{"id":"https://openalex.org/W2727850327","doi":"https://doi.org/10.1145/3077140","title":"Secure Cloud-Based Image Tampering Detection and Localization Using POB Number System","display_name":"Secure Cloud-Based Image Tampering Detection and Localization Using POB Number System","publication_year":2017,"publication_date":"2017-06-28","ids":{"openalex":"https://openalex.org/W2727850327","doi":"https://doi.org/10.1145/3077140","mag":"2727850327"},"language":"en","primary_location":{"id":"doi:10.1145/3077140","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3077140","pdf_url":null,"source":{"id":"https://openalex.org/S19610489","display_name":"ACM Transactions on Multimedia Computing Communications and Applications","issn_l":"1551-6857","issn":["1551-6857","1551-6865"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Multimedia Computing, Communications, and Applications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013206679","display_name":"Priyanka Singh","orcid":"https://orcid.org/0000-0001-5002-8800"},"institutions":[{"id":"https://openalex.org/I392282","display_name":"University at Albany, State University of New York","ror":"https://ror.org/012zs8222","country_code":"US","type":"education","lineage":["https://openalex.org/I392282"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Priyanka Singh","raw_affiliation_strings":["State University of New York at Albany, Albany, NY"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"State University of New York at Albany, Albany, NY","institution_ids":["https://openalex.org/I392282"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030765476","display_name":"Balasubramanian Raman","orcid":"https://orcid.org/0000-0001-6277-6267"},"institutions":[{"id":"https://openalex.org/I154851008","display_name":"Indian Institute of Technology Roorkee","ror":"https://ror.org/00582g326","country_code":"IN","type":"education","lineage":["https://openalex.org/I154851008"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Balasubramanian Raman","raw_affiliation_strings":["Indian Institute of Technology, Roorkee, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology, Roorkee, India","institution_ids":["https://openalex.org/I154851008"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003565868","display_name":"Nishant Agarwal","orcid":"https://orcid.org/0000-0001-9290-4602"},"institutions":[{"id":"https://openalex.org/I105094715","display_name":"National Institute of Technology Kurukshetra","ror":"https://ror.org/04909p852","country_code":"IN","type":"education","lineage":["https://openalex.org/I105094715"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Nishant Agarwal","raw_affiliation_strings":["National Institute of Technology, Kurukshetra, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"National Institute of Technology, Kurukshetra, India","institution_ids":["https://openalex.org/I105094715"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034818486","display_name":"Pradeep K. Atrey","orcid":"https://orcid.org/0000-0002-9577-0969"},"institutions":[{"id":"https://openalex.org/I392282","display_name":"University at Albany, State University of New York","ror":"https://ror.org/012zs8222","country_code":"US","type":"education","lineage":["https://openalex.org/I392282"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Pradeep K. Atrey","raw_affiliation_strings":["State University of New York at Albany, Albany, NY"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"State University of New York at Albany, Albany, NY","institution_ids":["https://openalex.org/I392282"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5013206679"],"corresponding_institution_ids":["https://openalex.org/I392282"],"apc_list":null,"apc_paid":null,"fwci":1.5711,"has_fulltext":false,"cited_by_count":34,"citation_normalized_percentile":{"value":0.90136164,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"13","issue":"3","first_page":"1","last_page":"23"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9671000242233276,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7869335412979126},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7310122847557068},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7005017995834351},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.6637840867042542},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.6464231610298157},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.5524022579193115},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5164185166358948},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4720343351364136},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.45709601044654846},{"id":"https://openalex.org/keywords/rendering","display_name":"Rendering (computer