{"id":"https://openalex.org/W2757465769","doi":"https://doi.org/10.15439/2017f177","title":"Selective Image Authentication Using Shearlet Coefficients Tolerant to JPEG Compression","display_name":"Selective Image Authentication Using Shearlet Coefficients Tolerant to JPEG Compression","publication_year":2017,"publication_date":"2017-09-24","ids":{"openalex":"https://openalex.org/W2757465769","doi":"https://doi.org/10.15439/2017f177","mag":"2757465769"},"language":"en","primary_location":{"id":"doi:10.15439/2017f177","is_oa":true,"landing_page_url":"https://doi.org/10.15439/2017f177","pdf_url":"https://annals-csis.org/proceedings/2017/drp/pdf/177.pdf","source":{"id":"https://openalex.org/S4220651875","display_name":"Annals of Computer Science and Information Systems","issn_l":"2300-5963","issn":["2300-5963"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310317484","host_organization_name":"Polskie Towarzystwo Informatyczne","host_organization_lineage":["https://openalex.org/P4310317484"],"host_organization_lineage_names":["Polskie Towarzystwo Informatyczne"],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annals of Computer Science and Information Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://annals-csis.org/proceedings/2017/drp/pdf/177.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5104096884","display_name":"Aleksei Zhuvikin","orcid":null},"institutions":[{"id":"https://openalex.org/I37355250","display_name":"Saint-Petersburg State University of Telecommunications","ror":"https://ror.org/00pcyc255","country_code":"RU","type":"education","lineage":["https://openalex.org/I37355250"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"Aleksei Zhuvikin","raw_affiliation_strings":["Department of Secured Communication Systems, The Bonch-Bruevich Saint Petersburg State University of Telecommunications Saint-Petersburg, Russia"],"affiliations":[{"raw_affiliation_string":"Department of Secured Communication Systems, The Bonch-Bruevich Saint Petersburg State University of Telecommunications Saint-Petersburg, Russia","institution_ids":["https://openalex.org/I37355250"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5104096884"],"corresponding_institution_ids":["https://openalex.org/I37355250"],"apc_list":null,"apc_paid":null,"fwci":0.0985,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.41681159,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"11","issue":null,"first_page":"681","last_page":"688"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10901","display_name":"Advanced Data Compression Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/shearlet","display_name":"Shearlet","score":0.8907042741775513},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.7178783416748047},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.6728367805480957},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6622518301010132},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.6568667888641357},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.6436524391174316},{"id":"https://openalex.org/keywords/transform-coding","display_name":"Transform coding","score":0.5515954494476318},{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.5089511871337891},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.503642737865448},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5027337074279785},{"id":"https://openalex.org/keywords/top-hat-transform","display_name":"Top-hat transform","score":0.4744739830493927},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4743037223815918},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.4698053002357483},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4213762879371643},{"id":"https://openalex.org/keywords/digital-image","display_name":"Digital image","score":0.4172183871269226},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.31037789583206177},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.27498844265937805},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.06264537572860718}],"concepts":[{"id":"https://openalex.org/C67795661","wikidata":"https://www.wikidata.org/wiki/Q17018993","display_name":"Shearlet","level":3,"score":0.8907042741775513},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7178783416748047},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.6728367805480957},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6622518301010132},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.6568667888641357},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.6436524391174316},{"id":"https://openalex.org/C169805256","wikidata":"https://www.wikidata.org/wiki/Q1361381","display_name":"Transform coding","level":4,"score":0.5515954494476318},{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.5089511871337891},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.503642737865448},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5027337074279785},{"id":"https://openalex.org/C180064427","wikidata":"https://www.wikidata.org/wiki/Q2880017","display_name":"Top-hat