{"id":"https://openalex.org/W4385350514","doi":"https://doi.org/10.3233/jifs-222182","title":"A secure fractional-order polar harmonic transforms based image watermarking scheme using funk singular value decomposition","display_name":"A secure fractional-order polar harmonic transforms based image watermarking scheme using funk singular value decomposition","publication_year":2023,"publication_date":"2023-07-28","ids":{"openalex":"https://openalex.org/W4385350514","doi":"https://doi.org/10.3233/jifs-222182"},"language":"en","primary_location":{"id":"doi:10.3233/jifs-222182","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-222182","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023027981","display_name":"G. Thirugnanam","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"G. Thirugnanam","raw_affiliation_strings":["Department of Electronics and Communication Engineering, Government College of Technology, Thadagam Road, Coimbatore, Tamil Nadu, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Communication Engineering, Government College of Technology, Thadagam Road, Coimbatore, Tamil Nadu, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069610356","display_name":"Jennathu Beevi Sahul Hameed","orcid":null},"institutions":[{"id":"https://openalex.org/I94948490","display_name":"B.S. Abdur Rahman Crescent Institute of Science & Technology","ror":"https://ror.org/01fqhas03","country_code":"IN","type":"education","lineage":["https://openalex.org/I94948490"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Jennathu Beevi Sahul Hameed","raw_affiliation_strings":["Department of Electrical and Electronics Engineering, B. S. Abdur Rahman Crescent Institute of Science and Technology, Chennai, India"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Electronics Engineering, B. S. Abdur Rahman Crescent Institute of Science and Technology, Chennai, India","institution_ids":["https://openalex.org/I94948490"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010245921","display_name":"B. Bharathidasan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"B. Bharathidasan","raw_affiliation_strings":["Department of Electronics and Communication Engineering, Sree Rama Engineering College, Tirupati, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Communication Engineering, Sree Rama Engineering College, Tirupati, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5023027981"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.1235,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.39679741,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"45","issue":"6","first_page":"9499","last_page":"9521"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.8739326596260071},{"id":"https://openalex.org/keywords/singular-value-decomposition","display_name":"Singular value decomposition","score":0.7857783436775208},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.6879031658172607},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.576988697052002},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.46379145979881287},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4328004717826843},{"id":"https://openalex.org/keywords/singular-value","display_name":"Singular value","score":0.4255746901035309},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4167347550392151},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.4078351855278015},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.39051738381385803},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.37871241569519043},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.37013113498687744},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.36788928508758545},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3642372488975525},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.092561274766922}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.8739326596260071},{"id":"https://openalex.org/C22789450","wikidata":"https://www.wikidata.org/wiki/Q420904","display_name":"Singular value decomposition","level":2,"score":0.7857783436775208},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.6879031658172607},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.576988697052002},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.46379145979881287},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4328004717826843},{"id":"https://openalex.org/C109282560","wikidata":"https://www.wikidata.org/wiki/Q4166054","display_name":"Singular value","level":3,"score":0.4255746901035309},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4167347550392151},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.4078351855278015},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.39051738381385803},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.37871241569519043},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.37013113498687744},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.36788928508758545},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3642372488975525},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.092561274766922},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C158693339","wikidata":"https://www.wikidata.org/wiki/Q190524","display_name":"Eigenvalues and