{"id":"https://openalex.org/W4328127670","doi":"https://doi.org/10.1145/3588573","title":"3D Object Watermarking from Data Hiding in the Homomorphic Encrypted Domain","display_name":"3D Object Watermarking from Data Hiding in the Homomorphic Encrypted Domain","publication_year":2023,"publication_date":"2023-03-21","ids":{"openalex":"https://openalex.org/W4328127670","doi":"https://doi.org/10.1145/3588573"},"language":"en","primary_location":{"id":"doi:10.1145/3588573","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3588573","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3588573","source":{"id":"https://openalex.org/S19610489","display_name":"ACM Transactions on Multimedia Computing Communications and Applications","issn_l":"1551-6857","issn":["1551-6857","1551-6865"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Multimedia Computing, Communications, and Applications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3588573","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017225740","display_name":"Bianca Jansen van Rensburg","orcid":"https://orcid.org/0000-0002-8683-1360"},"institutions":[{"id":"https://openalex.org/I4210101743","display_name":"Laboratoire d'Informatique, de Robotique et de Micro\u00e9lectronique de Montpellier","ror":"https://ror.org/013yean28","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I151295451","https://openalex.org/I19894307","https://openalex.org/I4210101743","https://openalex.org/I4210159245","https://openalex.org/I4412460525"]},{"id":"https://openalex.org/I19894307","display_name":"Universit\u00e9 de Montpellier","ror":"https://ror.org/051escj72","country_code":"FR","type":"education","lineage":["https://openalex.org/I19894307"]},{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1294671590"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Bianca Jansen van Rensburg","raw_affiliation_strings":["LIRMM, Universit\u00e9 de Montpellier, CNRS","Image & Interaction"],"affiliations":[{"raw_affiliation_string":"LIRMM, Universit\u00e9 de Montpellier, CNRS","institution_ids":["https://openalex.org/I19894307","https://openalex.org/I4210101743","https://openalex.org/I1294671590"]},{"raw_affiliation_string":"Image & Interaction","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030535204","display_name":"Pauline Puteaux","orcid":"https://orcid.org/0000-0002-3236-4664"},"institutions":[{"id":"https://openalex.org/I7454413","display_name":"\u00c9cole Centrale de Lille","ror":"https://ror.org/01x441g73","country_code":"FR","type":"education","lineage":["https://openalex.org/I7454413"]},{"id":"https://openalex.org/I4210115519","display_name":"Centre de Recherche en Informatique","ror":"https://ror.org/020cdve92","country_code":"FR","type":"facility","lineage":["https://openalex.org/I190752583","https://openalex.org/I2746051580","https://openalex.org/I4210091621","https://openalex.org/I4210115519","https://openalex.org/I70768539"]},{"id":"https://openalex.org/I4387153239","display_name":"Centre de Recherche en Informatique, Signal et Automatique de Lille","ror":"https://ror.org/05vrs3189","country_code":null,"type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I2279609970","https://openalex.org/I4387153239","https://openalex.org/I7454413"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Pauline Puteaux","raw_affiliation_strings":["CRIStAL, CNRS, Univ. Lille, Centrale Lille","Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189"],"affiliations":[{"raw_affiliation_string":"CRIStAL, CNRS, Univ. Lille, Centrale Lille","institution_ids":["https://openalex.org/I7454413"]},{"raw_affiliation_string":"Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189","institution_ids":["https://openalex.org/I4210115519","https://openalex.org/I4387153239"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067164546","display_name":"William Puech","orcid":"https://orcid.org/0000-0001-9383-2401"},"institutions":[{"id":"https://openalex.org/I4210101743","display_name":"Laboratoire d'Informatique, de Robotique et de Micro\u00e9lectronique de Montpellier","ror":"https://ror.org/013yean28","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I151295451","https://openalex.org/I19894307","https://openalex.org/I4210101743","https://openalex.org/I4210159245","https://openalex.org/I4412460525"]},{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I19894307","display_name":"Universit\u00e9 de Montpellier","ror":"https://ror.org/051escj72","country_code":"FR","type":"education","lineage":["https://openalex.org/I19894307"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"William Puech","raw_affiliation_strings":["LIRMM, Universit\u00e9 de Montpellier, CNRS","Image & Interaction"],"affiliations":[{"raw_affiliation_string":"LIRMM, Universit\u00e9 de Montpellier, CNRS","institution_ids":["https://openalex.org/I19894307","https://openalex.org/I4210101743","https://openalex.org/I1294671590"]},{"raw_affiliation_string":"Image & Interaction","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005198851","display_name":"Jean-Pierre Pedeboy","orcid":"https://orcid.org/0009-0004-6160-8885"},"institutions":[{"id":"https://openalex.org/I4210128327","display_name":"Health