{"id":"https://openalex.org/W2092388939","doi":"https://doi.org/10.4018/jdcf.2011100104","title":"A Blind Image Watermarking Scheme Utilizing BTC Bitplanes","display_name":"A Blind Image Watermarking Scheme Utilizing BTC Bitplanes","publication_year":2011,"publication_date":"2011-10-01","ids":{"openalex":"https://openalex.org/W2092388939","doi":"https://doi.org/10.4018/jdcf.2011100104","mag":"2092388939"},"language":"en","primary_location":{"id":"doi:10.4018/jdcf.2011100104","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jdcf.2011100104","pdf_url":null,"source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Digital Crime and Forensics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103584004","display_name":"Chunning Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chun-Ning Yang","raw_affiliation_strings":["Zhejiang University, China","ZHEJIANG UNIVERSITY, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, China","institution_ids":["https://openalex.org/I76130692"]},{"raw_affiliation_string":"ZHEJIANG UNIVERSITY, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083531923","display_name":"Zhe\u2010Ming Lu","orcid":"https://orcid.org/0000-0003-1785-7847"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhe-Ming Lu","raw_affiliation_strings":["Zhejiang University, China","ZHEJIANG UNIVERSITY, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, China","institution_ids":["https://openalex.org/I76130692"]},{"raw_affiliation_string":"ZHEJIANG UNIVERSITY, China","institution_ids":["https://openalex.org/I76130692"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5103584004"],"corresponding_institution_ids":["https://openalex.org/I76130692"],"apc_list":null,"apc_paid":null,"fwci":1.0303,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.8011123,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"3","issue":"4","first_page":"42","last_page":"53"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.9541399478912354},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.8442174196243286},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6730613708496094},{"id":"https://openalex.org/keywords/block-truncation-coding","display_name":"Block Truncation Coding","score":0.662498414516449},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.6123563051223755},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.5776742696762085},{"id":"https://openalex.org/keywords/bitwise-operation","display_name":"Bitwise operation","score":0.5067148804664612},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.504721999168396},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.48773321509361267},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4844208061695099},{"id":"https://openalex.org/keywords/least-significant-bit","display_name":"Least significant bit","score":0.46678435802459717},{"id":"https://openalex.org/keywords/bit-plane","display_name":"Bit plane","score":0.4633845090866089},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.42111608386039734},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.4082106351852417},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3844977021217346},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2878839373588562},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.27571380138397217},{"id":"https://openalex.org/keywords/image-compression","display_name":"Image compression","score":0.18311110138893127},{"id":"https://openalex.org/keywords/bit-field","display_name":"Bit field","score":0.08111172914505005},{"id":"https://openalex.org/keywords/type","display_name":"Type (biology)","score":0.07450515031814575},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.05687779188156128}],"concepts":[{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.9541399478912354},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.8442174196243286},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6730613708496094},{"id":"https://openalex.org/C20914364","wikidata":"https://www.wikidata.org/wiki/Q4927178","display_name":"Block Truncation Coding","level":5,"score":0.662498414516449},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.6123563051223755},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.5776742696762085},{"id":"https://openalex.org/C134765980","wikidata":"https://www.wikidata.org/wiki/Q879126","display_name":"Bitwise operation","level":2,"score":0.5067148804664612},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.504721999168396},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.48773321509361267},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4844208061695099},{"id":"https://openalex.org/C4305246","wikidata":"https://www.wikidata.org/wiki/Q3885225","display_name":"Least significant