{"id":"https://openalex.org/W2734644852","doi":"https://doi.org/10.4018/jgim.2017100106","title":"Realization of a New Robust and Secure Watermarking Technique Using DC Coefficient Modification in Pixel Domain and Chaotic Encryption","display_name":"Realization of a New Robust and Secure Watermarking Technique Using DC Coefficient Modification in Pixel Domain and Chaotic Encryption","publication_year":2017,"publication_date":"2017-07-14","ids":{"openalex":"https://openalex.org/W2734644852","doi":"https://doi.org/10.4018/jgim.2017100106","mag":"2734644852"},"language":"en","primary_location":{"id":"doi:10.4018/jgim.2017100106","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jgim.2017100106","pdf_url":null,"source":{"id":"https://openalex.org/S83591844","display_name":"Journal of Global Information Management","issn_l":"1062-7375","issn":["1062-7375","1533-7995"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Global Information Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062676855","display_name":"Shabir A. Parah","orcid":"https://orcid.org/0000-0001-5983-0912"},"institutions":[{"id":"https://openalex.org/I135388327","display_name":"University of Kashmir","ror":"https://ror.org/032xfst36","country_code":"IN","type":"education","lineage":["https://openalex.org/I135388327"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Shabir A. Parah","raw_affiliation_strings":["Post Graduate Department of Electronics and Instrumentation Technology, University of Kashmir, Srinagar, India"],"affiliations":[{"raw_affiliation_string":"Post Graduate Department of Electronics and Instrumentation Technology, University of Kashmir, Srinagar, India","institution_ids":["https://openalex.org/I135388327"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023113499","display_name":"Javaid A. Sheikh","orcid":"https://orcid.org/0000-0003-3113-3802"},"institutions":[{"id":"https://openalex.org/I135388327","display_name":"University of Kashmir","ror":"https://ror.org/032xfst36","country_code":"IN","type":"education","lineage":["https://openalex.org/I135388327"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Javaid A. Sheikh","raw_affiliation_strings":["Post Graduate Department of Electronics and Instrumentation Technology, University of Kashmir, Srinagar, India"],"affiliations":[{"raw_affiliation_string":"Post Graduate Department of Electronics and Instrumentation Technology, University of Kashmir, Srinagar, India","institution_ids":["https://openalex.org/I135388327"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000975435","display_name":"Nilanjan Dey","orcid":"https://orcid.org/0000-0001-8437-498X"},"institutions":[{"id":"https://openalex.org/I1288043984","display_name":"Techno India University","ror":"https://ror.org/00v1y6t69","country_code":"IN","type":"education","lineage":["https://openalex.org/I1288043984"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Nilanjan Dey","raw_affiliation_strings":["Department of Information Technology, Techno India College of Technology, Kolkata, India"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, Techno India College of Technology, Kolkata, India","institution_ids":["https://openalex.org/I1288043984"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000896292","display_name":"G. Mohiuddin Bhat","orcid":"https://orcid.org/0000-0001-9106-4699"},"institutions":[{"id":"https://openalex.org/I135388327","display_name":"University of Kashmir","ror":"https://ror.org/032xfst36","country_code":"IN","type":"education","lineage":["https://openalex.org/I135388327"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"G.M. Bhat","raw_affiliation_strings":["Post Graduate Department of Electronics and Instrumentation Technology, University of Kashmir, Srinagar, India"],"affiliations":[{"raw_affiliation_string":"Post Graduate Department of Electronics and Instrumentation Technology, University of Kashmir, Srinagar, India","institution_ids":["https://openalex.org/I135388327"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5062676855"],"corresponding_institution_ids":["https://openalex.org/I135388327"],"apc_list":null,"apc_paid":null,"fwci":1.7574,"has_fulltext":false,"cited_by_count":31,"citation_normalized_percentile":{"value":0.91239263,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"25","issue":"4","first_page":"80","last_page":"102"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.8659075498580933},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.8444543480873108},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6909788846969604},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.584624171257019},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5643706917762756},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5346274375915527},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.530860960483551},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.48129215836524963},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.46654224395751953},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.42571762204170227},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4061570167541504},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3972027003765106},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.33010077476501465},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.29537081718444824},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2650600075721741},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1159326434135437}],"concepts":[{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.8659075498580933},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.8444543480873108},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6909788846969604},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.584624171257019},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5643706917762756},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