Strat (Kenya)","ror":"https://ror.org/03mngpd27","country_code":"KE","type":"company","lineage":["https://openalex.org/I4210128327"]}],"countries":["KE"],"is_corresponding":false,"raw_author_name":"Jean-Pierre Pedeboy","raw_affiliation_strings":["Strat\u00e9gies"],"affiliations":[{"raw_affiliation_string":"Strat\u00e9gies","institution_ids":["https://openalex.org/I4210128327"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5017225740"],"corresponding_institution_ids":["https://openalex.org/I1294671590","https://openalex.org/I19894307","https://openalex.org/I4210101743"],"apc_list":null,"apc_paid":null,"fwci":0.8551,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.74502887,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":"19","issue":"5s","first_page":"1","last_page":"20"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9871000051498413,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8068341612815857},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7544568181037903},{"id":"https://openalex.org/keywords/object","display_name":"Object (grammar)","score":0.6663748621940613},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.6334080696105957},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.6036204099655151},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.6035681366920471},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.5781874656677246},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.5728781819343567},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.5492494106292725},{"id":"https://openalex.org/keywords/watermarking-attack","display_name":"Watermarking attack","score":0.4898378551006317},{"id":"https://openalex.org/keywords/filesystem-level-encryption","display_name":"Filesystem-level encryption","score":0.477493017911911},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.35929083824157715},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.32181376218795776},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.31448379158973694},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2925400733947754},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.26044750213623047},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2536291778087616},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.24786171317100525},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12464365363121033},{"id":"https://openalex.org/keywords/deterministic-encryption","display_name":"Deterministic encryption","score":0.11126580834388733}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8068341612815857},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7544568181037903},{"id":"https://openalex.org/C2781238097","wikidata":"https://www.wikidata.org/wiki/Q175026","display_name":"Object (grammar)","level":2,"score":0.6663748621940613},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.6334080696105957},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.6036204099655151},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.6035681366920471},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.5781874656677246},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.5728781819343567},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.5492494106292725},{"id":"https://openalex.org/C122760801","wikidata":"https://www.wikidata.org/wiki/Q2552011","display_name":"Watermarking attack","level":5,"score":0.4898378551006317},{"id":"https://openalex.org/C18319499","wikidata":"https://www.wikidata.org/wiki/Q5448402","display_name":"Filesystem-level encryption","level":4,"score":0.477493017911911},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.35929083824157715},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.32181376218795776},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.31448379158973694},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2925400733947754},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.26044750213623047},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2536291778087616},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.24786171317100525},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12464365363121033},{"id":"https://openalex.org/C57795399","wikidata":"https://www.wikidata.org/wiki/Q5265706","display_name":"Deterministic encryption","level":4,"score":0.11126580834388733},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3588573","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3588573","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3588573","source":{"id":"https://openalex.org/S19610489","display_name":"ACM Transactions on Multimedia Computing Communications and Applications","issn_l":"1551-6857","issn":["1551-6857","1551-6865"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Multimedia Computing, Communications, and Applications","raw_type":"journal-article"},{"id":"pmh:oai:HAL:hal-04126239v1","is_oa":true,"landing_page_url":"https://hal.science/hal-04126239","pdf_url":"https://hal.science/hal-04126239v1/file/ACM_TOMM_PUECH.pdf","source":{"id":"https://openalex.org/S4406922466","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"ACM