{"id":"https://openalex.org/W387710534","doi":"https://doi.org/10.4018/ijdcf.2015010103","title":"Watermark Embedding for Multiscale Error Diffused Halftone Images by Adopting Visual Cryptography","display_name":"Watermark Embedding for Multiscale Error Diffused Halftone Images by Adopting Visual Cryptography","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W387710534","doi":"https://doi.org/10.4018/ijdcf.2015010103","mag":"387710534"},"language":"en","primary_location":{"id":"doi:10.4018/ijdcf.2015010103","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijdcf.2015010103","pdf_url":null,"source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Digital Crime and Forensics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030187602","display_name":"Yuanfang Guo","orcid":"https://orcid.org/0000-0003-4592-8083"},"institutions":[{"id":"https://openalex.org/I200769079","display_name":"Hong Kong University of Science and Technology","ror":"https://ror.org/00q4vv597","country_code":"HK","type":"education","lineage":["https://openalex.org/I200769079"]}],"countries":["HK"],"is_corresponding":true,"raw_author_name":"Yuanfang Guo","raw_affiliation_strings":["HKUST, Hong Kong SAR, China"],"affiliations":[{"raw_affiliation_string":"HKUST, Hong Kong SAR, China","institution_ids":["https://openalex.org/I200769079"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010546001","display_name":"Oscar C. Au","orcid":null},"institutions":[{"id":"https://openalex.org/I200769079","display_name":"Hong Kong University of Science and Technology","ror":"https://ror.org/00q4vv597","country_code":"HK","type":"education","lineage":["https://openalex.org/I200769079"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Oscar C. Au","raw_affiliation_strings":["HKUST, Hong Kong SAR, China"],"affiliations":[{"raw_affiliation_string":"HKUST, Hong Kong SAR, China","institution_ids":["https://openalex.org/I200769079"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111982778","display_name":"Ketan Tang","orcid":null},"institutions":[{"id":"https://openalex.org/I200769079","display_name":"Hong Kong University of Science and Technology","ror":"https://ror.org/00q4vv597","country_code":"HK","type":"education","lineage":["https://openalex.org/I200769079"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Ketan Tang","raw_affiliation_strings":["HKUST, Hong Kong SAR, China"],"affiliations":[{"raw_affiliation_string":"HKUST, Hong Kong SAR, China","institution_ids":["https://openalex.org/I200769079"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5030187602"],"corresponding_institution_ids":["https://openalex.org/I200769079"],"apc_list":null,"apc_paid":null,"fwci":0.5996,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.72844959,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"7","issue":"1","first_page":"51","last_page":"68"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11666","display_name":"Color Science and Applications","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/3107","display_name":"Atomic and Molecular Physics, and Optics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11019","display_name":"Image Enhancement Techniques","score":0.9825999736785889,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/halftone","display_name":"Halftone","score":0.9994577765464783},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.825701892375946},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.6904788017272949},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6491241455078125},{"id":"https://openalex.org/keywords/visual-cryptography","display_name":"Visual cryptography","score":0.6367608308792114},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.6248739957809448},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.6179143786430359},{"id":"https://openalex.org/keywords/moir\u00e9-pattern","display_name":"Moir\u00e9 pattern","score":0.4858929514884949},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.4656413793563843},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.42668968439102173},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.4148351848125458},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.35940611362457275},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.30811119079589844},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.06983891129493713}],"concepts":[{"id":"https://openalex.org/C2777635815","wikidata":"https://www.wikidata.org/wiki/Q1110021","display_name":"Halftone","level":3,"score":0.9994577765464783},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.825701892375946},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.6904788017272949},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6491241455078125},{"id":"https://openalex.org/C2779072331","wikidata":"https://www.wikidata.org/wiki/Q1597418","display_name":"Visual cryptography","level":4,"score":0.6367608308792114},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.6248739957809448},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.6179143786430359},{"id":"https://openalex.org/C70000540","wikidata":"https://www.wikidata.org/wiki/Q26468","display_name":"Moir\u00e9 