{"id":"https://openalex.org/W2885286172","doi":"https://doi.org/10.3233/jifs-169857","title":"The structure of novel active content embedding personal intention codes for digital images","display_name":"The structure of novel active content embedding personal intention codes for digital images","publication_year":2018,"publication_date":"2018-08-01","ids":{"openalex":"https://openalex.org/W2885286172","doi":"https://doi.org/10.3233/jifs-169857","mag":"2885286172"},"language":"en","primary_location":{"id":"doi:10.3233/jifs-169857","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-169857","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101736672","display_name":"Hyunmin Lee","orcid":"https://orcid.org/0000-0002-2371-3869"},"institutions":[{"id":"https://openalex.org/I157264075","display_name":"Sangmyung University","ror":"https://ror.org/01x4whx42","country_code":"KR","type":"education","lineage":["https://openalex.org/I157264075"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Hyunmin Lee","raw_affiliation_strings":["Department of Computer Science, Sangmyung University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Sangmyung University, Seoul, South Korea","institution_ids":["https://openalex.org/I157264075"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000989683","display_name":"Sang-ug Kang","orcid":"https://orcid.org/0000-0002-7588-5507"},"institutions":[{"id":"https://openalex.org/I157264075","display_name":"Sangmyung University","ror":"https://ror.org/01x4whx42","country_code":"KR","type":"education","lineage":["https://openalex.org/I157264075"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Sang-ug Kang","raw_affiliation_strings":["Department of Computer Science, Sangmyung University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Sangmyung University, Seoul, South Korea","institution_ids":["https://openalex.org/I157264075"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5000989683"],"corresponding_institution_ids":["https://openalex.org/I157264075"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07466121,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"35","issue":"6","first_page":"6173","last_page":"6180"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13731","display_name":"Advanced Computing and Algorithms","score":0.9850000143051147,"subfield":{"id":"https://openalex.org/subfields/3322","display_name":"Urban Studies"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10627","display_name":"Advanced Image and Video Retrieval Techniques","score":0.9621999859809875,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7947814464569092},{"id":"https://openalex.org/keywords/markup-language","display_name":"Markup language","score":0.761600136756897},{"id":"https://openalex.org/keywords/header","display_name":"Header","score":0.7256632447242737},{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.6353952288627625},{"id":"https://openalex.org/keywords/digital-content","display_name":"Digital content","score":0.5167800188064575},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.49962663650512695},{"id":"https://openalex.org/keywords/plug-in","display_name":"Plug-in","score":0.42789438366889954},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.42071813344955444},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.4138838052749634},{"id":"https://openalex.org/keywords/content","display_name":"Content (measure theory)","score":0.41180047392845154},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4017971456050873},{"id":"https://openalex.org/keywords/xml","display_name":"XML","score":0.3900986909866333},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33053410053253174},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.265727698802948},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.22098273038864136},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.1546638011932373},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.13044381141662598},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1076655387878418}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7947814464569092},{"id":"https://openalex.org/C45874996","wikidata":"https://www.wikidata.org/wiki/Q37045","display_name":"Markup language","level":3,"score":0.761600136756897},{"id":"https://openalex.org/C48105269","wikidata":"https://www.wikidata.org/wiki/Q1141160","display_name":"Header","level":2,"score":0.7256632447242737},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.6353952288627625},{"id":"https://openalex.org/C2779344036","wikidata":"https://www.wikidata.org/wiki/Q11320476","display_name":"Digital