Transactions on Multimedia Computing, Communications and Applications, 2023, 19 (5s), pp.1-20/175. &#x27E8;10.1145/3588573&#x27E9;","raw_type":"Journal articles"}],"best_oa_location":{"id":"doi:10.1145/3588573","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3588573","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3588573","source":{"id":"https://openalex.org/S19610489","display_name":"ACM Transactions on Multimedia Computing Communications and Applications","issn_l":"1551-6857","issn":["1551-6857","1551-6865"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Multimedia Computing, Communications, and Applications","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Responsible consumption and production","score":0.4699999988079071,"id":"https://metadata.un.org/sdg/12"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4328127670.pdf","grobid_xml":"https://content.openalex.org/works/W4328127670.grobid-xml"},"referenced_works_count":38,"referenced_works":["https://openalex.org/W1959190975","https://openalex.org/W1983586468","https://openalex.org/W1993364002","https://openalex.org/W1998279455","https://openalex.org/W2007466965","https://openalex.org/W2029438024","https://openalex.org/W2054082132","https://openalex.org/W2075965608","https://openalex.org/W2088399161","https://openalex.org/W2094605916","https://openalex.org/W2099789128","https://openalex.org/W2119853171","https://openalex.org/W2132172731","https://openalex.org/W2134757163","https://openalex.org/W2139758408","https://openalex.org/W2168532569","https://openalex.org/W2185276582","https://openalex.org/W2322525404","https://openalex.org/W2508330072","https://openalex.org/W2517494721","https://openalex.org/W2621309449","https://openalex.org/W2727505277","https://openalex.org/W2748251709","https://openalex.org/W2793696846","https://openalex.org/W2805294602","https://openalex.org/W2902805977","https://openalex.org/W2916108582","https://openalex.org/W2940937153","https://openalex.org/W2944424552","https://openalex.org/W2969651547","https://openalex.org/W3002441164","https://openalex.org/W3015356587","https://openalex.org/W3022458346","https://openalex.org/W3035178448","https://openalex.org/W3195552406","https://openalex.org/W3197005616","https://openalex.org/W3209149852","https://openalex.org/W4284967638"],"related_works":["https://openalex.org/W4391920153","https://openalex.org/W1964306602","https://openalex.org/W4315815885","https://openalex.org/W2119929684","https://openalex.org/W2071279870","https://openalex.org/W4375948682","https://openalex.org/W2175086517","https://openalex.org/W4281639007","https://openalex.org/W4361732937","https://openalex.org/W1518301672"],"abstract_inverted_index":{"For":[0],"over":[1],"a":[2,32,37,73,101,151,182,190],"decade,":[3],"3D":[4,39,86,121,185,192,202,208],"objects":[5],"are":[6,96,135,161,169,233],"an":[7,227],"increasingly":[8],"popular":[9],"form":[10],"of":[11,54,92,145,175,181],"media.":[12],"It":[13],"has":[14],"become":[15],"necessary":[16],"and":[17,127,138],"urgent":[18],"to":[19,35,63,99,165,199],"secure":[20,238],"them":[21],"during":[22],"their":[23],"transmission":[24],"or":[25],"archiving.":[26],"In":[27],"this":[28],"article,":[29],"we":[30,95,210],"propose":[31,100],"new":[33,152],"method":[34,60,104,188,237],"obtain":[36],"watermarked":[38,183,191,207],"object":[40,87,122,193],"from":[41],"high-capacity":[42,111],"data":[43,102,129],"hiding":[44,103,130],"in":[45,68,80,105,115,131,156,163,219],"the":[46,51,55,69,81,85,90,97,106,110,116,120,128,132,143,146,157,173,179,200,205,215,220,224],"encrypted":[47,70,107,133,158,184],"domain.":[48],"Based":[49],"on":[50],"homomorphic":[52],"properties":[53],"Paillier":[56,147],"cryptosystem,":[57],"our":[58,93,187,236],"proposed":[59],"allows":[61],"us":[62],"embed":[64],"several":[65],"secret":[66],"messages":[67,76,217],"domain":[71,83,108,118,134],"with":[72],"high-capacity.":[74],"These":[75],"can":[77,211],"be":[78],"extracted":[79],"plain-text":[82,117,221],"after":[84,119],"decryption.":[88],"To":[89],"best":[91],"knowledge,":[94],"first":[98],"where":[109],"watermark":[112],"is":[113,123,154,195],"conserved":[114],"decrypted.":[124],"The":[125],"encryption":[126],"format":[136],"compliant":[137],"without":[139,223],"size":[140],"expansion,":[141],"despite":[142],"use":[144],"cryptosystem.":[148],"Each":[149],"time":[150],"message":[153],"embedded":[155,216],"domain,":[159,222],"flags":[160],"added":[162],"order":[164],"indicate":[166],"which":[167,194],"blocks":[168],"still":[170],"available":[171],"for":[172,226,239],"embedding":[174],"additional":[176],"messages.":[177],"After":[178],"decryption":[180],"object,":[186,209],"produces":[189],"visually":[196],"very":[197],"similar":[198],"original":[201],"object.":[203],"From":[204],"decrypted":[206],"then":[212],"extract":[213],"all":[214],"directly":[218],"need":[225],"auxiliary":[228],"file.":[229],"Moreover,":[230],"large":[231],"keys":[232],"used,":[234],"rending":[235],"real-life":[240],"applications.":[241]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2}],"updated_date":"2026-03-14T08:43:22.919905","created_date":"2025-10-10T00:00:00"}
