{"id":"https://openalex.org/W2336193958","doi":"https://doi.org/10.1145/2837126.2837174","title":"Integration of a robust watermark scheme in a high efficiency codec H.265/HEVC with capacity-quality-bitrate trade-off","display_name":"Integration of a robust watermark scheme in a high efficiency codec H.265/HEVC with capacity-quality-bitrate trade-off","publication_year":2015,"publication_date":"2015-12-11","ids":{"openalex":"https://openalex.org/W2336193958","doi":"https://doi.org/10.1145/2837126.2837174","mag":"2336193958"},"language":"en","primary_location":{"id":"doi:10.1145/2837126.2837174","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2837126.2837174","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035119685","display_name":"Mhamdi Mohamed","orcid":null},"institutions":[{"id":"https://openalex.org/I108714496","display_name":"Tunis University","ror":"https://ror.org/02q1spa57","country_code":"TN","type":"education","lineage":["https://openalex.org/I108714496"]},{"id":"https://openalex.org/I4210131288","display_name":"National Engineering School of Tunis","ror":"https://ror.org/03b1zjt31","country_code":"TN","type":"education","lineage":["https://openalex.org/I4210131288","https://openalex.org/I63596082"]},{"id":"https://openalex.org/I63596082","display_name":"Tunis El Manar University","ror":"https://ror.org/029cgt552","country_code":"TN","type":"education","lineage":["https://openalex.org/I63596082"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Mhamdi Mohamed","raw_affiliation_strings":["National engineering school of Tunis, University Tunis ElManar, Tunisia"],"affiliations":[{"raw_affiliation_string":"National engineering school of Tunis, University Tunis ElManar, Tunisia","institution_ids":["https://openalex.org/I4210131288","https://openalex.org/I108714496","https://openalex.org/I63596082"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108637849","display_name":"Faten Ben Abdallah","orcid":"https://orcid.org/0000-0002-2449-2199"},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Faten Ben Abdallah","raw_affiliation_strings":["Innov'Com Laboratory, Higher School of Communications of Tunis, Sup'COM, Carthage University, Tunisia"],"affiliations":[{"raw_affiliation_string":"Innov'Com Laboratory, Higher School of Communications of Tunis, Sup'COM, Carthage University, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015126563","display_name":"Lotfi Abdi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210131288","display_name":"National Engineering School of Tunis","ror":"https://ror.org/03b1zjt31","country_code":"TN","type":"education","lineage":["https://openalex.org/I4210131288","https://openalex.org/I63596082"]},{"id":"https://openalex.org/I63596082","display_name":"Tunis El Manar University","ror":"https://ror.org/029cgt552","country_code":"TN","type":"education","lineage":["https://openalex.org/I63596082"]},{"id":"https://openalex.org/I108714496","display_name":"Tunis University","ror":"https://ror.org/02q1spa57","country_code":"TN","type":"education","lineage":["https://openalex.org/I108714496"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Lotfi Abdi","raw_affiliation_strings":["National engineering school of Tunis, University Tunis ElManar, Tunisia"],"affiliations":[{"raw_affiliation_string":"National engineering school of Tunis, University Tunis ElManar, Tunisia","institution_ids":["https://openalex.org/I4210131288","https://openalex.org/I108714496","https://openalex.org/I63596082"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050958236","display_name":"Aref Meddeb","orcid":"https://orcid.org/0000-0002-6678-2223"},"institutions":[{"id":"https://openalex.org/I8636806","display_name":"University of Sousse","ror":"https://ror.org/00dmpgj58","country_code":"TN","type":"education","lineage":["https://openalex.org/I8636806"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Aref Meddeb","raw_affiliation_strings":["National engineering school of Sousse, University of Sousse, Tunisia"],"affiliations":[{"raw_affiliation_string":"National engineering school of Sousse, University of Sousse, Tunisia","institution_ids":["https://openalex.org/I8636806"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5035119685"],"corresponding_institution_ids":["https://openalex.org/I108714496","https://openalex.org/I4210131288","https://openalex.org/I63596082"],"apc_list":null,"apc_paid":null,"fwci":0.3682,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.70999297,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"375","last_page":"379"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10741","display_name":"Video Coding and Compression Technologies","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10901","display_name":"Advanced Data Compression Techniques","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/codec","display_name":"Codec","score":0.8200424313545227},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7935754656791687},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.6449506282806396},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5319832563400269},{"id":"https://openalex.org/keywords/fidelity","display_name":"Fidelity","score":0.5164018273353577},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.501054048538208},{"id":"https://openalex.org/keywords/digital-watermarking-alliance","display_name":"Digital