pattern","level":2,"score":0.4858929514884949},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.4656413793563843},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.42668968439102173},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.4148351848125458},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.35940611362457275},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.30811119079589844},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.06983891129493713}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.4018/ijdcf.2015010103","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijdcf.2015010103","pdf_url":null,"source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Digital Crime and Forensics","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jdcf00:v:7:y:2015:i:1:p:51-68","is_oa":false,"landing_page_url":"http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJDCF.2015010103","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"article"},{"id":"pmh:oai:repository.hkust.edu.hk:1783.1-68672","is_oa":false,"landing_page_url":"http://repository.hkust.edu.hk/ir/Record/1783.1-68672","pdf_url":null,"source":{"id":"https://openalex.org/S4306401796","display_name":"Rare & Special e-Zone (The Hong Kong University of Science and Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I200769079","host_organization_name":"Hong Kong University of Science and Technology","host_organization_lineage":["https://openalex.org/I200769079"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6100000143051147}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W289277348","https://openalex.org/W1922147707","https://openalex.org/W1939717569","https://openalex.org/W1965464255","https://openalex.org/W1987592232","https://openalex.org/W1990653582","https://openalex.org/W2005047329","https://openalex.org/W2006704095","https://openalex.org/W2016243271","https://openalex.org/W2022324368","https://openalex.org/W2024494080","https://openalex.org/W2034020304","https://openalex.org/W2044159020","https://openalex.org/W2045317785","https://openalex.org/W2045772684","https://openalex.org/W2053717006","https://openalex.org/W2055239721","https://openalex.org/W2062685502","https://openalex.org/W2070464844","https://openalex.org/W2074685092","https://openalex.org/W2076523515","https://openalex.org/W2099184686","https://openalex.org/W2099202463","https://openalex.org/W2099884310","https://openalex.org/W2100911378","https://openalex.org/W2104578160","https://openalex.org/W2106686446","https://openalex.org/W2111233756","https://openalex.org/W2111707307","https://openalex.org/W2114504939","https://openalex.org/W2129824553","https://openalex.org/W2131062190","https://openalex.org/W2133850979","https://openalex.org/W2134629964","https://openalex.org/W2139603263","https://openalex.org/W2141357621","https://openalex.org/W2144085591","https://openalex.org/W2147423329","https://openalex.org/W2155107565","https://openalex.org/W2155658721","https://openalex.org/W2155811265","https://openalex.org/W2159785038","https://openalex.org/W2164896194","https://openalex.org/W2542723123","https://openalex.org/W2728405032"],"related_works":["https://openalex.org/W2354008177","https://openalex.org/W96325096","https://openalex.org/W1974139717","https://openalex.org/W196726375","https://openalex.org/W2021479660","https://openalex.org/W1990603863","https://openalex.org/W2133783433","https://openalex.org/W1992710232","https://openalex.org/W2078094010","https://openalex.org/W2549188609"],"abstract_inverted_index":{"Error":[0,92],"Diffusion":[1,93],"has":[2,32],"been":[3,33],"widely":[4],"adopted":[5],"in":[6,76,95,149],"the":[7,81,100,117,127,145],"printing":[8],"industry":[9],"due":[10],"to":[11,43,59,157],"its":[12,24],"good":[13],"visual":[14,68,101],"quality":[15],"and":[16,35],"simple":[17],"implementation.":[18],"However,":[19],"error":[20,29,40],"diffusion":[21,30,41],"still":[22],"possesses":[23],"own":[25],"deficiencies.":[26],"Thus":[27],"multiscale":[28],"(MED)":[31],"developed,":[34],"this":[36,96],"method":[37,71,84],"outperforms":[38],"traditional":[39],"according":[42],"extensive":[44],"research":[45],"results.":[46,147],"The":[47],"majority":[48],"of":[49],"previous":[50],"halftone":[51,61,67,74,87,114,130],"image":[52],"watermarking":[53,69],"techniques":[54],"cannot":[55],"be":[56,121],"directly":[57],"applied":[58],"MED":[60,73,86,113],"images.":[62],"Since":[63],"there":[64],"is":[65,140],"no":[66],"(HVW)":[70],"for":[72,85],"images":[75,131],"existing":[77,158],"methods,":[78],"we":[79],"propose":[80],"first":[82],"HVW":[83],"images,":[88,115],"Copyright":[89],"Protecting":[90],"Multiscale":[91],"(CoP-MED),":[94],"paper.":[97],"By":[98],"adopting":[99],"cryptography":[102],"principle,":[103],"CoP-MED":[104,152],"can":[105,120],"effectively":[106],"embed":[107],"a":[108],"secret":[109,118],"pattern":[110,119],"into":[111],"two":[112,128],"where":[116],"decoded":[122],"clearly":[123],"by":[124],"simply":[125],"overlaying":[126],"stego":[129],"or":[132],"performing":[133],"not-exclusive-or":[134],"operation":[135],"between":[136],"them.":[137],"Parameter":[138],"selection":[139],"also":[141],"discussed":[142],"based":[143],"on":[144],"experimental":[146],"Later,":[148],"comparison":[150],"tests,":[151],"shows":[153],"superior":[154],"performance":[155],"compared":[156],"works.":[159]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
