{"id":"https://openalex.org/W2512070899","doi":"https://doi.org/10.1145/2905055.2905060","title":"Comparative Study of Watermarking an Image Using GA and BFO with GA and HBO Technique","display_name":"Comparative Study of Watermarking an Image Using GA and BFO with GA and HBO Technique","publication_year":2016,"publication_date":"2016-03-04","ids":{"openalex":"https://openalex.org/W2512070899","doi":"https://doi.org/10.1145/2905055.2905060","mag":"2512070899"},"language":"en","primary_location":{"id":"doi:10.1145/2905055.2905060","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2905055.2905060","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Gagandeep Singh","orcid":null},"institutions":[{"id":"https://openalex.org/I61702852","display_name":"Royal University of Bhutan","ror":"https://ror.org/03hqan520","country_code":"BT","type":"education","lineage":["https://openalex.org/I61702852"]}],"countries":["BT"],"is_corresponding":true,"raw_author_name":"Gagandeep Singh","raw_affiliation_strings":["Department of Information Technology, College of Science and Technology, Royal University of Bhutan, Bhutan M. Tech, Scholar, PTU Regional Center, ACET, Amritsar"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, College of Science and Technology, Royal University of Bhutan, Bhutan M. Tech, Scholar, PTU Regional Center, ACET, Amritsar","institution_ids":["https://openalex.org/I61702852"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060759723","display_name":"Sandeep Kad","orcid":null},"institutions":[{"id":"https://openalex.org/I2800494708","display_name":"Government Medical College, Amritsar","ror":"https://ror.org/046bk9643","country_code":"IN","type":"education","lineage":["https://openalex.org/I2800494708"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sandeep Kad","raw_affiliation_strings":["Department of Computer Science &amp; Engineering, Amritsar College of Engineering and Technology, Amritsar, Punjab, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science &amp; Engineering, Amritsar College of Engineering and Technology, Amritsar, Punjab, India","institution_ids":["https://openalex.org/I2800494708"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I61702852"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.07646197,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12707","display_name":"Vehicle License Plate Recognition","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.9233524799346924},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7897430658340454},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.6361685991287231},{"id":"https://openalex.org/keywords/genetic-algorithm","display_name":"Genetic algorithm","score":0.5847230553627014},{"id":"https://openalex.org/keywords/matlab","display_name":"MATLAB","score":0.5806880593299866},{"id":"https://openalex.org/keywords/digital-media","display_name":"Digital media","score":0.5613188147544861},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5315169095993042},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5280675888061523},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5256653428077698},{"id":"https://openalex.org/keywords/digital-watermarking-alliance","display_name":"Digital Watermarking Alliance","score":0.5104693174362183},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.4853295385837555},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.4427070915699005},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4303519129753113},{"id":"https://openalex.org/keywords/digital-image","display_name":"Digital image","score":0.4273386001586914},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.42445439100265503},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.33177149295806885},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2825877368450165},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.17353388667106628},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.1276986002922058},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.10800221562385559}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.9233524799346924},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7897430658340454},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.6361685991287231},{"id":"https://openalex.org/C8880873","wikidata":"https://www.wikidata.org/wiki/Q187787","display_name":"Genetic algorithm","level":2,"score":0.5847230553627014},{"id":"https://openalex.org/C2780365114","wikidata":"https://www.wikidata.org/wiki/Q169478","display_name":"MATLAB","level":2,"score":0.5806880593299866},{"id":"https://openalex.org/C17632256","wikidata":"https://www.wikidata.org/wiki/Q1076968","display_name":"Digital media","level":2,"score":0.5613188147544861},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5315169095993042},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5280675888061523},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5256653428077698},{"id":"https://openalex.org/C193470923","wikidata":"https://www.wikidata.org/wiki/Q5276026","display_name":"Digital Watermarking Alliance","level":4,"score":0.5104693174362183},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4853295385837555},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.4427070915699005},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4303519129753113},{"id":"https://openalex.org/C42781572","wikidata":"https://www.wikidata.org/wiki/Q1250322","display_name":"Digital image","level":4,"score":0.4273386001586914},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.42445439100265503},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.33177149295806885},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2825877368450165},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.17353388667106628},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.1276986002922058},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.10800221562385559},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2905055.2905060","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2905055.2905060","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W16088600","https://openalex.org/W128959466","https://openalex.org/W1518786235","https://openalex.org/W1629051378","https://openalex.org/W1973369466","https://openalex.org/W2005806759","https://openalex.org/W2048221285","https://openalex.org/W2117319150","https://openalex.org/W2121117733","https://openalex.org/W2122122715","https://openalex.org/W2134415040","https://openalex.org/W2136078037","https://openalex.org/W2142337062","https://openalex.org/W2325396247","https://openalex.org/W2336871348","https://openalex.org/W2544725967","https://openalex.org/W4239594487","https://openalex.org/W4252292900","https://openalex.org/W6663125930"],"related_works":["https://openalex.org/W2181535967","https://openalex.org/W1846726187","https://openalex.org/W2477667625","https://openalex.org/W2381262728","https://openalex.org/W2377399388","https://openalex.org/W4252396456","https://openalex.org/W2604834115","https://openalex.org/W2385102862","https://openalex.org/W2356840395","https://openalex.org/W4283331494"],"abstract_inverted_index":{"Multimedia":[0],"security":[1],"and":[2,12,24,75,91],"copyright":[3],"protection":[4,52],"has":[5,106],"been":[6],"a":[7,33,41,60],"popular":[8],"topic":[9],"for":[10,67],"research":[11],"application,":[13],"due":[14],"to":[15],"the":[16,22,25,37,110,118],"explosion":[17],"of":[18,28,35,63,88],"data":[19],"exchange":[20],"over":[21,117],"internet":[23],"widespread":[26],"use":[27],"digital":[29,38,42,47,68],"media.":[30,43],"Watermarking":[31],"is":[32,115],"process":[34],"hiding":[36,45],"information":[39],"inside":[40],"Information":[44],"as":[46],"watermarks":[48],"in":[49,54],"multimedia":[50],"enables":[51],"mechanism":[53],"decrypted":[55],"contents.":[56],"This":[57],"paper":[58],"presents":[59],"comparative":[61],"study":[62],"existing":[64],"technique":[65,82],"used":[66],"watermarking":[69],"an":[70],"image":[71],"using":[72],"Genetic":[73,89],"Algorithm":[74,78,90],"Bacterial":[76],"Foraging":[77],"(BFO)":[79],"based":[80,94],"optimization":[81,95],"with":[83],"proposed":[84],"one":[85],"which":[86],"consists":[87],"Honey":[92],"Bee":[93],"technique.":[96,112],"The":[97,113],"results":[98],"obtained":[99],"after":[100],"experiment":[101],"conclude":[102],"that,":[103],"new":[104],"method":[105],"indeed":[107],"outperformed":[108],"then":[109],"conventional":[111],"implementation":[114],"done":[116],"MATLAB.":[119]},"counts_by_year":[{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