Watermarking Alliance","score":0.4864880442619324},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47586625814437866},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4751415252685547},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.402316689491272},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.2679194509983063},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.2380909025669098},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.18206340074539185},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.12823081016540527},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11890602111816406},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.10406875610351562}],"concepts":[{"id":"https://openalex.org/C161765866","wikidata":"https://www.wikidata.org/wiki/Q184748","display_name":"Codec","level":2,"score":0.8200424313545227},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7935754656791687},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.6449506282806396},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5319832563400269},{"id":"https://openalex.org/C2776459999","wikidata":"https://www.wikidata.org/wiki/Q2119376","display_name":"Fidelity","level":2,"score":0.5164018273353577},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.501054048538208},{"id":"https://openalex.org/C193470923","wikidata":"https://www.wikidata.org/wiki/Q5276026","display_name":"Digital Watermarking Alliance","level":4,"score":0.4864880442619324},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47586625814437866},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4751415252685547},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.402316689491272},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.2679194509983063},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.2380909025669098},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.18206340074539185},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.12823081016540527},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11890602111816406},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.10406875610351562},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2837126.2837174","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2837126.2837174","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6600000262260437,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1499479123","https://openalex.org/W1991013763","https://openalex.org/W1993025711","https://openalex.org/W1999148474","https://openalex.org/W2022127973","https://openalex.org/W2024913314","https://openalex.org/W2026970882","https://openalex.org/W2039208502","https://openalex.org/W2065975976","https://openalex.org/W2080155926","https://openalex.org/W2092345083","https://openalex.org/W2098629468","https://openalex.org/W2102404199","https://openalex.org/W2105259915","https://openalex.org/W2110600468","https://openalex.org/W2146395539","https://openalex.org/W2150142372","https://openalex.org/W2154593837","https://openalex.org/W2159215051"],"related_works":["https://openalex.org/W2137394636","https://openalex.org/W2358993821","https://openalex.org/W1516446231","https://openalex.org/W2098152888","https://openalex.org/W1559740347","https://openalex.org/W2040356834","https://openalex.org/W2080353903","https://openalex.org/W2385289568","https://openalex.org/W2505442964","https://openalex.org/W2109478019"],"abstract_inverted_index":{"Recently,":[0],"new":[1,28],"challenges":[2],"are":[3],"imposed":[4],"to":[5,12,22,53],"secure":[6],"video":[7,67,113],"broadcasting":[8],"and":[9,11,17,35,43,129],"sharing,":[10],"guarantee":[13],"confidentiality,":[14],"integrity,":[15],"copyright":[16,41],"traceability.":[18],"In":[19,69],"addition,":[20],"due":[21],"the":[23,65,90,112],"social":[24],"media":[25],"development,":[26],"several":[27],"problems":[29],"have":[30],"emerged":[31],"in":[32,64,78,89],"users'":[33],"privacy":[34],"security":[36],"policy":[37],"as":[38,57],"identity":[39],"theft,":[40],"infringement":[42],"unauthorized":[44],"content":[45],"sharing.":[46],"The":[47],"watermarking":[48,120],"is":[49],"a":[50,79,123],"crucial":[51],"way":[52],"assure":[54],"safety":[55],"objectives":[56],"it":[58],"allows":[59],"embedding":[60],"an":[61],"imperceptible":[62],"mark":[63],"digital":[66,119],"data.":[68],"this":[70],"paper,":[71],"we":[72],"integrate":[73],"two":[74],"robust":[75],"watermark":[76],"schemes":[77],"high":[80],"efficiency":[81],"codec":[82,91],"HEVC,":[83],"which":[84],"can":[85],"be":[86],"easily":[87],"implemented":[88],"since":[92],"they":[93],"require":[94],"only":[95],"little":[96],"extra":[97],"computation.":[98],"Experimental":[99],"results":[100],"demonstrate":[101],"that":[102],"our":[103],"proposed":[104],"scheme":[105],"(named":[106],"XY":[107],"method)":[108],"does":[109],"not":[110],"affect":[111],"quality,":[114],"nor":[115],"escalate":[116],"bitrate.":[117],"Our":[118],"system":[121],"presents":[122],"trade-off":[124],"between":[125],"capacity,":[126],"fidelity,":[127],"bitrate":[128],"robustness":[130],"parameters.":[131]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