content","level":2,"score":0.5167800188064575},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.49962663650512695},{"id":"https://openalex.org/C4924752","wikidata":"https://www.wikidata.org/wiki/Q184148","display_name":"Plug-in","level":2,"score":0.42789438366889954},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.42071813344955444},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.4138838052749634},{"id":"https://openalex.org/C2778152352","wikidata":"https://www.wikidata.org/wiki/Q5165061","display_name":"Content (measure theory)","level":2,"score":0.41180047392845154},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4017971456050873},{"id":"https://openalex.org/C8797682","wikidata":"https://www.wikidata.org/wiki/Q2115","display_name":"XML","level":2,"score":0.3900986909866333},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33053410053253174},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.265727698802948},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.22098273038864136},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1546638011932373},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.13044381141662598},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1076655387878418},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jifs-169857","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-169857","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320322120","display_name":"National Research Foundation of Korea","ror":"https://ror.org/013aysd81"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W602139790","https://openalex.org/W1518144180","https://openalex.org/W1519416598","https://openalex.org/W1664954303","https://openalex.org/W1866063761","https://openalex.org/W2060898162","https://openalex.org/W2089194229","https://openalex.org/W2096905790","https://openalex.org/W2112718891","https://openalex.org/W2112789998","https://openalex.org/W2181673824","https://openalex.org/W2208256015","https://openalex.org/W2541937335","https://openalex.org/W4245702878","https://openalex.org/W7027793918"],"related_works":["https://openalex.org/W2171597999","https://openalex.org/W2189136227","https://openalex.org/W1866537546","https://openalex.org/W630850086","https://openalex.org/W3200508093","https://openalex.org/W4372053344","https://openalex.org/W4287378204","https://openalex.org/W2981957539","https://openalex.org/W3193978431","https://openalex.org/W47352601"],"abstract_inverted_index":{"Personal":[0],"content":[1,36,58,123,128,136],"creation":[2,197],"has":[3],"become":[4],"a":[5,26,105,130],"significant":[6],"part":[7],"of":[8,20,79,104,132,200],"the":[9,17,33,57,75,80,87,97,115,118,127,146,153,160,170,174,196],"media":[10],"industry,":[11],"and":[12,62,64,77,102,108,117,195,198],"sales":[13],"are":[14,163,183],"not":[15],"necessarily":[16],"main":[18,138],"objective":[19],"such":[21],"creators.":[22],"Individual":[23],"creators":[24],"have":[25],"greater":[27],"need":[28],"for":[29],"privacy":[30],"protection;":[31],"therefore,":[32],"novel":[34,88],"active":[35],"(AC)":[37],"approach":[38],"is":[39,52,91,94,176,206],"proposed":[40,122],"to":[41,55,66,185],"address":[42],"this":[43],"need.":[44],"The":[45,121],"Intention":[46],"Markup":[47],"Language":[48],"(InML)":[49],"markup":[50],"language":[51],"also":[53],"introduced":[54],"express":[56],"owner\u2019s":[59],"intentions":[60,188],"systematically":[61],"precisely,":[63],"then":[65],"implement":[67],"these":[68,162],"as":[69,140],"an":[70,112,201],"executable":[71],"code.":[72,120],"To":[73],"overcome":[74],"incompatibility":[76],"inconvenience":[78],"existing":[81],"digital":[82],"rights":[83],"management":[84],"(DRM)":[85],"systems,":[86],"AC":[89,113,154,175,202],"format":[90,101],"proposed.":[92],"This":[93],"based":[95],"on":[96,145,204],"Portable":[98],"Executable":[99],"(PE)":[100],"consists":[103],"PE":[106],"header":[107],"sections,":[109],"followed":[110],"by":[111,134,165],"header,":[114],"content,":[116,161],"intention":[119,171],"virtualization":[124],"technique":[125],"protects":[126],"against":[129],"variety":[131],"attacks":[133],"treating":[135],"in":[137,169,177,192],"memory":[139],"if":[141],"it":[142],"were":[143],"stored":[144],"user\u2019s":[147],"storage.":[148],"Since":[149],"external":[150],"players,":[151],"beyond":[152],"control":[155],"boundary,":[156],"may":[157],"potentially":[158],"expose":[159],"controlled":[164],"hooking":[166],"code":[167],"included":[168],"engine":[172],"while":[173],"use.":[178],"Finally,":[179],"example":[180],"use":[181,199],"cases":[182],"presented":[184],"show":[186],"how":[187],"can":[189],"be":[190],"expressed":[191],"InML":[193],"documents":[194],"file":[203],"Windows":[205],"demonstrated.":[207]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
