{"id":"https://openalex.org/W4413948316","doi":"https://doi.org/10.1504/ijesdf.2025.148235","title":"Application of audio-video data embedding approach to increase imperceptibility and robustness using forensic detection","display_name":"Application of audio-video data embedding approach to increase imperceptibility and robustness using forensic detection","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4413948316","doi":"https://doi.org/10.1504/ijesdf.2025.148235"},"language":"en","primary_location":{"id":"doi:10.1504/ijesdf.2025.148235","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijesdf.2025.148235","pdf_url":null,"source":{"id":"https://openalex.org/S198660693","display_name":"International Journal of Electronic Security and Digital Forensics","issn_l":"1751-911X","issn":["1751-911X","1751-9128"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Electronic Security and Digital Forensics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012030023","display_name":"Sunil K. Moon","orcid":"https://orcid.org/0000-0002-8828-6300"},"institutions":[{"id":"https://openalex.org/I156406944","display_name":"Defence Institute of Advanced Technology","ror":"https://ror.org/05qpbfx18","country_code":"IN","type":"education","lineage":["https://openalex.org/I156406944"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Sunil K. Moon","raw_affiliation_strings":["Department of Electronics and Telecommunication, SCTRs Pune Institute of Computer Technology (PICT), Pune, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Telecommunication, SCTRs Pune Institute of Computer Technology (PICT), Pune, India","institution_ids":["https://openalex.org/I156406944"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5012030023"],"corresponding_institution_ids":["https://openalex.org/I156406944"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.28465217,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"17","issue":"5","first_page":"666","last_page":"687"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9753999710083008,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9746000170707703,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8756331205368042},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.8288502097129822},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.6278643012046814},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.42467665672302246},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.42008188366889954},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3794756233692169},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3750971257686615},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.35414618253707886},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.353476345539093}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8756331205368042},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.8288502097129822},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.6278643012046814},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.42467665672302246},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.42008188366889954},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3794756233692169},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3750971257686615},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.35414618253707886},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.353476345539093},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1504/ijesdf.2025.148235","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijesdf.2025.148235","pdf_url":null,"source":{"id":"https://openalex.org/S198660693","display_name":"International Journal of Electronic Security and Digital Forensics","issn_l":"1751-911X","issn":["1751-911X","1751-9128"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Electronic Security and Digital Forensics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2361629745","https://openalex.org/W2107922825","https://openalex.org/W2122982227","https://openalex.org/W2163290991","https://openalex.org/W2361184779","https://openalex.org/W3174961728","https://openalex.org/W2474386553","https://openalex.org/W2125329004","https://openalex.org/W2141752560","https://openalex.org/W3134175397"],"abstract_inverted_index":{"Data":[0],"hiding":[1],"using":[2,52,106],"steganography":[3,53,58],"plays":[4],"a":[5,104],"very":[6,33],"important":[7],"role":[8],"in":[9],"providing":[10],"security,":[11,46],"privacy,":[12,74],"authentication,":[13],"and":[14,29,35,43,47,69,75,112,119,134],"robustness":[15],"of":[16,25,49,94,121],"secret":[17,50,64,101,123],"data.":[18],"In":[19],"today's":[20],"digital":[21],"world,":[22],"the":[23,45,81,116,122],"significance":[24],"safeguarding":[26,120],"data":[27,51,65,76,102],"privacy":[28,48,118],"its":[30],"authentication":[31],"is":[32],"crucial":[34],"risky.":[36],"There":[37],"are":[38,60,97],"many":[39],"ways":[40],"to":[41,62,99,140],"protect":[42],"safeguard":[44],"techniques":[54],"but,":[55],"all":[56],"this":[57],"approaches":[59],"used":[61,98],"embed":[63,100],"like":[66],"images,":[67],"text,":[68],"audio":[70],"which":[71],"provide":[72],"less":[73],"security.":[77],"This":[78],"paper":[79],"implemented":[80],"multi":[82],"pixel":[83],"exploiting":[84],"modification":[85],"direction":[86],"(MP-EMD)":[87],"approach":[88],"on":[89],"video":[90],"where":[91],"three":[92],"pixels":[93],"any":[95,141],"frames":[96],"at":[103],"time":[105],"forensics":[107],"detection":[108],"technique.":[109],"The":[110],"simulated":[111],"verified":[113],"results":[114],"verify":[115],"better":[117],"data,":[124],"peak":[125],"signal":[126],"noise":[127],"ratio":[128],"(PSNR),":[129],"correlation":[130],"indicator":[131],"(CI),":[132],"robustness,":[133],"embedding":[135],"capacity":[136],"(EC)":[137],"as":[138],"compared":[139],"existing":[142],"methods.":[143]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
