{"id":"https://openalex.org/W3114950669","doi":"https://doi.org/10.1155/2020/8840779","title":"A Novel Comprehensive Watermarking Scheme for Color Images","display_name":"A Novel Comprehensive Watermarking Scheme for Color Images","publication_year":2020,"publication_date":"2020-12-31","ids":{"openalex":"https://openalex.org/W3114950669","doi":"https://doi.org/10.1155/2020/8840779","mag":"3114950669"},"language":"en","primary_location":{"id":"doi:10.1155/2020/8840779","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8840779","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8840779.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2020/8840779.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087458981","display_name":"Shaohua Duan","orcid":"https://orcid.org/0000-0002-1847-3864"},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shaohua Duan","raw_affiliation_strings":["School of Computer and Cyberspace Security, Hainan University, Haikou 570100, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Cyberspace Security, Hainan University, Haikou 570100, China","institution_ids":["https://openalex.org/I20942203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100699172","display_name":"Hanwen Wang","orcid":"https://orcid.org/0000-0002-3603-550X"},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hanwen Wang","raw_affiliation_strings":["School of Computer and Cyberspace Security, Hainan University, Haikou 570100, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Cyberspace Security, Hainan University, Haikou 570100, China","institution_ids":["https://openalex.org/I20942203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009576180","display_name":"Yunpeng Liu","orcid":"https://orcid.org/0000-0002-1122-6676"},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yunpeng Liu","raw_affiliation_strings":["School of Computer and Cyberspace Security, Hainan University, Haikou 570100, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Cyberspace Security, Hainan University, Haikou 570100, China","institution_ids":["https://openalex.org/I20942203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084221506","display_name":"Li Huang","orcid":"https://orcid.org/0000-0001-8113-9546"},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Huang","raw_affiliation_strings":["School of Computer and Cyberspace Security, Hainan University, Haikou 570100, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Cyberspace Security, Hainan University, Haikou 570100, China","institution_ids":["https://openalex.org/I20942203"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067794581","display_name":"Xiaoyi Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaoyi Zhou","raw_affiliation_strings":["School of Computer and Cyberspace Security, Hainan University, Haikou 570100, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Cyberspace Security, Hainan University, Haikou 570100, China","institution_ids":["https://openalex.org/I20942203"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5067794581"],"corresponding_institution_ids":["https://openalex.org/I20942203"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":1.2755,"has_fulltext":true,"cited_by_count":21,"citation_normalized_percentile":{"value":0.83046875,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"2020","issue":null,"first_page":"1","last_page":"12"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.8984239101409912},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.8671907186508179},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.821259081363678},{"id":"https://openalex.org/keywords/rotation","display_name":"Rotation (mathematics)","score":0.5895788073539734},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5304129719734192},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.5172944068908691},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5099166631698608},{"id":"https://openalex.org/keywords/transformation","display_name":"Transformation (genetics)","score":0.4907277822494507},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.48467138409614563},{"id":"https://openalex.org/keywords/layer","display_name":"Layer (electronics)","score":0.44388455152511597},{"id":"https://openalex.org/keywords/least-significant-bit","display_name":"Least significant bit","score":0.4419766366481781},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.41646286845207214},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.34891894459724426},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34234046936035156},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.3397133946418762},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.15976980328559875}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.8984239101409912},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.8671907186508179},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.821259081363678},{"id":"https://openalex.org/C74050887","wikidata":"https://www.wikidata.org/wiki/Q848368","display_name":"Rotation (mathematics)","level":2,"score":0.5895788073539734},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5304129719734192},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.5172944068908691},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5099166631698608},{"id":"https://openalex.org/C204241405","wikidata":"https://www.wikidata.org/wiki/Q461499","display_name":"Transformation (genetics)","level":3,"score":0.4907277822494507},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.48467138409614563},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.44388455152511597},{"id":"https://openalex.org/C4305246","wikidata":"https://www.wikidata.org/wiki/Q3885225","display_name":"Least significant bit","level":2,"score":0.4419766366481781},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.41646286845207214},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.34891894459724426},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34234046936035156},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.3397133946418762},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.15976980328559875},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2020/8840779","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8840779","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8840779.