Digital Text Document Watermarking Based Tampering Attack Detection via Internet Article Swipe
YOU?
·
· 2024
· Open Access
·
· DOI: https://doi.org/10.32604/csse.2023.037305
Owing to the rapid increase in the interchange of text information through internet networks, the reliability and security of digital content are becoming a major research problem.Tampering detection, Content authentication, and integrity verification of digital content interchanged through the Internet were utilized to solve a major concern in information and communication technologies.The authors' difficulties were tampering detection, authentication, and integrity verification of the digital contents.This study develops an Automated Data Mining based Digital Text Document Watermarking for Tampering Attack Detection (ADMDTW-TAD) via the Internet.The DM concept is exploited in the presented ADMDTW-TAD technique to identify the document's appropriate characteristics to embed larger watermark information.The presented secure watermarking scheme intends to transmit digital text documents over the Internet securely.Once the watermark is embedded with no damage to the original document, it is then shared with the destination.The watermark extraction process is performed to get the original document securely.The experimental validation of the ADMDTW-TAD technique is carried out under varying levels of attack volumes, and the outcomes were inspected in terms of different measures.The simulation values indicated that the ADMDTW-TAD technique improved performance over other models.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.32604/csse.2023.037305
- https://www.techscience.com/csse/online/detail/20271/pdf
- OA Status
- diamond
- References
- 24
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4393326896
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4393326896Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.32604/csse.2023.037305Digital Object Identifier
- Title
-
Digital Text Document Watermarking Based Tampering Attack Detection via InternetWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2024Year of publication
- Publication date
-
2024-01-01Full publication date if available
- Authors
-
Manal Abdullah Alohali, Muna Elsadig, Fahd N. Al‐Wesabi, Mesfer Al Duhayyim, Anwer Mustafa Hilal, Abdelwahed MotwakelList of authors in order
- Landing page
-
https://doi.org/10.32604/csse.2023.037305Publisher landing page
- PDF URL
-
https://www.techscience.com/csse/online/detail/20271/pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
diamondOpen access status per OpenAlex
- OA URL
-
https://www.techscience.com/csse/online/detail/20271/pdfDirect OA link when available
- Concepts
-
Digital watermarking, Computer science, The Internet, Computer security, Internet privacy, World Wide Web, Information retrieval, Artificial intelligence, Image (mathematics)Top concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
24Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4393326896 |
|---|---|
| doi | https://doi.org/10.32604/csse.2023.037305 |
| ids.doi | https://doi.org/10.32604/csse.2023.037305 |
| ids.openalex | https://openalex.org/W4393326896 |
| fwci | 0.0 |
| type | article |
| title | Digital Text Document Watermarking Based Tampering Attack Detection via Internet |
| biblio.issue | 3 |
| biblio.volume | 48 |
| biblio.last_page | 771 |
| biblio.first_page | 759 |
| topics[0].id | https://openalex.org/T10388 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9988999962806702 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1707 |
| topics[0].subfield.display_name | Computer Vision and Pattern Recognition |
| topics[0].display_name | Advanced Steganography and Watermarking Techniques |
| topics[1].id | https://openalex.org/T11598 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9836000204086304 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1702 |
| topics[1].subfield.display_name | Artificial Intelligence |
| topics[1].display_name | Internet Traffic Analysis and Secure E-voting |
| topics[2].id | https://openalex.org/T11017 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9764999747276306 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1707 |
| topics[2].subfield.display_name | Computer Vision and Pattern Recognition |
| topics[2].display_name | Chaos-based Image/Signal Encryption |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C150817343 |
| concepts[0].level | 3 |
| concepts[0].score | 0.8462491035461426 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q875932 |
| concepts[0].display_name | Digital watermarking |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.7010307312011719 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C110875604 |
| concepts[2].level | 2 |
