{"id":"https://openalex.org/W2330072819","doi":"https://doi.org/10.18293/dms2015-029","title":"Joint Fingerprinting and Encryption for JPEG Images Sharing in Mobile Social Network","display_name":"Joint Fingerprinting and Encryption for JPEG Images Sharing in Mobile Social Network","publication_year":2015,"publication_date":"2015-09-01","ids":{"openalex":"https://openalex.org/W2330072819","doi":"https://doi.org/10.18293/dms2015-029","mag":"2330072819"},"language":"en","primary_location":{"id":"doi:10.18293/dms2015-029","is_oa":false,"landing_page_url":"https://doi.org/10.18293/dms2015-029","pdf_url":null,"source":{"id":"https://openalex.org/S4386872205","display_name":"Proceedings","issn_l":"2326-3261","issn":["2326-3261"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conferences on Distributed Multimedia Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046769677","display_name":"Conghuan Ye","orcid":"https://orcid.org/0000-0003-2335-0436"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Conghuan Ye","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005864702","display_name":"Zenggang Xiong","orcid":"https://orcid.org/0000-0003-4467-9599"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zenggang Xiong","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040908045","display_name":"Yaoming Ding","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yaoming Ding","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100603005","display_name":"Guangwei Wang","orcid":"https://orcid.org/0000-0002-1794-0619"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Guangwei Wang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100635320","display_name":"Xuemin Zhang","orcid":"https://orcid.org/0000-0001-9246-1397"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xuemin Zhang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5101844311","display_name":"Fang Xu","orcid":"https://orcid.org/0000-0001-5428-6532"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fang Xu","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5046769677"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.2339,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.53239105,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"2015","issue":null,"first_page":"264","last_page":"273"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.789991021156311},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.74749356508255},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5893244743347168},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.5356798768043518},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.519351601600647},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5160779356956482},{"id":"https://openalex.org/keywords/singular-value-decomposition","display_name":"Singular value decomposition","score":0.48711204528808594},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.4616135358810425},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.44712549448013306},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.35735660791397095},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.34937989711761475},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3479803502559662},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.34235507249832153},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.30199694633483887},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.17496421933174133},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.14785629510879517}],"concepts":[{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.789991021156311},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.74749356508255},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5893244743347168},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.5356798768043518},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.519351601600647},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5160779356956482},{"id":"https://openalex.org/C22789450","wikidata":"https://www.wikidata.org/wiki/Q420904","display_name":"Singular value decomposition","level":2,"score":0.48711204528808594},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.4616135358810425},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.44712549448013306},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.35735660791397095},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.34937989711761475},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3479803502559662},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.34235507249832153},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.30199694633483887},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.17496421933174133},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.14785629510879517},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.18293/dms2015-029","is_oa":false,"landing_page_url":"https://doi.org/10.18293/dms2015-029","pdf_url":null,"source":{"id":"https://openalex.org/S4386872205","display_name":"Proceedings","issn_l":"2326-3261","issn":["2326-3261"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conferences