bit","level":2,"score":0.46678435802459717},{"id":"https://openalex.org/C56056324","wikidata":"https://www.wikidata.org/wiki/Q878866","display_name":"Bit plane","level":4,"score":0.4633845090866089},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.42111608386039734},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4082106351852417},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3844977021217346},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2878839373588562},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.27571380138397217},{"id":"https://openalex.org/C13481523","wikidata":"https://www.wikidata.org/wiki/Q412438","display_name":"Image compression","level":4,"score":0.18311110138893127},{"id":"https://openalex.org/C183383400","wikidata":"https://www.wikidata.org/wiki/Q2374485","display_name":"Bit field","level":3,"score":0.08111172914505005},{"id":"https://openalex.org/C2777299769","wikidata":"https://www.wikidata.org/wiki/Q3707858","display_name":"Type (biology)","level":2,"score":0.07450515031814575},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.05687779188156128},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/jdcf.2011100104","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jdcf.2011100104","pdf_url":null,"source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Digital Crime and Forensics","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jdcf00:v:3:y:2011:i:4:p:42-53","is_oa":false,"landing_page_url":"http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jdcf.2011100104","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/6","display_name":"Clean water and sanitation","score":0.4099999964237213}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W628111628","https://openalex.org/W1504787642","https://openalex.org/W1562047373","https://openalex.org/W1969225289","https://openalex.org/W1979082767","https://openalex.org/W1993164138","https://openalex.org/W2016567496","https://openalex.org/W2037628789","https://openalex.org/W2042896489","https://openalex.org/W2046276868","https://openalex.org/W2051768345","https://openalex.org/W2068347031","https://openalex.org/W2078561052","https://openalex.org/W2083632275","https://openalex.org/W2098731348","https://openalex.org/W2101737296","https://openalex.org/W2135879701","https://openalex.org/W2148773665","https://openalex.org/W2153999200","https://openalex.org/W2314969197","https://openalex.org/W3141211621","https://openalex.org/W6633619750"],"related_works":["https://openalex.org/W2767330018","https://openalex.org/W2365704436","https://openalex.org/W2268155565","https://openalex.org/W1747656468","https://openalex.org/W2291453422","https://openalex.org/W2025287167","https://openalex.org/W2013400026","https://openalex.org/W3003690552","https://openalex.org/W2798567623","https://openalex.org/W2092388939"],"abstract_inverted_index":{"This":[0,13],"paper":[1],"presents":[2],"a":[3],"novel":[4],"image":[5,32,109,206],"watermarking":[6,186],"scheme":[7,14],"utilizing":[8],"Block":[9],"Truncation":[10],"Coding":[11],"(BTC).":[12],"uses":[15],"BTC":[16,41,50,144],"to":[17,47,66,82,123,132,151],"guide":[18],"the":[19,26,29,53,58,63,72,79,88,107,111,118,127,136,141,156,161,166,173,184,192,199],"watermark":[20,64,80,128,137,168,175],"embedding":[21,27],"and":[22,52,71,87,196],"extraction":[23,142],"processes.":[24],"During":[25,140],"process,":[28,143],"original":[30,108],"cover":[31],"is":[33,42,60,69,76,85,92,97,145,163,170,177,188],"first":[34,146],"partitioned":[35],"into":[36],"non-overlapping":[37],"4\u00d74":[38],"blocks.":[39],"Then,":[40],"performed":[43,147],"on":[44,148],"each":[45,149],"block":[46,150],"obtain":[48,152],"its":[49,153],"bitplane,":[51],"number":[54,73,89,112,157],"of":[55,74,90,113,158],"\u20181\u2019s":[56,75,91,114,159],"in":[57,106,117,160,194],"bitplane":[59,120,162],"counted.":[61],"If":[62,155],"bit":[65,81,129,138,169,176],"be":[67,83,124,133,203],"embedded":[68,84,167,174],"\u20181\u2019":[70,130],"odd,":[77,164],"or":[78,131],"\u20180\u2019":[86],"even,":[93],"then":[94,165],"no":[95],"change":[96],"made.":[98],"Otherwise,":[99,172],"by":[100],"changing":[101],"at":[102],"most":[103],"three":[104],"pixels":[105],"block,":[110],"(or":[115],"\u20180\u2019s)":[116],"renewed":[119],"are":[121],"forced":[122],"odd":[125],"for":[126,135,191,205],"even":[134],"\u20180\u2019.":[139,178],"bitplane.":[154],"\u20181\u2019.":[171],"The":[179],"experimental":[180],"results":[181],"show":[182],"that":[183],"proposed":[185,200],"method":[187,201],"semi-fragile":[189],"except":[190],"changes":[193],"brightness":[195],"contrast;":[197],"therefore,":[198],"can":[202],"used":[204],"authentication.":[207]},"counts_by_year":[{"year":2019,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
