{"id":"https://openalex.org/W1991392303","doi":"https://doi.org/10.1504/ijics.2011.044822","title":"Digital fingerprinting: problems and solutions","display_name":"Digital fingerprinting: problems and solutions","publication_year":2011,"publication_date":"2011-01-01","ids":{"openalex":"https://openalex.org/W1991392303","doi":"https://doi.org/10.1504/ijics.2011.044822","mag":"1991392303"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijics.2011.044822","pdf_url":null,"source":{"id":"https://openalex.org/S85012289","display_name":"International Journal of Information and Computer Security","issn_l":"1744-1765","issn":["1744-1765","1744-1773"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091768130","display_name":"Defa Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I77396741","display_name":"Hunan University of Technology and Business","ror":"https://ror.org/057cydn08","country_code":"CN","type":"education","lineage":["https://openalex.org/I77396741"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Defa Hu","raw_affiliation_strings":["School of Information, Hunan University of Commerce, Changsha 410205, Hunan, China"],"affiliations":[{"raw_affiliation_string":"School of Information, Hunan University of Commerce, Changsha 410205, Hunan, China","institution_ids":["https://openalex.org/I77396741"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113548274","display_name":"Juanjuan Luo","orcid":null},"institutions":[],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Juanjuan Luo","raw_affiliation_strings":["Department of Economic Trade Management, Hunan Railway Professional Technology College, Zhuzhou 412001, Hunan, China#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Economic Trade Management, Hunan Railway Professional Technology College, Zhuzhou 412001, Hunan, China#TAB#","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":1,"citation_normalized_percentile":{"value":0.467256,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":65,"max":72},"biblio":{"volume":"4","issue":"4","first_page":"316","last_page":"316"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Digital Image Watermarking Techniques","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Digital Image Watermarking Techniques","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management Architectures and Technologies","score":0.9971,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Machine Learning for Internet Traffic Classification","score":0.9964,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-content","display_name":"Digital content","score":0.53116},{"id":"https://openalex.org/keywords/image-authentication","display_name":"Image Authentication","score":0.500263},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.4151262}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.862889},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.75036204},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.69617015},{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.62314916},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.61566097},{"id":"https://openalex.org/C168406668","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Fingerprint recognition","level":3,"score":0.5987863},{"id":"https://openalex.org/C2779344036","wikidata":"https://www.wikidata.org/wiki/Q11320476","display_name":"Digital content","level":2,"score":0.53116},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.42837724},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.42173395},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.4151262},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.3125524},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1120826},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijics.2011.044822","pdf_url":null,"source":{"id":"https://openalex.org/S85012289","display_name":"International Journal of Information and Computer Security","issn_l":"1744-1765","issn":["1744-1765","1744-1773"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4389371618","https://openalex.org/W4362496757","https://openalex.org/W3014822659","https://openalex.org/W2608025327","https://openalex.org/W2566091814","https://openalex.org/W2148654711","https://openalex.org/W2117826006","https://openalex.org/W2114937328","https://openalex.org/W2051501574","https://openalex.org/W1621827506"],"abstract_inverted_index":{"Encryption":[0],"can":[1,23,62],"provide":[2],"multimedia":[3,16,37],"data":[4],"with":[5,75],"the":[6,20,59,65,68,83,86,90,94,97,104,108,111],"desired":[7],"security":[8],"during":[9],"transmission.":[10],"However,":[11],"once":[12],"a":[13],"piece":[14],"of":[15,36,67,85,92,107,114],"content":[17,54],"is":[18,29,45,56],"decrypted,":[19],"dishonest":[21],"customer":[22],"redistribute":[24],"it":[25],"arbitrarily.":[26],"Digital":[27],"fingerprinting":[28,77],"an":[30,52],"emerging":[31],"technology":[32],"for":[33],"copyright":[34],"protection":[35],"data,":[38],"where":[39],"unique":[40],"identification":[41],"information":[42],"called":[43],"fingerprint":[44,61],"embedded":[46,60],"into":[47],"each":[48],"distributed":[49],"copy.":[50],"Once":[51],"unauthorised":[53],"copy":[55],"found":[57],"somewhere,":[58],"uniquely":[63],"identify":[64],"source":[66],"leakage.":[69],"There":[70],"are":[71,80],"three":[72],"main":[73,112],"problems":[74,113],"digital":[76,115],"systems,":[78],"which":[79],"collusion":[81],"attack,":[82],"distribution":[84],"marked":[87],"copies":[88],"and":[89,96],"fairness":[91],"both":[93],"merchant":[95],"customer.":[98],"In":[99],"this":[100],"paper,":[101],"we":[102],"summarise":[103],"current":[105],"state-of-the-art":[106],"solutions":[109],"to":[110],"fingerprinting.":[116]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1991392303","counts_by_year":[{"year":2015,"cited_by_count":1}],"updated_date":"2024-11-23T15:17:42.645884","created_date":"2016-06-24"}