{"id":"https://openalex.org/W2904916328","doi":"https://doi.org/10.1155/2018/1254081","title":"A Robust Watermarking Scheme Based on the Mean Modulation of DWT Coefficients","display_name":"A Robust Watermarking Scheme Based on the Mean Modulation of DWT Coefficients","publication_year":2018,"publication_date":"2018-12-06","ids":{"openalex":"https://openalex.org/W2904916328","doi":"https://doi.org/10.1155/2018/1254081","mag":"2904916328"},"language":"en","primary_location":{"id":"doi:10.1155/2018/1254081","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2018/1254081","pdf_url":"http://downloads.hindawi.com/journals/scn/2018/1254081.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"http://downloads.hindawi.com/journals/scn/2018/1254081.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001338027","display_name":"Zied Kricha","orcid":"https://orcid.org/0000-0003-4237-1160"},"institutions":[{"id":"https://openalex.org/I166928557","display_name":"University of Monastir","ror":"https://ror.org/00nhtcg76","country_code":"TN","type":"education","lineage":["https://openalex.org/I166928557"]},{"id":"https://openalex.org/I8636806","display_name":"University of Sousse","ror":"https://ror.org/00dmpgj58","country_code":"TN","type":"education","lineage":["https://openalex.org/I8636806"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Zied Kricha","raw_affiliation_strings":["CSR Group with the Electronic and Microelectronic Lab, National School of Engineers of Monastir, University of Monastir, Ibn El Jazzar Avenue, 5035, Tunisia","National School of Engineers of Sousse, University of Sousse, Erriadh City, 4023, Tunisia"],"affiliations":[{"raw_affiliation_string":"CSR Group with the Electronic and Microelectronic Lab, National School of Engineers of Monastir, University of Monastir, Ibn El Jazzar Avenue, 5035, Tunisia","institution_ids":["https://openalex.org/I166928557"]},{"raw_affiliation_string":"National School of Engineers of Sousse, University of Sousse, Erriadh City, 4023, Tunisia","institution_ids":["https://openalex.org/I8636806"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073003203","display_name":"Anis Kricha","orcid":null},"institutions":[{"id":"https://openalex.org/I8636806","display_name":"University of Sousse","ror":"https://ror.org/00dmpgj58","country_code":"TN","type":"education","lineage":["https://openalex.org/I8636806"]},{"id":"https://openalex.org/I166928557","display_name":"University of Monastir","ror":"https://ror.org/00nhtcg76","country_code":"TN","type":"education","lineage":["https://openalex.org/I166928557"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Anis Kricha","raw_affiliation_strings":["LATIS Lab, National School of Engineers of Sousse, University of Sousse, Erriadh City, 4023, Tunisia","National School of Engineers of Monastir, University of Monastir, Ibn El Jazzar Avenue, 5035, Tunisia"],"affiliations":[{"raw_affiliation_string":"LATIS Lab, National School of Engineers of Sousse, University of Sousse, Erriadh City, 4023, Tunisia","institution_ids":["https://openalex.org/I8636806"]},{"raw_affiliation_string":"National School of Engineers of Monastir, University of Monastir, Ibn El Jazzar Avenue, 5035, Tunisia","institution_ids":["https://openalex.org/I166928557"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004947873","display_name":"Anis Sakly","orcid":"https://orcid.org/0000-0002-3608-0386"},"institutions":[{"id":"https://openalex.org/I166928557","display_name":"University of Monastir","ror":"https://ror.org/00nhtcg76","country_code":"TN","type":"education","lineage":["https://openalex.org/I166928557"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Anis Sakly","raw_affiliation_strings":["ESIR Research Unit, National School of Engineers of Monastir, University of Monastir, Ibn El Jazzar Avenue, 5035, Tunisia"],"affiliations":[{"raw_affiliation_string":"ESIR Research Unit, National School of Engineers of Monastir, University of Monastir, Ibn El Jazzar Avenue, 5035, Tunisia","institution_ids":["https://openalex.org/I166928557"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5001338027"],"corresponding_institution_ids":["https://openalex.org/I166928557","https://openalex.org/I8636806"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.2089,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.57220345,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"2018","issue":null,"first_page":"1","last_page":"16"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10688","display_name":"Image and Signal Denoising Methods","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.921258807182312},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7960659265518188},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.7836775779724121},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.7360818386077881},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5279941558837891},{"id":"https://openalex.org/keywords/wavelet","display_name":"Wavelet","score":0.5199493169784546},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.500192403793335},{"id":"https://openalex.org/keywords/discrete-wavelet-transform","display_name":"Discrete wavelet transform","score":0.4778280258178711},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3869914710521698},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3492845296859741},{"id":"https://openalex.org/keywords/wavelet-transform","display_name":"Wavelet