| concepts[2].score | 0.6456166505813599 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q75 |
| concepts[2].display_name | The Internet |
| concepts[3].id | https://openalex.org/C38652104 |
| concepts[3].level | 1 |
| concepts[3].score | 0.50146484375 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[3].display_name | Computer security |
| concepts[4].id | https://openalex.org/C108827166 |
| concepts[4].level | 1 |
| concepts[4].score | 0.4295840859413147 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q175975 |
| concepts[4].display_name | Internet privacy |
| concepts[5].id | https://openalex.org/C136764020 |
| concepts[5].level | 1 |
| concepts[5].score | 0.42302176356315613 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q466 |
| concepts[5].display_name | World Wide Web |
| concepts[6].id | https://openalex.org/C23123220 |
| concepts[6].level | 1 |
| concepts[6].score | 0.3742806911468506 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q816826 |
| concepts[6].display_name | Information retrieval |
| concepts[7].id | https://openalex.org/C154945302 |
| concepts[7].level | 1 |
| concepts[7].score | 0.2580481767654419 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[7].display_name | Artificial intelligence |
| concepts[8].id | https://openalex.org/C115961682 |
| concepts[8].level | 2 |
| concepts[8].score | 0.11198502779006958 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q860623 |
| concepts[8].display_name | Image (mathematics) |
| keywords[0].id | https://openalex.org/keywords/digital-watermarking |
| keywords[0].score | 0.8462491035461426 |
| keywords[0].display_name | Digital watermarking |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.7010307312011719 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/the-internet |
| keywords[2].score | 0.6456166505813599 |
| keywords[2].display_name | The Internet |
| keywords[3].id | https://openalex.org/keywords/computer-security |
| keywords[3].score | 0.50146484375 |
| keywords[3].display_name | Computer security |
| keywords[4].id | https://openalex.org/keywords/internet-privacy |
| keywords[4].score | 0.4295840859413147 |
| keywords[4].display_name | Internet privacy |
| keywords[5].id | https://openalex.org/keywords/world-wide-web |
| keywords[5].score | 0.42302176356315613 |
| keywords[5].display_name | World Wide Web |
| keywords[6].id | https://openalex.org/keywords/information-retrieval |
| keywords[6].score | 0.3742806911468506 |
| keywords[6].display_name | Information retrieval |
| keywords[7].id | https://openalex.org/keywords/artificial-intelligence |
| keywords[7].score | 0.2580481767654419 |
| keywords[7].display_name | Artificial intelligence |
| keywords[8].id | https://openalex.org/keywords/image |
| keywords[8].score | 0.11198502779006958 |
| keywords[8].display_name | Image (mathematics) |
| language | en |
| locations[0].id | doi:10.32604/csse.2023.037305 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4210214087 |
| locations[0].source.issn | 0267-6192 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 0267-6192 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Computer Systems Science and Engineering |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].license | |
| locations[0].pdf_url | https://www.techscience.com/csse/online/detail/20271/pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Computer Systems Science and Engineering |
| locations[0].landing_page_url | https://doi.org/10.32604/csse.2023.037305 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5018019909 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-1975-5345 |
| authorships[0].author.display_name | Manal Abdullah Alohali |
| authorships[0].countries | SA |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I106778892 |
| authorships[0].affiliations[0].raw_affiliation_string | Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh, 11671, Saudi Arabia |
| authorships[0].institutions[0].id | https://openalex.org/I106778892 |
| authorships[0].institutions[0].ror | https://ror.org/05b0cyh02 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I106778892 |
| authorships[0].institutions[0].country_code | SA |
| authorships[0].institutions[0].display_name | Princess Nourah bint Abdulrahman University |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Manal Abdullah Alohali |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh, 11671, Saudi Arabia |
| authorships[1].author.id | https://openalex.org/A5006230385 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | Muna Elsadig |
| authorships[1].countries | SA |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I106778892 |
| authorships[1].affiliations[0].raw_affiliation_string | Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh, 11671, Saudi Arabia |
| authorships[1].institutions[0].id | https://openalex.org/I106778892 |
