{"id":"https://openalex.org/W2054002195","doi":"https://doi.org/10.1145/2108616.2108636","title":"A novel color palette image authentication scheme","display_name":"A novel color palette image authentication scheme","publication_year":2010,"publication_date":"2010-01-14","ids":{"openalex":"https://openalex.org/W2054002195","doi":"https://doi.org/10.1145/2108616.2108636","mag":"2054002195"},"language":"en","primary_location":{"id":"doi:10.1145/2108616.2108636","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2108616.2108636","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th International Conference on Uniquitous Information Management and Communication","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112185358","display_name":"Ruey-Ming Chao","orcid":null},"institutions":[{"id":"https://openalex.org/I125934054","display_name":"National United University","ror":"https://ror.org/04twccc71","country_code":"TW","type":"education","lineage":["https://openalex.org/I125934054"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Ruey-Ming Chao","raw_affiliation_strings":["National United University, Lienda, Miaoli, Taiwan, R. O. C","National United University, Lienda, Miaoli, Taiwan, R. O. C.#TAB#"],"affiliations":[{"raw_affiliation_string":"National United University, Lienda, Miaoli, Taiwan, R. O. C","institution_ids":[]},{"raw_affiliation_string":"National United University, Lienda, Miaoli, Taiwan, R. O. C.#TAB#","institution_ids":["https://openalex.org/I125934054"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101468503","display_name":"Ching-Hao Lai","orcid":"https://orcid.org/0000-0001-9488-1598"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ching-Hao Lai","raw_affiliation_strings":["National Chung-Hsing University, Kuo-Kuang Road, Taichung City, Taiwan, R. O. C"],"affiliations":[{"raw_affiliation_string":"National Chung-Hsing University, Kuo-Kuang Road, Taichung City, Taiwan, R. O. C","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035407113","display_name":"Hsien-Chu Wu","orcid":"https://orcid.org/0000-0002-4313-9585"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hsien-Chu Wu","raw_affiliation_strings":["National Taichung Institute of Technology, Taichung, Taiwan, R. O. C"],"affiliations":[{"raw_affiliation_string":"National Taichung Institute of Technology, Taichung, Taiwan, R. O. C","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5112185358"],"corresponding_institution_ids":["https://openalex.org/I125934054"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13442329,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/palette","display_name":"Palette (painting)","score":0.9287734627723694},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6409671306610107},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6285962462425232},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.5881699323654175},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.571959912776947},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.5192399024963379},{"id":"https://openalex.org/keywords/color-image","display_name":"Color image","score":0.4811728894710541},{"id":"https://openalex.org/keywords/distortion","display_name":"Distortion (music)","score":0.4434952139854431},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.43462181091308594},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4288100302219391},{"id":"https://openalex.org/keywords/high-color","display_name":"High color","score":0.415241539478302},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.4110051393508911},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3368775248527527},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2271592915058136},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.1918586790561676},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.07205075025558472}],"concepts":[{"id":"https://openalex.org/C2779674283","wikidata":"https://www.wikidata.org/wiki/Q425548","display_name":"Palette (painting)","level":2,"score":0.9287734627723694},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6409671306610107},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6285962462425232},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.5881699323654175},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.571959912776947},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.5192399024963379},{"id":"https://openalex.org/C142616399","wikidata":"https://www.wikidata.org/wiki/Q5148604","display_name":"Color image","level":4,"score":0.4811728894710541},{"id":"https://openalex.org/C126780896","wikidata":"https://www.wikidata.org/wiki/Q899871","display_name":"Distortion (music)","level":4,"score":0.4434952139854431},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.43462181091308594},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4288100302219391},{"id":"https://openalex.org/C131910990","wikidata":"https://www.wikidata.org/wiki/Q1202284","display_name":"High color","level":5,"score":0.415241539478302},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.4110051393508911},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3368775248527527},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2271592915058136},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.1918586790561676},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.07205075025558472},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C194257627","wikidata":"https://www.wikidata.org/wiki/Q211554","display_name":"Amplifier","level":3,"score":0.0},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2108616.2108636","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2108616.2108636","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th International Conference on Uniquitous Information Management and Communication","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W1492605864","https://openalex.org/W1509833025","https://openalex.org/W1522699374","https://openalex.org/W1526705356","https://openalex.org/W1671708284","https://openalex.org/W1964777196","https://openalex.org/W1979082767","https://openalex.org/W1980911770","https://openalex.org/W1990935757","https://openalex.org/W2029670419","https://openalex.org/W2041560266","https://openalex.org/W2042294620","https://openalex.org/W2048125494","https://openalex.org/W2073449274","https://openalex.org/W2075070051","https://openalex.org/W2085762706","https://openalex.org/W2092384105","https://openalex.org/W2095907540","https://openalex.org/W2099945855","https://openalex.org/W2105770740","https://openalex.org/W2110805960","https://openalex.org/W2121036560","https://openalex.org/W2121393355","https://openalex.org/W2123218196","https://openalex.org/W2123268762","https://openalex.org/W2124890704","https://openalex.org/W2132089028","https://openalex.org/W2135459805","https://openalex.org/W2137288380","https://openalex.org/W2137694319","https://openalex.org/W2143264331","https://openalex.org/W2145642128","https://openalex.org/W2146727736","https://openalex.org/W2164204811","https://openalex.org/W6674604160","https://openalex.org/W6675685989","https://openalex.org/W6678404830"],"related_works":["https://openalex.org/W1512373895","https://openalex.org/W2359773540","https://openalex.org/W4327926797","https://openalex.org/W2141372244","https://openalex.org/W1669086842","https://openalex.org/W4294068482","https://openalex.org/W2795318091","https://openalex.org/W2062005526","https://openalex.org/W2546423525","https://openalex.org/W2155762717"],"abstract_inverted_index":{"In":[0],"this":[1,118],"paper,":[2],"a":[3,17,116,135,161],"digital":[4],"fragile":[5],"watermarking":[6],"technique":[7,22],"is":[8,23,43],"proposed":[9],"to":[10,29,40,110,168],"aim":[11],"for":[12,158],"protecting":[13],"the":[14,26,31,34,38,54,59,68,77,81,85,95,104,111,124,130,144,147,150,163,170,173],"content":[15],"of":[16,33,80,120,172],"color":[18,60,82,106],"palette":[19,27,83],"image.":[20],"This":[21],"based":[24],"on":[25,58],"clustering":[28,55],"facilitate":[30],"authentication":[32,70,151],"image":[35,39,131,137,175],"integrity.":[36],"First,":[37],"be":[41,156,166],"protected":[42],"partitioned":[44],"into":[45,76],"non-overlapped":[46],"blocks":[47],"where":[48],"block":[49,63],"features":[50,64],"are":[51,65,73],"calculated":[52],"by":[53,99],"information":[56,152],"conducted":[57],"palette.":[61],"The":[62],"considered":[66],"as":[67,176,178],"unique":[69],"information,":[71],"which":[72,102,122,183],"later":[74],"embedded":[75,154],"index":[78,97],"values":[79],"using":[84],"least":[86],"significant":[87],"bit":[88],"(LSB)":[89],"substitution":[90,126],"technique.":[91],"Finally,":[92],"we":[93],"replace":[94],"original":[96],"value":[98],"another":[100],"one":[101],"holds":[103],"closest":[105],"appearance":[107],"and":[108,133],"belongs":[109],"same":[112],"cluster":[113],"group.":[114],"As":[115,160],"result,":[117],"kind":[119],"replacement,":[121],"supersedes":[123],"LSB":[125],"technique,":[127],"significantly":[128],"decreases":[129],"distortion":[132],"produces":[134],"watermarked":[136,148,174],"with":[138],"high":[139],"visual":[140],"quality.":[141],"Obviously,":[142],"when":[143],"receiver":[145,164],"acquires":[146],"image,":[149],"being":[153],"can":[155],"extracted":[157],"comparison.":[159],"consequence,":[162],"will":[165],"able":[167],"verify":[169],"integrity":[171],"well":[177],"identify":[179],"any":[180],"possible":[181],"area":[182],"has":[184],"been":[185],"tampered.":[186]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
