{"id":"https://openalex.org/W3157797065","doi":"https://doi.org/10.4018/ijehmc.20210701.oa2","title":"Robust and Secure Watermarking for Propagation of Digital Multimedia by Paillier Homomorphic Cryptosystem With Arnold Transformation","display_name":"Robust and Secure Watermarking for Propagation of Digital Multimedia by Paillier Homomorphic Cryptosystem With Arnold Transformation","publication_year":2021,"publication_date":"2021-04-26","ids":{"openalex":"https://openalex.org/W3157797065","doi":"https://doi.org/10.4018/ijehmc.20210701.oa2","mag":"3157797065"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.4018/ijehmc.20210701.oa2","pdf_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=277402&isxn=9781799861577","source":{"id":"https://openalex.org/S18047094","display_name":"International Journal of E-Health and Medical Communications","issn_l":"1947-315X","issn":["1947-315X","1947-3168"],"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=277402&isxn=9781799861577","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103819914","display_name":"Namita Agarwal","orcid":null},"institutions":[{"id":"https://openalex.org/I153954893","display_name":"Jaypee University of Information Technology","ror":"https://ror.org/00hshrf16","country_code":"IN","type":"education","lineage":["https://openalex.org/I153954893"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Namita Agarwal","raw_affiliation_strings":["Jaypee University of Information Technology, India"],"affiliations":[{"raw_affiliation_string":"Jaypee University of Information Technology, India","institution_ids":["https://openalex.org/I153954893"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054183825","display_name":"Pradeep Kumar Singh","orcid":"https://orcid.org/0000-0002-7676-9014"},"institutions":[{"id":"https://openalex.org/I153954893","display_name":"Jaypee University of Information Technology","ror":"https://ror.org/00hshrf16","country_code":"IN","type":"education","lineage":["https://openalex.org/I153954893"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Pradeep Kumar Singh","raw_affiliation_strings":["Jaypee University of Information Technology, India"],"affiliations":[{"raw_affiliation_string":"Jaypee University of Information Technology, India","institution_ids":["https://openalex.org/I153954893"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.396,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":5,"citation_normalized_percentile":{"value":0.622706,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":78,"max":80},"biblio":{"volume":"12","issue":"4","first_page":"17","last_page":"31"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.9831,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic Encryption","score":0.7806988},{"id":"https://openalex.org/keywords/paillier-cryptosystem","display_name":"Paillier cryptosystem","score":0.66232014},{"id":"https://openalex.org/keywords/scrambling","display_name":"Scrambling","score":0.4856421},{"id":"https://openalex.org/keywords/digital-watermarking-alliance","display_name":"Digital Watermarking Alliance","score":0.48246673},{"id":"https://openalex.org/keywords/watermarking-attack","display_name":"Watermarking attack","score":0.4336999}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.8693391},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.801923},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7806988},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.72118324},{"id":"https://openalex.org/C66989864","wikidata":"https://www.wikidata.org/wiki/Q594646","display_name":"Paillier cryptosystem","level":5,"score":0.66232014},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6500758},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.5983983},{"id":"https://openalex.org/C182548165","wikidata":"https://www.wikidata.org/wiki/Q2261483","display_name":"Scrambling","level":2,"score":0.4856421},{"id":"https://openalex.org/C193470923","wikidata":"https://www.wikidata.org/wiki/Q5276026","display_name":"Digital Watermarking Alliance","level":4,"score":0.48246673},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47917807},{"id":"https://openalex.org/C17632256","wikidata":"https://www.wikidata.org/wiki/Q1076968","display_name":"Digital media","level":2,"score":0.43839797},{"id":"https://openalex.org/C122760801","wikidata":"https://www.wikidata.org/wiki/Q2552011","display_name":"Watermarking