transform","score":0.316627562046051},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.2954432964324951}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.921258807182312},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7960659265518188},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.7836775779724121},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.7360818386077881},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5279941558837891},{"id":"https://openalex.org/C47432892","wikidata":"https://www.wikidata.org/wiki/Q831390","display_name":"Wavelet","level":2,"score":0.5199493169784546},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.500192403793335},{"id":"https://openalex.org/C46286280","wikidata":"https://www.wikidata.org/wiki/Q2414958","display_name":"Discrete wavelet transform","level":4,"score":0.4778280258178711},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3869914710521698},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3492845296859741},{"id":"https://openalex.org/C196216189","wikidata":"https://www.wikidata.org/wiki/Q2867","display_name":"Wavelet transform","level":3,"score":0.316627562046051},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.2954432964324951},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1155/2018/1254081","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2018/1254081","pdf_url":"http://downloads.hindawi.com/journals/scn/2018/1254081.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:dab12ebde3e842edaba2a21954e1cead","is_oa":true,"landing_page_url":"https://doaj.org/article/dab12ebde3e842edaba2a21954e1cead","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2018 (2018)","raw_type":"article"},{"id":"pmh:oai:hindawi.com:10.1155/2018/1254081","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/1254081","pdf_url":null,"source":{"id":"https://openalex.org/S4306400340","display_name":"Hindawi Journal of Chemistry (Hindawi)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210126990","host_organization_name":"Hindawi (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210126990"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Research Article"}],"best_oa_location":{"id":"doi:10.1155/2018/1254081","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2018/1254081","pdf_url":"http://downloads.hindawi.com/journals/scn/2018/1254081.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2904916328.pdf","grobid_xml":"https://content.openalex.org/works/W2904916328.grobid-xml"},"referenced_works_count":26,"referenced_works":["https://openalex.org/W644885648","https://openalex.org/W1896001907","https://openalex.org/W1973110771","https://openalex.org/W1979787367","https://openalex.org/W1994399628","https://openalex.org/W1994667429","https://openalex.org/W2020273020","https://openalex.org/W2025144259","https://openalex.org/W2044347350","https://openalex.org/W2049099172","https://openalex.org/W2076018353","https://openalex.org/W2134453072","https://openalex.org/W2147825527","https://openalex.org/W2148677273","https://openalex.org/W2160921333","https://openalex.org/W2305894560","https://openalex.org/W2517839668","https://openalex.org/W2557301023","https://openalex.org/W2573437058","https://openalex.org/W2576564061","https://openalex.org/W2613043684","https://openalex.org/W2614216395","https://openalex.org/W2731607666","https://openalex.org/W2752820131","https://openalex.org/W2806536795","https://openalex.org/W2897464770"],"related_works":["https://openalex.org/W2137394636","https://openalex.org/W2358993821","https://openalex.org/W1516446231","https://openalex.org/W2098152888","https://openalex.org/W1559740347","https://openalex.org/W2040356834","https://openalex.org/W2080353903","https://openalex.org/W2385289568","https://openalex.org/W2381486749","https://openalex.org/W1514507288"],"abstract_inverted_index":{"In":[0,39],"an":[1],"endeavor":[2],"to":[3,85],"deal":[4],"with":[5,121],"image":[6],"copyright":[7],"infringement,":[8],"robust":[9,46],"watermarking":[10,47,137],"approaches":[11,20],"are":[12,63],"commonly":[13],"used.":[14],"However,":[15],"most":[16],"of":[17,36,79,96,112,123],"the":[18,34,52,60,76,89,94,97,113,124,131,136],"existing":[19,141],"either":[21],"present":[22],"a":[23,42,66,100],"limited":[24],"robustness":[25,111],"or":[26],"rely":[27],"on":[28,93],"highly":[29],"computational":[30],"algorithms,":[31],"thereby":[32],"limiting":[33],"efficiency":[35],"these":[37],"solutions.":[38,126],"this":[40],"paper,":[41],"novel":[43],"blind":[44,101],"and":[45,54,69,110,119,139,146],"method":[48],"is":[49,82,104],"presented.":[50],"First,":[51],"vertical":[53],"horizontal":[55],"subbands":[56],"coefficients,":[57],"resulting":[58],"from":[59],"wavelet":[61],"transformation,":[62],"scrambled":[64],"using":[65],"chaotic":[67],"sequence":[68],"then":[70],"gathered":[71],"into":[72],"individual":[73],"blocks.":[74],"Next,":[75],"mean":[77],"value":[78],"each":[80],"block":[81],"modulated":[83],"according":[84],"watermark":[86,102],"bit.":[87],"At":[88],"extraction":[90],"stage,":[91],"based":[92],"sign":[95],"blocks\u2019":[98],"mean,":[99],"extractor":[103],"suggested.":[105],"The":[106],"imperceptibility,":[107],"security,":[108],"complexity,":[109],"proposed":[114,132],"approach":[115,133],"have":[116],"been":[117],"evaluated":[118],"compared":[120],"state":[122],"art":[125],"Experimental":[127],"results":[128],"prove":[129],"that":[130],"successfully":[134],"satisfies":[135],"requirement":[138],"outperforms":[140],"methods":[142],"against":[143],"both":[144],"geometric":[145],"signal":[147],"processing":[148],"attacks.":[149]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
