords/digital-content","display_name":"Digital content","score":0.5066636204719543},{"id":"https://openalex.org/keywords/digital-rights-management","display_name":"Digital rights management","score":0.4929158687591553},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.48530763387680054},{"id":"https://openalex.org/keywords/digital-watermarking-alliance","display_name":"Digital Watermarking Alliance","score":0.4720990061759949},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.4654128849506378},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41418805718421936},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3516819477081299},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.19179970026016235},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.1639145016670227},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.08455294370651245}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.8954583406448364},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.883354663848877},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8138618469238281},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.6213201284408569},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6087099313735962},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.5626991987228394},{"id":"https://openalex.org/C2779344036","wikidata":"https://www.wikidata.org/wiki/Q11320476","display_name":"Digital content","level":2,"score":0.5066636204719543},{"id":"https://openalex.org/C537843408","wikidata":"https://www.wikidata.org/wiki/Q192532","display_name":"Digital rights management","level":2,"score":0.4929158687591553},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.48530763387680054},{"id":"https://openalex.org/C193470923","wikidata":"https://www.wikidata.org/wiki/Q5276026","display_name":"Digital Watermarking Alliance","level":4,"score":0.4720990061759949},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.4654128849506378},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41418805718421936},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3516819477081299},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.19179970026016235},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.1639145016670227},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08455294370651245},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1551722.1551731","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1551722.1551731","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2009 Euro American Conference on Telematics and Information Systems: New Opportunities to increase Digital Citizenship","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4099999964237213,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W272982077","https://openalex.org/W1620410031","https://openalex.org/W1866211121","https://openalex.org/W1999631291","https://openalex.org/W2011039300","https://openalex.org/W2015490566","https://openalex.org/W2027845481","https://openalex.org/W2037634652","https://openalex.org/W2044322805","https://openalex.org/W2049598282","https://openalex.org/W2076591675","https://openalex.org/W2081454631","https://openalex.org/W2094235786","https://openalex.org/W2101433093","https://openalex.org/W2113557940","https://openalex.org/W2166756952","https://openalex.org/W2523075671","https://openalex.org/W4285719527","https://openalex.org/W6636690859","https://openalex.org/W6639302789"],"related_works":["https://openalex.org/W2035925886","https://openalex.org/W2121604643","https://openalex.org/W2978164681","https://openalex.org/W2501026370","https://openalex.org/W2064193056","https://openalex.org/W4235338517","https://openalex.org/W3168409739","https://openalex.org/W2183994037","https://openalex.org/W1585580422","https://openalex.org/W2084325986"],"abstract_inverted_index":{"We":[0],"propose":[1],"a":[2,47,69,78,122,146,149,152],"system":[3,23,134],"for":[4],"organizing":[5],"the":[6,9,16,82,88,90,96,106,111,118,128],"creation":[7],"and":[8,20,32,39,60],"interaction":[10],"in":[11,27,42,65,159],"multimedia":[12,28,43,66,97,136],"environments":[13],"that":[14,63,84,109,117,155],"permit":[15],"collaboration":[17],"among":[18],"artists":[19],"audience.":[21],"This":[22],"approaches":[24],"security":[25],"issues":[26,62],"content":[29,137],"performing":[30],"authorization":[31],"watermarking":[33,56,157],"mechanisms.":[34],"Authorization":[35],"mechanism":[36,57],"controls":[37],"artist":[38],"audience":[40],"operations":[41],"files":[44],"based":[45],"on":[46,52,81],"set":[48],"of":[49,76,95,127,132,148],"actions":[50],"imposed":[51],"real-life":[53],"scenarios.":[54],"Digital":[55],"handles":[58],"copyright-protection":[59],"authentication":[61],"appear":[64],"systems":[67],"applying":[68],"semantically":[70],"secure":[71],"watermark.":[72,129],"The":[73,130],"main":[74],"contribution":[75],"such":[77],"watermark":[79,112],"relies":[80],"fact":[83],"it":[85],"gives":[86],"to":[87,100,124],"users":[89],"enhanced":[91],"capability":[92],"their":[93],"ownership":[94],"file":[98],"not":[99,138],"be":[101],"accomplished":[102],"simply":[103],"by":[104,115],"detecting":[105],"bit":[107],"pattern":[108],"comprises":[110],"itself,":[113],"but":[114,144],"showing":[116],"legal":[119],"owner":[120],"knows":[121],"hard":[123],"compute":[125],"property":[126],"strength":[131],"our":[133],"considers":[135],"as":[139,145],"an":[140],"atomic":[141],"digital":[142],"entity,":[143],"part":[147],"project":[150],"with":[151],"specific":[153],"workflow":[154],"applies":[156],"techniques":[158],"all":[160],"its":[161],"parts.":[162]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
