{"id":"https://openalex.org/W1435029951","doi":"https://doi.org/10.4018/ijdcf.2015070101","title":"A Semi-Fragile Reversible Watermarking for 2D CAD Engineering Graphics with Accurate Tampering Localization","display_name":"A Semi-Fragile Reversible Watermarking for 2D CAD Engineering Graphics with Accurate Tampering Localization","publication_year":2015,"publication_date":"2015-07-01","ids":{"openalex":"https://openalex.org/W1435029951","doi":"https://doi.org/10.4018/ijdcf.2015070101","mag":"1435029951"},"language":"en","primary_location":{"id":"doi:10.4018/ijdcf.2015070101","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijdcf.2015070101","pdf_url":null,"source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Digital Crime and Forensics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078874201","display_name":"Min Long","orcid":"https://orcid.org/0000-0002-1229-2317"},"institutions":[{"id":"https://openalex.org/I56934997","display_name":"Changsha University of Science and Technology","ror":"https://ror.org/03yph8055","country_code":"CN","type":"education","lineage":["https://openalex.org/I56934997"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Min Long","raw_affiliation_strings":["School of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha, China","institution_ids":["https://openalex.org/I56934997"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100389794","display_name":"Yan Liu","orcid":"https://orcid.org/0000-0003-0906-2606"},"institutions":[{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yan Liu","raw_affiliation_strings":["Hunan University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"Hunan University, Changsha, China","institution_ids":["https://openalex.org/I16609230"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049120636","display_name":"Fei Peng","orcid":"https://orcid.org/0000-0001-8053-4587"},"institutions":[{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fei Peng","raw_affiliation_strings":["School of Information Science and Engineering, Hunan University, Changsha, China","[School of Information Science and Engineering, Hunan University, ChangSha, China]"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Hunan University, Changsha, China","institution_ids":["https://openalex.org/I16609230"]},{"raw_affiliation_string":"[School of Information Science and Engineering, Hunan University, ChangSha, China]","institution_ids":["https://openalex.org/I16609230"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5078874201"],"corresponding_institution_ids":["https://openalex.org/I56934997"],"apc_list":null,"apc_paid":null,"fwci":0.1841,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.54363338,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"7","issue":"3","first_page":"1","last_page":"18"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cad","display_name":"CAD","score":0.8355513215065002},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.7862207293510437},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7705346345901489},{"id":"https://openalex.org/keywords/graphics","display_name":"Graphics","score":0.7263351678848267},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.7233224511146545},{"id":"https://openalex.org/keywords/invisibility","display_name":"Invisibility","score":0.6927098035812378},{"id":"https://openalex.org/keywords/rotation","display_name":"Rotation (mathematics)","score":0.5037102103233337},{"id":"https://openalex.org/keywords/computer-graphics","display_name":"Computer graphics","score":0.46654748916625977},{"id":"https://openalex.org/keywords/translation","display_name":"Translation (biology)","score":0.42550522089004517},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.42246925830841064},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3445035219192505},{"id":"https://openalex.org/keywords/computer-graphics","display_name":"Computer graphics (images)","score":0.3153883218765259},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.23299679160118103},{"id":"https://openalex.org/keywords/engineering-drawing","display_name":"Engineering drawing","score":0.19620761275291443},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12162366509437561},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.07587960362434387}],"concepts":[{"id":"https://openalex.org/C194789388","wikidata":"https://www.wikidata.org/wiki/Q17855283","display_name":"CAD","level":2,"score":0.8355513215065002},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.7862207293510437},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7705346345901489},{"id":"https://openalex.org/C21442007","wikidata":"https://www.wikidata.org/wiki/Q1027879","display_name":"Graphics","level":2,"score":0.7263351678848267},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.7233224511146545},{"id":"https://openalex.org/C50962388","wikidata":"https://www.wikidata.org/wiki/Q762018","display_name":"Invisibility","level":2,"score":0.6927098035812378},{"id":"https://openalex.org/C74050887","wikidata":"https://www.wikidata.org/wiki/Q848368","display_name":"Rotation (mathematics)","level":2,"score":0.5037102103233337},{"id":"https://openalex.org/C77660652","wikidata":"https://www.wikidata.org/wiki/Q150971","display_name":"Computer graphics","level":2,"score":0.46654748916625977},{"id":"https://openalex.org/C149364088","wikidata":"https://www.wikidata.org/wiki/Q185917","display_name":"Translation (biology)","level":4,"score":0.42550522089004517},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.42246925830841064},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3445035219192505},{"id":"https://openalex.org/C121684516","wikidata":"https://www.wikidata.org/wiki/Q7600677","display_name":"Computer graphics (images)","level":1,"score":0.3153883218765259},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.23299679160118103},{"id":"https://openalex.org/C199639397","wikidata":"https://www.wikidata.org/wiki/Q1788588","display_name":"Engineering drawing","level":1,"score":0.19620761275291443},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12162366509437561},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.07587960362434387},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C105580179","wikidata":"https://www.wikidata.org/wiki/Q188928","display_name":"Messenger RNA","level":3,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/ijdcf.2015070101","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijdcf.2015070101","pdf_url":null,"source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Digital Crime and Forensics","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jdcf00:v:7:y:2015:i:3:p:1-18","is_oa":false,"landing_page_url":"http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijdcf.2015070101","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1963608022","https://openalex.org/W1986243178","https://openalex.org/W1994599681","https://openalex.org/W2001743912","https://openalex.org/W2007780698","https://openalex.org/W2018658227","https://openalex.org/W2057410091","https://openalex.org/W2061828875","https://openalex.org/W2068544525","https://openalex.org/W2159482177","https://openalex.org/W2161922613","https://openalex.org/W2338417205","https://openalex.org/W2353216632","https://openalex.org/W2362661427","https://openalex.org/W2365672231","https://openalex.org/W2367567511","https://openalex.org/W2384544154","https://openalex.org/W2391362942"],"related_works":["https://openalex.org/W2137394636","https://openalex.org/W2358993821","https://openalex.org/W1516446231","https://openalex.org/W2098152888","https://openalex.org/W1559740347","https://openalex.org/W2040356834","https://openalex.org/W2385289568","https://openalex.org/W2381486749","https://openalex.org/W1514507288","https://openalex.org/W2183032046"],"abstract_inverted_index":{"A":[0],"semi-fragile":[1],"reversible":[2],"watermarking":[3],"algorithm":[4,75],"for":[5,118],"2D":[6,21,121,129,151],"CAD":[7,22,122,130,152],"engineering":[8,23,123,131,153],"graphics":[9,24,124,132],"with":[10,113],"accurate":[11],"tampering":[12,111],"localization":[13],"is":[14,46,53],"proposed.":[15],"Firstly,":[16],"all":[17],"vertices":[18,38],"in":[19,141],"the":[20,33,42,51,56,73,92,110,119,127,142],"are":[25,39],"extracted":[26],"and":[27,41,69,83,88,105,107,147],"partitioned":[28],"into":[29,55],"groups.":[30],"After":[31],"that,":[32],"relative":[34,59],"distance":[35,60],"of":[36,58,144,150],"these":[37],"calculated,":[40],"assigned":[43],"group":[44],"number":[45],"used":[47],"as":[48,101],"watermark.":[49],"Finally,":[50],"watermark":[52],"embedded":[54],"factor":[57],"by":[61],"using":[62],"an":[63],"improved":[64],"difference":[65],"expansion.":[66],"Experimental":[67],"results":[68],"analysis":[70],"show":[71],"that":[72],"proposed":[74],"can":[76,96,108,133],"obtain":[77],"a":[78,114],"large":[79],"capacity,":[80],"good":[81],"invisibility,":[82],"robust":[84],"against":[85],"translation,":[86],"rotation,":[87],"uniform":[89],"scaling.":[90],"At":[91],"same":[93],"time,":[94],"it":[95],"detect":[97],"malicious":[98],"attacks":[99],"such":[100],"entity":[102],"modification,":[103],"addition":[104],"deletion,":[106],"locate":[109],"areas":[112],"high":[115],"precision.":[116],"As":[117],"watermarked":[120],"passing":[125],"authentication,":[126],"original":[128],"be":[134],"completely":[135],"recovered.":[136],"It":[137],"has":[138],"great":[139],"potential":[140],"application":[143],"integrity":[145],"protection":[146],"content":[148],"authentication":[149],"graphics.":[154]},"counts_by_year":[{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