attack","level":5,"score":0.4336999},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.35612863},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.3445645},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.33923608},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.33000672},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.32599604},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.28066474},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.21761164},{"id":"https://openalex.org/C57795399","wikidata":"https://www.wikidata.org/wiki/Q5265706","display_name":"Deterministic encryption","level":4,"score":0.09351376},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.056739807}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.4018/ijehmc.20210701.oa2","pdf_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=277402&isxn=9781799861577","source":{"id":"https://openalex.org/S18047094","display_name":"International Journal of E-Health and Medical Communications","issn_l":"1947-315X","issn":["1947-315X","1947-3168"],"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.4018/ijehmc.20210701.oa2","pdf_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=277402&isxn=9781799861577","source":{"id":"https://openalex.org/S18047094","display_name":"International Journal of E-Health and Medical Communications","issn_l":"1947-315X","issn":["1947-315X","1947-3168"],"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":37,"referenced_works":["https://openalex.org/W1984611018","https://openalex.org/W1993025711","https://openalex.org/W2006848144","https://openalex.org/W2016344074","https://openalex.org/W2023366604","https://openalex.org/W2039148930","https://openalex.org/W2039408141","https://openalex.org/W2045642499","https://openalex.org/W2048487434","https://openalex.org/W2049357246","https://openalex.org/W2051276014","https://openalex.org/W2062604342","https://openalex.org/W2063358027","https://openalex.org/W2065515862","https://openalex.org/W2068276045","https://openalex.org/W2071530928","https://openalex.org/W2090294996","https://openalex.org/W2092571803","https://openalex.org/W2093104721","https://openalex.org/W2131559909","https://openalex.org/W2146479791","https://openalex.org/W2406452102","https://openalex.org/W2470727891","https://openalex.org/W2511585756","https://openalex.org/W2520594535","https://openalex.org/W2535407149","https://openalex.org/W2573437058","https://openalex.org/W2601864115","https://openalex.org/W2733351599","https://openalex.org/W2767994671","https://openalex.org/W2775354436","https://openalex.org/W2793887649","https://openalex.org/W2795685928","https://openalex.org/W2928382215","https://openalex.org/W2965070013","https://openalex.org/W3016187179","https://openalex.org/W3148835554"],"related_works":["https://openalex.org/W4386820853","https://openalex.org/W4323528671","https://openalex.org/W4212859770","https://openalex.org/W3036675567","https://openalex.org/W2518050971","https://openalex.org/W2487813576","https://openalex.org/W2094069016","https://openalex.org/W2092515448","https://openalex.org/W1507098372","https://openalex.org/W1484081998"],"abstract_inverted_index":{"Sharing":[0],"of":[1,77,110,138],"digital":[2,17,139],"media":[3],"over":[4],"internet":[5],"is":[6,55,64,83,92,121,131],"becoming":[7],"easier":[8],"due":[9],"to":[10,69,95,114],"content":[11],"authentication":[12],"and":[13,33,118,134],"security":[14,76,137],"provided":[15],"by":[16,102],"watermarking.":[18],"It":[19],"also":[20],"locates":[21],"application":[22],"in":[23],"other":[24],"fields":[25],"like":[26],"copyright":[27],"protection,":[28],"tele-medicine,":[29],"military,":[30],"tamper":[31],"detection,":[32],"many":[34],"more.":[35],"This":[36],"paper":[37],"represents":[38],"the":[39,52,71,80,97,103,116,136],"robust":[40,133],"watermarking":[41,53,129],"approach":[42],"using":[43],"Paillier":[44],"homomorphic":[45],"cryptosystem":[46],"with":[47],"Arnold":[48,86],"transformation.":[49],"In":[50],"this,":[51],"system":[54],"primarily":[56],"prepared":[57],"at":[58,66],"an":[59],"encrypted":[60,98,111],"DWT-DCT":[61],"domain.":[62],"Cryptosystem":[63],"exploited":[65],"this":[67],"time":[68],"encrypt":[70],"original":[72,117],"media.":[73,140],"For":[74],"more":[75,132],"multimedia":[78],"content,":[79],"watermark":[81,99,112,119],"image":[82,100,113,120],"scrambled":[84],"through":[85],"scrambling":[87],"technique.":[88],"The":[89,123],"embedding":[90],"process":[91],"done":[93],"here":[94],"produce":[96],"followed":[101],"encryption":[104],"process.":[105],"At":[106],"recovery":[107],"phase,":[108],"decryption":[109],"get":[115],"done.":[122],"experimental":[124],"result":[125],"has":[126],"shown":[127],"that":[128],"method":[130],"offers":[135]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3157797065","counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3}],"updated_date":"2025-04-23T19:06:55.173322","created_date":"2021-05-10"}