5346274375915527},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.530860960483551},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.48129215836524963},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.46654224395751953},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.42571762204170227},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4061570167541504},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3972027003765106},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.33010077476501465},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.29537081718444824},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2650600075721741},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1159326434135437},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/jgim.2017100106","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jgim.2017100106","pdf_url":null,"source":{"id":"https://openalex.org/S83591844","display_name":"Journal of Global Information Management","issn_l":"1062-7375","issn":["1062-7375","1533-7995"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Global Information Management","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jgim00:v:25:y:2017:i:4:p:80-102","is_oa":false,"landing_page_url":"http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/JGIM.2017100106","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":49,"referenced_works":["https://openalex.org/W1506908904","https://openalex.org/W1508120902","https://openalex.org/W1524144700","https://openalex.org/W1534962837","https://openalex.org/W1704826101","https://openalex.org/W2008445510","https://openalex.org/W2025301848","https://openalex.org/W2029672932","https://openalex.org/W2031405661","https://openalex.org/W2038473034","https://openalex.org/W2045642499","https://openalex.org/W2050864842","https://openalex.org/W2052331844","https://openalex.org/W2053142874","https://openalex.org/W2053183021","https://openalex.org/W2057515749","https://openalex.org/W2059477017","https://openalex.org/W2061427519","https://openalex.org/W2061795266","https://openalex.org/W2062353255","https://openalex.org/W2062500760","https://openalex.org/W2062604342","https://openalex.org/W2064307475","https://openalex.org/W2066530405","https://openalex.org/W2075853087","https://openalex.org/W2085889771","https://openalex.org/W2100912680","https://openalex.org/W2103320971","https://openalex.org/W2107763795","https://openalex.org/W2109130045","https://openalex.org/W2123865683","https://openalex.org/W2131559909","https://openalex.org/W2181419385","https://openalex.org/W2288287109","https://openalex.org/W2293567455","https://openalex.org/W2296624216","https://openalex.org/W2305894560","https://openalex.org/W2315297648","https://openalex.org/W2338805402","https://openalex.org/W2339298560","https://openalex.org/W2482943647","https://openalex.org/W2532408687","https://openalex.org/W2546577791","https://openalex.org/W2560548275","https://openalex.org/W2786495476","https://openalex.org/W3144738744","https://openalex.org/W4241782730","https://openalex.org/W4243267825","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2137394636","https://openalex.org/W2358993821","https://openalex.org/W1516446231","https://openalex.org/W2098152888","https://openalex.org/W1559740347","https://openalex.org/W2040356834","https://openalex.org/W2385289568","https://openalex.org/W2381486749","https://openalex.org/W1514507288","https://openalex.org/W2183032046"],"abstract_inverted_index":{"The":[0,76,121,159],"proliferation":[1],"of":[2,10,19,87,101,115,123,131,142,146,161,168,215],"information":[3,11,20,207],"and":[4,17,54,67,85,155,190],"communication":[5],"technology":[6],"has":[7,25,39,70,79,164,208],"made":[8],"exchange":[9],"easier":[12],"than":[13],"ever.":[14],"Security,":[15],"Duplication":[16],"manipulation":[18],"in":[21,64,73,104,118,128,211],"such":[22,50],"a":[23,27,44,132],"scenario":[24],"become":[26],"major":[28],"challenge":[29],"to":[30,42,47,125,152,186],"the":[31,35,96,156,181,194,205],"research":[32],"community":[33],"round":[34],"globe.":[36],"Digital":[37],"watermarking":[38,57],"been":[40,71,80,165,209],"found":[41],"be":[43,126,153],"potent":[45],"tool":[46],"deal":[48],"with":[49],"issues.":[51],"A":[52],"secure":[53,180],"robust":[55,185],"image":[56,78,220],"scheme":[58,196],"based":[59],"on":[60,218],"DC":[61,89,99,113,140,201],"coefficient":[62,90,100,141,202],"modification":[63],"pixel":[65,212],"domain":[66,213],"chaotic":[68,171],"encryption":[69],"presented":[72],"this":[74],"paper.":[75],"cover":[77],"divided":[81],"into":[82],"8\u00d78":[83],"sub-blocks":[84],"instead":[86,214],"computing":[88],"using":[91,170,216],"Discrete":[92],"Cosine":[93],"Transform":[94],"(DCTI,":[95],"authors":[97],"compute":[98],"each":[102],"block":[103,133],"spatial":[105,119],"domain.":[106,120],"Watermark":[107],"bits":[108],"are":[109],"embedded":[110,154,162],"by":[111,169],"modifying":[112],"coefficients":[114],"various":[116,129],"blocks":[117],"quantum":[122],"change":[124],"brought":[127],"pixels":[130],"for":[134],"embedding":[135],"watermark":[136,147,163,206],"bit":[137,148],"depends":[138],"upon":[139],"respective":[143],"blocks,":[144],"nature":[145],"(0":[149],"or":[150],"1)":[151],"adjustment":[157],"factor.":[158],"security":[160],"taken":[166],"care":[167],"encryption.":[172],"Experimental":[173],"investigations":[174],"show":[175],"that":[176],"besides":[177],"being":[178],"highly":[179],"proposed":[182,195],"technique":[183],"is":[184,197],"both":[187],"signal":[188],"processing":[189],"geometric":[191],"attacks.":[192],"Further,":[193],"computationally":[198],"efficient":[199],"as":[200],"which":[203],"holds":[204],"computed":[210],"DCT":[217],"an":[219],"block.":[221]},"counts_by_year":[{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":8},{"year":2017,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