transform","level":5,"score":0.4744739830493927},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4743037223815918},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.4698053002357483},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4213762879371643},{"id":"https://openalex.org/C42781572","wikidata":"https://www.wikidata.org/wiki/Q1250322","display_name":"Digital image","level":4,"score":0.4172183871269226},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.31037789583206177},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.27498844265937805},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.06264537572860718},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.15439/2017f177","is_oa":true,"landing_page_url":"https://doi.org/10.15439/2017f177","pdf_url":"https://annals-csis.org/proceedings/2017/drp/pdf/177.pdf","source":{"id":"https://openalex.org/S4220651875","display_name":"Annals of Computer Science and Information Systems","issn_l":"2300-5963","issn":["2300-5963"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310317484","host_organization_name":"Polskie Towarzystwo Informatyczne","host_organization_lineage":["https://openalex.org/P4310317484"],"host_organization_lineage_names":["Polskie Towarzystwo Informatyczne"],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annals of Computer Science and Information Systems","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.15439/2017f177","is_oa":true,"landing_page_url":"https://doi.org/10.15439/2017f177","pdf_url":"https://annals-csis.org/proceedings/2017/drp/pdf/177.pdf","source":{"id":"https://openalex.org/S4220651875","display_name":"Annals of Computer Science and Information Systems","issn_l":"2300-5963","issn":["2300-5963"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310317484","host_organization_name":"Polskie Towarzystwo Informatyczne","host_organization_lineage":["https://openalex.org/P4310317484"],"host_organization_lineage_names":["Polskie Towarzystwo Informatyczne"],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annals of Computer Science and Information Systems","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2757465769.pdf","grobid_xml":"https://content.openalex.org/works/W2757465769.grobid-xml"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W13227856","https://openalex.org/W97246116","https://openalex.org/W583222442","https://openalex.org/W1586355707","https://openalex.org/W1624159198","https://openalex.org/W1966921837","https://openalex.org/W2010398978","https://openalex.org/W2065166621","https://openalex.org/W2088226635","https://openalex.org/W2114770744","https://openalex.org/W2128765501","https://openalex.org/W2132896631","https://openalex.org/W2140196014","https://openalex.org/W2146513066","https://openalex.org/W2151152358","https://openalex.org/W2159854007","https://openalex.org/W2162052795","https://openalex.org/W2330691748","https://openalex.org/W2357996368","https://openalex.org/W2492364657","https://openalex.org/W2511555432","https://openalex.org/W2963344999","https://openalex.org/W2964213580","https://openalex.org/W4231293494","https://openalex.org/W4300188436","https://openalex.org/W6678839936","https://openalex.org/W6683486372","https://openalex.org/W6683737632","https://openalex.org/W6706661041"],"related_works":["https://openalex.org/W2601209352","https://openalex.org/W4220747575","https://openalex.org/W2164990255","https://openalex.org/W4313377945","https://openalex.org/W2111280862","https://openalex.org/W2167365418","https://openalex.org/W2545896937","https://openalex.org/W2049997602","https://openalex.org/W2099087328","https://openalex.org/W2156451585"],"abstract_inverted_index":{"A":[0],"novel":[1],"selective":[2,102],"image":[3,63,82,103,116,121],"authentication":[4,70,104],"system":[5,105],"based":[6],"on":[7],"the":[8,24,28,34,40,48,62,69,81,83,89,100],"robust":[9],"digital":[10,59],"watermarking":[11],"is":[12,18,36,106],"proposed.":[13],"The":[14,30,51],"discrete":[15],"shearlet":[16,41],"transform":[17,35,92],"performed":[19],"in":[20,108],"order":[21,75],"to":[22,38,46,55,76,112],"extract":[23],"feature":[25,64],"vector":[26,65],"from":[27],"image.":[29],"cone-adapted":[31],"version":[32],"of":[33,88,110],"used":[37],"calculate":[39],"coefficients":[42,93],"more":[43,72],"precisely":[44],"and":[45,67,86,119],"avoid":[47],"biased":[49],"treatment.":[50],"proposed":[52,101],"approach":[53],"allows":[54],"use":[56],"conventional":[57],"cryptographic":[58],"signature":[60],"for":[61],"verification":[66],"makes":[68],"scheme":[71],"secure.":[73],"In":[74],"embed":[77],"watermark":[78],"(WM)":[79],"into":[80],"areas":[84],"HL3":[85],"LH3":[87],"Haar":[90],"wavelet":[91],"are":[94],"used.":[95],"Experimental":[96],"results":[97],"show":[98],"that":[99],"effective":[107],"terms":[109],"tolerance":[111],"JPEG":[113],"compression,":[114],"malicious":[115],"tampering":[117],"detection":[118],"visual":[120],"quality":[122],"just":[123],"after":[124],"embedding.":[125]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