eigenvectors","level":2,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jifs-222182","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-222182","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W2891850589","https://openalex.org/W2894589755","https://openalex.org/W2897325195","https://openalex.org/W2910894932","https://openalex.org/W2913312094","https://openalex.org/W2914187653","https://openalex.org/W2943764139","https://openalex.org/W2954066189","https://openalex.org/W2970373593","https://openalex.org/W2971016973","https://openalex.org/W2999616574","https://openalex.org/W3004014092","https://openalex.org/W3010066411","https://openalex.org/W3019382272","https://openalex.org/W3030351459","https://openalex.org/W3034148801","https://openalex.org/W3047050054","https://openalex.org/W3082349461","https://openalex.org/W3092506402","https://openalex.org/W3096594426","https://openalex.org/W3099557286","https://openalex.org/W3106527215","https://openalex.org/W3158662940","https://openalex.org/W3161133142","https://openalex.org/W3164663807","https://openalex.org/W3188104828","https://openalex.org/W3199325298","https://openalex.org/W3205119036","https://openalex.org/W4205639997","https://openalex.org/W4255937722","https://openalex.org/W4289838602","https://openalex.org/W4292430200","https://openalex.org/W4308146468","https://openalex.org/W4360618912","https://openalex.org/W6784123920","https://openalex.org/W6802172957","https://openalex.org/W6810215027","https://openalex.org/W6841885272"],"related_works":["https://openalex.org/W2358993821","https://openalex.org/W1516446231","https://openalex.org/W1559740347","https://openalex.org/W2098152888","https://openalex.org/W2040356834","https://openalex.org/W2385289568","https://openalex.org/W2381486749","https://openalex.org/W1514507288","https://openalex.org/W2137394636","https://openalex.org/W2389681530"],"abstract_inverted_index":{"In":[0],"addition":[1],"to":[2,11,22,50,118,127,146,200],"existing":[3,291],"cryptographic":[4],"systems,":[5],"watermarking":[6,16,33,45,69,99],"technologies":[7],"have":[8],"been":[9],"developed":[10],"add":[12],"extra":[13],"security.":[14],"Digital":[15],"utilizes":[17],"embedding":[18,36],"or":[19],"hiding":[20],"techniques":[21,34],"protect":[23],"multimedia":[24],"files":[25],"from":[26,130,158],"copyright":[27],"violations.":[28],"Fundamental":[29],"procedures":[30],"of":[31,67,91,164],"digital":[32],"are":[35,156],"and":[37,56,79,107,133,136,184,211,224,234,246,258,271,284,297],"extraction.":[38],"Singular":[39,104,171],"value":[40,73,78],"decomposition":[41],"(SVD)":[42],"based":[43,101],"Image":[44],"schemes":[46],"become":[47],"popular":[48],"owing":[49],"its":[51],"better":[52],"trade-off":[53],"among":[54],"robustness":[55],"imperceptibility.":[57],"Nevertheless,":[58],"false":[59],"positive":[60],"problem":[61],"(FPP)":[62],"is":[63,75,87,113,125,144,182,196,207,213],"a":[64,76],"major":[65],"issue":[66],"SVD-based":[68],"schemes.":[70],"The":[71,122,141,153,226],"singular":[72],"that":[74],"fixed":[77],"does":[80],"not":[81],"contain":[82],"structural":[83],"information":[84,149],"about":[85],"image":[86,98,160,181,266,279],"the":[88,131,177,193,204],"primary":[89],"cause":[90],"FPP":[92],"problem.":[93,121],"Therefore,":[94],"Message":[95],"Digest":[96],"algorithm":[97,124],"scheme":[100],"on":[102],"Funk":[103,170],"Value":[105,172],"Decomposition":[106,173],"Fractional-Order":[108,165],"Polar":[109,166],"Harmonic":[110,167],"Transform":[111],"(FSVD-FOPHT)":[112],"proposed":[114,205,227],"in":[115,150,209],"this":[116,120],"paper":[117],"address":[119,201],"MD-5":[123],"used":[126,197],"extract":[128],"data":[129],"host":[132,151],"watermark":[134,148,180],"imageries":[135],"then":[137,185],"create":[138],"secret":[139,154,194],"key.":[140],"FSVD-FOPHT":[142],"method":[143,206,228],"utilized":[145],"hide":[147],"image.":[152,189],"keys":[155],"extracted":[157],"hided":[159],"using":[161,176],"inverse":[162],"process":[163],"Transforms":[168],"with":[169,215,290],"algorithm.":[174],"By":[175],"extraction":[178,191,287],"procedure,":[179,192],"extracted,":[183],"reconstructs":[186],"original":[187],"watermarked":[188],"During":[190],"key":[195],"for":[198,238,250,263,276],"authentication":[199],"FPP.":[202],"Then,":[203],"implemented":[208],"MATLAB":[210],"performance":[212],"analyzed":[214],"evaluation":[216],"metrics,":[217],"such":[218],"as":[219],"Embedding":[220,261,274],"capacity,":[221],"MSE,":[222],"PSNR,":[223],"NC.":[225],"provide":[229],"14.6%,":[230],"17.34%,":[231],"19.53%,":[232],"21.46%":[233],"23.89%":[235],"high":[236,248,260,273],"PSNR":[237,249],"cold-snow-landscape-water":[239,264],"test":[240,265],"image,":[241,253],"14.29%,":[242],"16.47%,":[243],"18.39%,":[244],"20.16%":[245],"21.93%":[247],"landscape-nature-sky-blue":[251,277],"Test":[252,278],"16.85%,":[254],"19.99%,":[255],"22.70%,":[256],"27.22%":[257],"29.16%":[259],"Capacity":[262,275],"22.83%,":[267],"24.64%,":[268],"27.92%,":[269],"29.60%":[270],"31.77%":[272],"35.38%,":[280],"32.63%,":[281],"30.95%,":[282],"28.61%":[283],"26.08%":[285],"low":[286],"time":[288],"compared":[289],"methods":[292],"SVD-CMSF-SIW,":[293],"FE-IWS-DNN,":[294],"AR-IWS-DNN,":[295],"BBET-SHA1-SIW":[296],"LSB-DWT-SIW":[298],"respectively.":[299]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