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:ca9c976793ce4f88888395d66f99c785","is_oa":true,"landing_page_url":"https://doaj.org/article/ca9c976793ce4f88888395d66f99c785","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2020 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2020/8840779","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8840779","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8840779.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2547940848","display_name":null,"funder_award_id":"618QN218","funder_id":"https://openalex.org/F4320323370","funder_display_name":"Hainan University"},{"id":"https://openalex.org/G4492112207","display_name":null,"funder_award_id":"hdjy2053","funder_id":"https://openalex.org/F4320322866","funder_display_name":"Natural Science Foundation of Hainan Province"},{"id":"https://openalex.org/G6405669177","display_name":null,"funder_award_id":"2019RC044","funder_id":"https://openalex.org/F4320322866","funder_display_name":"Natural Science Foundation of Hainan Province"},{"id":"https://openalex.org/G7641035153","display_name":null,"funder_award_id":"618QN218","funder_id":"https://openalex.org/F4320322866","funder_display_name":"Natural Science Foundation of Hainan Province"},{"id":"https://openalex.org/G8270022278","display_name":null,"funder_award_id":"2019RC044","funder_id":"https://openalex.org/F4320323370","funder_display_name":"Hainan University"},{"id":"https://openalex.org/G8978760262","display_name":null,"funder_award_id":"hdjy2053","funder_id":"https://openalex.org/F4320323370","funder_display_name":"Hainan University"}],"funders":[{"id":"https://openalex.org/F4320322866","display_name":"Natural Science Foundation of Hainan Province","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320323370","display_name":"Hainan University","ror":"https://ror.org/03q648j11"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3114950669.pdf","grobid_xml":"https://content.openalex.org/works/W3114950669.grobid-xml"},"referenced_works_count":26,"referenced_works":["https://openalex.org/W1974641035","https://openalex.org/W1976117994","https://openalex.org/W2002694962","https://openalex.org/W2059866085","https://openalex.org/W2157624084","https://openalex.org/W2272864816","https://openalex.org/W2372313870","https://openalex.org/W2559284973","https://openalex.org/W2573437058","https://openalex.org/W2574843269","https://openalex.org/W2594629486","https://openalex.org/W2599317452","https://openalex.org/W2794168714","https://openalex.org/W2893014734","https://openalex.org/W2899232677","https://openalex.org/W2909571295","https://openalex.org/W2913784121","https://openalex.org/W2915863155","https://openalex.org/W2936564760","https://openalex.org/W2967243140","https://openalex.org/W2968770874","https://openalex.org/W2981339581","https://openalex.org/W2994673315","https://openalex.org/W2995323315","https://openalex.org/W3011958679","https://openalex.org/W3013484560"],"related_works":["https://openalex.org/W2137394636","https://openalex.org/W2358993821","https://openalex.org/W1516446231","https://openalex.org/W2098152888","https://openalex.org/W1559740347","https://openalex.org/W2040356834","https://openalex.org/W2080353903","https://openalex.org/W2385289568","https://openalex.org/W2381486749","https://openalex.org/W1514507288"],"abstract_inverted_index":{"Watermarking":[0],"technology":[1],"is":[2,94,100,118,136],"commonly":[3],"used":[4],"to":[5,120],"solve":[6],"various":[7],"problems":[8],"in":[9,36,143],"digital":[10],"rights":[11],"management":[12],"and":[13,43,68,76,90,99,149,159],"multimedia":[14],"security.":[15],"If":[16],"a":[17,52],"watermarking":[18,54],"scheme":[19],"with":[20],"multiple":[21],"purposes":[22],"applies":[23],"single":[24],"method,":[25],"it":[26],"will":[27],"easily":[28],"cause":[29],"the":[30,33,40,62,65,87,91,103,107,123,126,133,140,163,169,179],"destruction":[31],"of":[32,46,145],"hidden":[34],"messages":[35],"particular":[37],"attacks.":[38,187],"For":[39],"copyright":[41],"protection":[42],"tamper":[44,170,174],"detection":[45],"color":[47],"images,":[48],"this":[49],"research":[50],"proposed":[51,134,164],"robust-fragile":[53],"scheme.":[55],"The":[56,82],"two":[57],"different":[58],"embedding":[59],"schemes":[60],"embed":[61],"watermark":[63,124,166],"into":[64,102],"R":[66,88],"layer":[67,70,89,93,105],"G":[69,92],"after":[71],"NSST":[72],"(nonsubsampled":[73],"shearlet":[74],"transform)":[75,80],"DWT":[77],"(discrete":[78],"wavelet":[79],"transformation.":[81],"hash":[83],"sequence":[84],"generated":[85],"by":[86,106],"served":[95],"as":[96,156],"fragile":[97,165],"watermarks":[98],"embedded":[101],"B":[104],"LSB":[108],"(least":[109],"significant":[110],"bit)":[111],"method.":[112],"Finally,":[113],"an":[114],"improved":[115],"rotation":[116,127,146],"correction":[117,148],"applied":[119],"better":[121],"extract":[122],"under":[125],"attack.":[128],"Experimental":[129],"results":[130],"show":[131],"that":[132],"method":[135],"more":[137],"accurate":[138],"than":[139],"existing":[141],"ones":[142],"terms":[144],"angle":[147],"can":[150,167],"effectively":[151],"resist":[152],"general":[153],"attacks":[154],"such":[155],"noise,":[157],"filtering,":[158],"JEPG":[160],"compression.":[161],"Moreover,":[162],"locate":[168],"position":[171],"when":[172],"malicious":[173],"occurs.":[175],"Except":[176],"cropping":[177],"attack,":[178],"true-positive":[180],"rate":[181],"(TPR)":[182],"reaches":[183],"1":[184],"for":[185],"all":[186]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