on Distributed Multimedia Systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W284492748","https://openalex.org/W1675665627","https://openalex.org/W1866002461","https://openalex.org/W1968919465","https://openalex.org/W1973782209","https://openalex.org/W1974624672","https://openalex.org/W1996966518","https://openalex.org/W2000093475","https://openalex.org/W2003120523","https://openalex.org/W2018838102","https://openalex.org/W2020039621","https://openalex.org/W2024271616","https://openalex.org/W2026787072","https://openalex.org/W2030411764","https://openalex.org/W2031722321","https://openalex.org/W2037472346","https://openalex.org/W2038473034","https://openalex.org/W2040680561","https://openalex.org/W2043436174","https://openalex.org/W2045044689","https://openalex.org/W2045893432","https://openalex.org/W2051439587","https://openalex.org/W2053676937","https://openalex.org/W2055084689","https://openalex.org/W2076062440","https://openalex.org/W2078537125","https://openalex.org/W2080191958","https://openalex.org/W2080311139","https://openalex.org/W2083386243","https://openalex.org/W2091202730","https://openalex.org/W2093945134","https://openalex.org/W2105145864","https://openalex.org/W2121029817","https://openalex.org/W2132984323","https://openalex.org/W2134195444","https://openalex.org/W2144622095","https://openalex.org/W2164594514","https://openalex.org/W2535673711"],"related_works":["https://openalex.org/W2373405822","https://openalex.org/W2137394636","https://openalex.org/W2155762682","https://openalex.org/W2080482078","https://openalex.org/W1978162990","https://openalex.org/W1597187555","https://openalex.org/W2614249221","https://openalex.org/W2997133669","https://openalex.org/W2108294500","https://openalex.org/W2158017498"],"abstract_inverted_index":{"The":[0,125,156],"advent":[1],"of":[2,58,69,131,158,167,184,193],"mobile":[3,75],"social":[4,10,14,31,76,85,174,226],"network":[5,15,86],"and":[6,17,27,34,41,51,61,109,115,122,141,150,178,198,228],"smartphone":[7],"has":[8,201],"made":[9],"multimedia":[11,32],"sharing":[12,33,73,172,224],"in":[13,74,143,152,173,209,225],"easier":[16],"more":[18],"efficient.":[19],"However,":[20],"it":[21],"can":[22,163,220],"also":[23],"cause":[24],"serious":[25],"security":[26,149],"privacy":[28,151],"problems,":[29],"secure":[30,221],"traitor":[35],"tracing":[36],"issues":[37],"have":[38],"become":[39],"critical":[40],"urgent.":[42],"In":[43,214],"this":[44],"paper,":[45],"we":[46],"propose":[47],"a":[48,90,165,202],"joint":[49],"fingerprinting":[50,159],"encryption":[52,162],"(JFE)":[53],"scheme":[54],"based":[55],"on":[56,205],"Game":[57],"Life":[59],"(GL)":[60],"singular":[62],"value":[63],"decomposition":[64],"(SVD)":[65],"with":[66,161],"the":[67,79,106,129,135,144,182,185,191,215,230],"purpose":[68],"protecting":[70],"JPEG":[71,145,153,170,222],"images":[72,154,171,223],"networks.":[77],"Firstly,":[78],"fingerprint":[80],"code":[81],"is":[82,99,134],"produced":[83],"using":[84,139],"analysis.":[87],"After":[88],"that,":[89],"fast":[91],"inter-":[92],"transformation":[93],"from":[94],"block":[95,196],"DCTs":[96],"to":[97,119,128,169],"DWT":[98,200],"employed.":[100],"Then,":[101],"fingerprints":[102],"are":[103,117],"embedded":[104],"into":[105],"LL,":[107],"HL":[108],"LH":[110],"subbands.":[111],"At":[112],"last,":[113],"GL":[114,140],"SVD":[116,142],"used":[118],"for":[120,148],"confusion":[121],"diffusion":[123],"respectively.":[124],"proposed":[126,186,211],"method,":[127],"best":[130],"our":[132,210,217],"knowledge,":[133],"first":[136],"JFE":[137,187,212,218],"method":[138,219],"compressed":[146],"domain":[147],"sharing.":[155],"use":[157],"along":[160],"provide":[164],"double-layer":[166],"protection":[168],"network.":[175],"Theory":[176],"analysis":[177],"experimental":[179],"results":[180],"show":[181],"effectiveness":[183],"scheme.":[188,213],"Most":[189],"importantly,":[190],"performance":[192],"inter-transformation":[194],"between":[195],"DCT":[197],"one-level":[199],"profound":[203],"effect":[204],"lowering":[206],"computational":[207],"cost":[208],"end,":[216],"networks":[227],"meet":[229],"real-time":[231],"requirement.":[232]},"counts_by_year":[{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
