{"id":"https://openalex.org/W4377820186","doi":"https://doi.org/10.3233/jifs-230064","title":"Research on blind watermarking algorithm of encrypted holographic 3d geographic information data based on mapping mechanism","display_name":"Research on blind watermarking algorithm of encrypted holographic 3d geographic information data based on mapping mechanism","publication_year":2023,"publication_date":"2023-05-23","ids":{"openalex":"https://openalex.org/W4377820186","doi":"https://doi.org/10.3233/jifs-230064"},"language":"en","primary_location":{"id":"doi:10.3233/jifs-230064","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-230064","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102199079","display_name":"Haiyan Xu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Haiyan Xu","raw_affiliation_strings":["Zhejiang College of Security Technology, Wenzhou Zhejiang, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang College of Security Technology, Wenzhou Zhejiang, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092002052","display_name":"Hao Zhang","orcid":"https://orcid.org/0009-0004-2792-6695"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hao Zhang","raw_affiliation_strings":["Zhejiang College of Security Technology, Wenzhou Zhejiang, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang College of Security Technology, Wenzhou Zhejiang, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062285485","display_name":"Anfeng Zhu","orcid":"https://orcid.org/0000-0003-3615-5488"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Anfeng Zhu","raw_affiliation_strings":["Zhejiang College of Security Technology, Wenzhou Zhejiang, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang College of Security Technology, Wenzhou Zhejiang, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5006963488","display_name":"Gang Xu","orcid":"https://orcid.org/0000-0002-5124-3024"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Gang Xu","raw_affiliation_strings":["Zhejiang College of Security Technology, Wenzhou Zhejiang, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang College of Security Technology, Wenzhou Zhejiang, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5006963488"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.04362002,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"45","issue":"1","first_page":"1527","last_page":"1537"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9854999780654907,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9621000289916992,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.9324219226837158},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.7463545799255371},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6844033002853394},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6401610374450684},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.38692134618759155},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3711669147014618},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3675630986690521},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.35267606377601624},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.2701677680015564},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.07005313038825989}],"concepts":[{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.9324219226837158},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.7463545799255371},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6844033002853394},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6401610374450684},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38692134618759155},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3711669147014618},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3675630986690521},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.35267606377601624},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.2701677680015564},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.07005313038825989}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jifs-230064","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-230064","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W227963014","https://openalex.org/W2989416700","https://openalex.org/W2991500360","https://openalex.org/W2995323315","https://openalex.org/W2996865646","https://openalex.org/W2999057796","https://openalex.org/W3000359270","https://openalex.org/W3033846708","https://openalex.org/W3086883680","https://openalex.org/W3091786012","https://openalex.org/W3103546662","https://openalex.org/W3108944175","https://openalex.org/W3126620009","https://openalex.org/W3130532264","https://openalex.org/W3183334252","https://openalex.org/W3195025797","https://openalex.org/W3211443677","https://openalex.org/W3214614692","https://openalex.org/W4200129459","https://openalex.org/W6786404053","https://openalex.org/W6804583509","https://openalex.org/W7027053106"],"related_works":["https://openalex.org/W2137394636","https://openalex.org/W2358993821","https://openalex.org/W1516446231","https://openalex.org/W2098152888","https://openalex.org/W1559740347","https://openalex.org/W2040356834","https://openalex.org/W2385289568","https://openalex.org/W2381486749","https://openalex.org/W1514507288","https://openalex.org/W2183032046"],"abstract_inverted_index":{"In":[0],"order":[1],"to":[2,43,74,125],"improve":[3,17],"the":[4,18,44,47,58,76,87,97,103,111,115,136,148,152,156,162,166],"accuracy":[5],"and":[6,16,80,114,123,161,188],"security":[7],"of":[8,21,46,155,165,193],"encrypted":[9,30,124],"holographic":[10,31,88,116,137],"3D":[11,32,117,138],"geographic":[12,22,33,90,118,139],"information":[13,23,34,78,91,106,120,140,182,194],"data":[14,35,64,92,119,141,186],"acquisition":[15],"actual":[19],"resolution":[20],"files,":[24],"a":[25,50,68,82],"blind":[26,62,83,98,104,127,131],"watermarking":[27],"algorithm":[28,133,157,168],"for":[29,134],"based":[36],"on":[37],"mapping":[38,48,51,59],"mechanism":[39,52,60],"is":[40,55,65,72,93,107,121,142,169],"proposed.":[41],"According":[42],"characteristics":[45],"mechanism,":[49],"structure":[53],"diagram":[54],"constructed;":[56],"Under":[57],"technology,":[61],"watermark":[63,69,77,84,99,105,112,128,132],"preprocessed.":[66],"Then,":[67],"embedding":[70],"operation":[71],"performed":[73],"obtain":[75],"image,":[79],"then":[81],"that":[85,147],"encrypts":[86],"three-dimensional":[89],"extracted.":[94],"Finally,":[95],"using":[96,110],"signal":[100],"as":[101],"input,":[102],"obtained":[108],"by":[109],"strength,":[113],"segmented":[122],"complete":[126],"detection.":[129],"The":[130,144],"encrypting":[135],"studied.":[143],"results":[145],"show":[146],"maximum":[149],"difference":[150],"between":[151],"correlation":[153,163],"coefficient":[154,164],"in":[158],"this":[159],"paper":[160],"unaffected":[167],"only":[170],"0.04,":[171],"which":[172],"has":[173],"better":[174],"anti":[175],"attack":[176],"performance,":[177],"high":[178,185],"security,":[179],"good":[180],"terrain":[181],"collection":[183],"ability,":[184],"accuracy,":[187],"can":[189],"achieve":[190],"curvature":[191],"repair":[192],"data.":[195]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
