{"id":"https://openalex.org/W2966569564","doi":"https://doi.org/10.1109/tsp.2019.8768896","title":"Impact of Denoising on Watermarking: A Perspective for Information Retrieval","display_name":"Impact of Denoising on Watermarking: A Perspective for Information Retrieval","publication_year":2019,"publication_date":"2019-07-01","ids":{"openalex":"https://openalex.org/W2966569564","doi":"https://doi.org/10.1109/tsp.2019.8768896","mag":"2966569564"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsp.2019.8768896","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017114142","display_name":"Tariq Rahim","orcid":"https://orcid.org/0000-0001-7817-9715"},"institutions":[{"id":"https://openalex.org/I113409471","display_name":"Kumoh National Institute of Technology","ror":"https://ror.org/05dkjfz60","country_code":"KR","type":"education","lineage":["https://openalex.org/I113409471"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Tariq Rahim","raw_affiliation_strings":["Dept. of IT Convergence Engineering, Kumoh National Institute of Technology, Gumi, South Korea"],"affiliations":[{"raw_affiliation_string":"Dept. of IT Convergence Engineering, Kumoh National Institute of Technology, Gumi, South Korea","institution_ids":["https://openalex.org/I113409471"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086580084","display_name":"Saud Khan","orcid":"https://orcid.org/0000-0003-3992-1264"},"institutions":[{"id":"https://openalex.org/I113409471","display_name":"Kumoh National Institute of Technology","ror":"https://ror.org/05dkjfz60","country_code":"KR","type":"education","lineage":["https://openalex.org/I113409471"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Saud Khan","raw_affiliation_strings":["Dept. of IT Convergence Engineering, Kumoh National Institute of Technology, Gumi, South Korea"],"affiliations":[{"raw_affiliation_string":"Dept. of IT Convergence Engineering, Kumoh National Institute of Technology, Gumi, South Korea","institution_ids":["https://openalex.org/I113409471"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038398436","display_name":"Muhammad Arslan Usman","orcid":"https://orcid.org/0000-0002-6440-4595"},"institutions":[{"id":"https://openalex.org/I205051169","display_name":"Kingston University","ror":"https://ror.org/05bbqza97","country_code":"GB","type":"education","lineage":["https://openalex.org/I205051169"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Muhammad Arslan Usman","raw_affiliation_strings":["Dept. of Networks and Digital Media, Kingston University, London, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Dept. of Networks and Digital Media, Kingston University, London, United Kingdom","institution_ids":["https://openalex.org/I205051169"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112106786","display_name":"Soo Young Shin","orcid":null},"institutions":[{"id":"https://openalex.org/I113409471","display_name":"Kumoh National Institute of Technology","ror":"https://ror.org/05dkjfz60","country_code":"KR","type":"education","lineage":["https://openalex.org/I113409471"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Soo Young Shin","raw_affiliation_strings":["Dept. of IT Convergence Engineering, Kumoh National Institute of Technology, Gumi, South Korea"],"affiliations":[{"raw_affiliation_string":"Dept. of IT Convergence Engineering, Kumoh National Institute of Technology, Gumi, South Korea","institution_ids":["https://openalex.org/I113409471"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":3,"citation_normalized_percentile":{"value":0.39811,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":74,"max":77},"biblio":{"volume":null,"issue":null,"first_page":"685","last_page":"689"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.996,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9955,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.9360899},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7269096},{"id":"https://openalex.org/C19118579","wikidata":"https://www.wikidata.org/wiki/Q786423","display_name":"Frequency domain","level":2,"score":0.64471066},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.625554},{"id":"https://openalex.org/C169334058","wikidata":"https://www.wikidata.org/wiki/Q353292","display_name":"Additive white Gaussian noise","level":3,"score":0.5889468},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5503702},{"id":"https://openalex.org/C75172450","wikidata":"https://www.wikidata.org/wiki/Q623950","display_name":"Fast Fourier transform","level":2,"score":0.5490232},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.44036022},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4195966},{"id":"https://openalex.org/C112633086","wikidata":"https://www.wikidata.org/wiki/Q381287","display_name":"White noise","level":2,"score":0.41427922},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.4121461},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.40156567},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.3073887},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.28247058},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.13666576},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.098026454}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsp.2019.8768896","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":18,"referenced_works":["https://openalex.org/W1580963329","https://openalex.org/W1965225580","https://openalex.org/W2015019319","https://openalex.org/W2018648011","https://openalex.org/W2082540450","https://openalex.org/W2097469476","https://openalex.org/W2104796237","https://openalex.org/W2112347448","https://openalex.org/W2118625829","https://openalex.org/W2122083757","https://openalex.org/W2129376942","https://openalex.org/W2133665775","https://openalex.org/W2158125204","https://openalex.org/W2158172156","https://openalex.org/W2489657026","https://openalex.org/W2548055594","https://openalex.org/W2611415073","https://openalex.org/W3138063419"],"related_works":["https://openalex.org/W2385289568","https://openalex.org/W2381486749","https://openalex.org/W2358993821","https://openalex.org/W2137394636","https://openalex.org/W2098152888","https://openalex.org/W2080353903","https://openalex.org/W2040356834","https://openalex.org/W1559740347","https://openalex.org/W1516446231","https://openalex.org/W1514507288"],"abstract_inverted_index":{"This":[0],"article":[1],"presents":[2],"a":[3,8,16,88],"watermark":[4,9,56,75,96,118,140],"technique":[5,119,141],"for":[6,116,137],"embedding":[7,105],"in":[10,46,59,144],"the":[11,33,40,43,70,95,101,117,130,138,153],"frequency":[12,23,37],"domain":[13,24],"by":[14,78,99],"applying":[15],"Fast":[17],"Fourier":[18],"Transform":[19],"(FFT)":[20],"algorithm.":[21],"The":[22,107,127],"analysis":[25],"takes":[26],"advantages":[27],"of":[28,42,64,69,74,91,94,109,129,132,146,155],"FFT":[29],"shift":[30],"to":[31,39,48],"embed":[32],"watermark,":[34],"bringing":[35],"low":[36],"components":[38,68],"center":[41],"cover":[44],"image":[45,147],"order":[47],"avoid":[49],"user's":[50],"attention.":[51],"With":[52],"heterogeneous":[53],"radial":[54],"calculation,":[55],"is":[57,76,97,114,142],"embedded":[58],"magnitude":[60,67],"components,":[61],"after":[62],"separation":[63],"phase":[65],"and":[66,82,152],"image.":[71],"Moreover,":[72],"protection":[73],"achieved":[77],"error":[79],"correction":[80],"coding":[81],"Advanced":[83],"Encryption":[84],"Standard":[85],"(AES-128)":[86],"as":[87],"double":[89],"level":[90],"security.":[92],"Extraction":[93],"done":[98],"inverting":[100],"steps":[102],"taken":[103],"during":[104],"process.":[106],"impact":[108,131],"multiple":[110,133],"noise":[111,125,134],"elimination":[112,135],"techniques":[113,136],"analyzed":[115],"proposed":[120,139],"under":[121],"additive":[122],"white":[123],"Gaussian":[124],"(AWGN).":[126],"performance":[128],"evaluated":[143],"terms":[145],"quality":[148],"evaluation":[149],"metrics":[150],"(IQA)":[151],"number":[154],"bits":[156],"that":[157],"are":[158],"retrieved.":[159]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2966569564","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2025-01-06T14:43:34.739008","created_date":"2019-08-13"}