graphics)","score":0.44769421219825745},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.34572499990463257},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3007456064224243},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.14055025577545166},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09239423274993896}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7869335412979126},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7310122847557068},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7005017995834351},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.6637840867042542},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.6464231610298157},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.5524022579193115},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5164185166358948},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4720343351364136},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.45709601044654846},{"id":"https://openalex.org/C205711294","wikidata":"https://www.wikidata.org/wiki/Q176953","display_name":"Rendering (computer graphics)","level":2,"score":0.44769421219825745},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.34572499990463257},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3007456064224243},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.14055025577545166},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09239423274993896},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3077140","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3077140","pdf_url":null,"source":{"id":"https://openalex.org/S19610489","display_name":"ACM Transactions on Multimedia Computing Communications and Applications","issn_l":"1551-6857","issn":["1551-6857","1551-6865"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Multimedia Computing, Communications, and Applications","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.6299999952316284}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1059052412","https://openalex.org/W1484820633","https://openalex.org/W1982743464","https://openalex.org/W1995708218","https://openalex.org/W2017167863","https://openalex.org/W2019672983","https://openalex.org/W2032675933","https://openalex.org/W2041508393","https://openalex.org/W2054501915","https://openalex.org/W2055046355","https://openalex.org/W2062774123","https://openalex.org/W2079447070","https://openalex.org/W2082417656","https://openalex.org/W2094498166","https://openalex.org/W2104348420","https://openalex.org/W2109394932","https://openalex.org/W2122589245","https://openalex.org/W2133062571","https://openalex.org/W2141420453","https://openalex.org/W2145986939","https://openalex.org/W2401228944","https://openalex.org/W2558017483","https://openalex.org/W2560617874","https://openalex.org/W2884206483","https://openalex.org/W2970097841","https://openalex.org/W3182211633","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2361629745","https://openalex.org/W2107922825","https://openalex.org/W3094285444","https://openalex.org/W2381262728","https://openalex.org/W2111592878","https://openalex.org/W1568204688","https://openalex.org/W2122982227","https://openalex.org/W1846726187","https://openalex.org/W2387614453","https://openalex.org/W2365808414"],"abstract_inverted_index":{"The":[0,134,153,175],"benefits":[1],"of":[2,159,166,173,194],"high-end":[3],"computation":[4],"infrastructure":[5],"facilities":[6],"provided":[7],"by":[8],"cloud-based":[9,21],"multimedia":[10],"systems":[11,22],"are":[12],"attracting":[13],"people":[14],"all":[15],"around":[16],"the":[17,47,54,82,94,99,103,106,115,118,123,131,142,149,157,160,195],"globe.":[18],"However,":[19],"such":[20,62],"possess":[23],"security":[24,59],"issues":[25],"as":[26,53],"third":[27],"party":[28],"servers":[29],"become":[30],"involved":[31],"in":[32,36,77,85,141],"them.":[33],"Rendering":[34],"data":[35,49,96],"an":[37],"unreadable":[38],"form":[39],"so":[40],"that":[41,145],"no":[42],"information":[43,84],"is":[44,112,137,146],"revealed":[45],"to":[46,57,188],"cloud":[48,95,116],"centers":[50],"will":[51],"serve":[52],"best":[55],"solution":[56],"these":[58],"issues.":[60],"One":[61],"image":[63,83,144],"encryption":[64],"scheme":[65,101,119,162],"based":[66],"on":[67,182],"a":[68,171,183],"Permutation":[69],"Ordered":[70],"Binary":[71],"Number":[72],"System":[73],"has":[74,179],"been":[75,180],"proposed":[76,100,161],"this":[78],"work.":[79],"It":[80],"distributes":[81],"totally":[86],"random":[87],"shares,":[88],"which":[89],"can":[90,120],"be":[91,189],"stored":[92],"at":[93,105,114,148],"centers.":[97],"Further,":[98],"authenticates":[102],"shares":[104],"pixel":[107,184],"level.":[108],"If":[109],"any":[110],"tampering":[111,196],"done":[113],"servers,":[117],"accurately":[121],"identify":[122],"altered":[124],"pixels":[125],"via":[126],"authentication":[127],"bits":[128],"and":[129,186],"localizes":[130],"tampered":[132,135],"area.":[133],"portion":[136],"also":[138],"reflected":[139],"back":[140],"reconstructed":[143],"obtained":[147],"authentic":[150],"user":[151],"end.":[152],"experimental":[154],"results":[155],"validate":[156],"efficacy":[158],"against":[163],"various":[164],"kinds":[165],"possible":[167],"attacks,":[168],"tested":[169],"with":[170],"variety":[172],"images.":[174],"tamper":[176],"detection":[177],"accuracy":[178],"computed":[181],"basis":[185],"found":[187],"satisfactorily":[190],"high":[191],"for":[192],"most":[193],"scenarios.":[197]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":1}],"updated_date":"2026-05-21T06:26:12.895304","created_date":"2025-10-10T00:00:00"}