| authorships[1].institutions[0].ror | https://ror.org/05b0cyh02 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I106778892 |
| authorships[1].institutions[0].country_code | SA |
| authorships[1].institutions[0].display_name | Princess Nourah bint Abdulrahman University |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Muna Elsadig |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh, 11671, Saudi Arabia |
| authorships[2].author.id | https://openalex.org/A5043871968 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-4389-4927 |
| authorships[2].author.display_name | Fahd N. Al‐Wesabi |
| authorships[2].countries | SA |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I82952536 |
| authorships[2].affiliations[0].raw_affiliation_string | Department of Computer Science, College of Science & Art at Mahayil, King Khalid University, Abha, 62217, Saudi Arabia |
| authorships[2].institutions[0].id | https://openalex.org/I82952536 |
| authorships[2].institutions[0].ror | https://ror.org/052kwzs30 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I82952536 |
| authorships[2].institutions[0].country_code | SA |
| authorships[2].institutions[0].display_name | King Khalid University |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Fahd N. Al-Wesabi |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Department of Computer Science, College of Science & Art at Mahayil, King Khalid University, Abha, 62217, Saudi Arabia |
| authorships[3].author.id | https://openalex.org/A5084632396 |
| authorships[3].author.orcid | https://orcid.org/0000-0003-4024-271X |
| authorships[3].author.display_name | Mesfer Al Duhayyim |
| authorships[3].countries | SA |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I142608572 |
| authorships[3].affiliations[0].raw_affiliation_string | Department of Computer Science, College of Sciences and Humanities-Aflaj, Prince Sattam bin Abdulaziz University, Al-Aflaj, 16733, Saudi Arabia |
| authorships[3].institutions[0].id | https://openalex.org/I142608572 |
| authorships[3].institutions[0].ror | https://ror.org/04jt46d36 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I142608572 |
| authorships[3].institutions[0].country_code | SA |
| authorships[3].institutions[0].display_name | Prince Sattam Bin Abdulaziz University |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Mesfer Al Duhayyim |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | Department of Computer Science, College of Sciences and Humanities-Aflaj, Prince Sattam bin Abdulaziz University, Al-Aflaj, 16733, Saudi Arabia |
| authorships[4].author.id | https://openalex.org/A5091747108 |
| authorships[4].author.orcid | https://orcid.org/0000-0002-4658-8941 |
| authorships[4].author.display_name | Anwer Mustafa Hilal |
| authorships[4].countries | SA |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I142608572 |
| authorships[4].affiliations[0].raw_affiliation_string | Department of Computer and Self Development, Preparatory Year Deanship, Prince Sattam bin Abdulaziz University, AlKharj, Saudi Arabia |
| authorships[4].institutions[0].id | https://openalex.org/I142608572 |
| authorships[4].institutions[0].ror | https://ror.org/04jt46d36 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I142608572 |
| authorships[4].institutions[0].country_code | SA |
| authorships[4].institutions[0].display_name | Prince Sattam Bin Abdulaziz University |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Anwer Mustafa Hilal |
| authorships[4].is_corresponding | True |
| authorships[4].raw_affiliation_strings | Department of Computer and Self Development, Preparatory Year Deanship, Prince Sattam bin Abdulaziz University, AlKharj, Saudi Arabia |
| authorships[5].author.id | https://openalex.org/A5068423119 |
| authorships[5].author.orcid | https://orcid.org/0000-0003-4084-5457 |
| authorships[5].author.display_name | Abdelwahed Motwakel |
| authorships[5].countries | SA |
| authorships[5].affiliations[0].institution_ids | https://openalex.org/I142608572 |
| authorships[5].affiliations[0].raw_affiliation_string | Department of Computer and Self Development, Preparatory Year Deanship, Prince Sattam bin Abdulaziz University, AlKharj, Saudi Arabia |
| authorships[5].institutions[0].id | https://openalex.org/I142608572 |
| authorships[5].institutions[0].ror | https://ror.org/04jt46d36 |
| authorships[5].institutions[0].type | education |
| authorships[5].institutions[0].lineage | https://openalex.org/I142608572 |
| authorships[5].institutions[0].country_code | SA |
| authorships[5].institutions[0].display_name | Prince Sattam Bin Abdulaziz University |
| authorships[5].author_position | last |
| authorships[5].raw_author_name | Abdelwahed Motwakel |
| authorships[5].is_corresponding | False |
| authorships[5].raw_affiliation_strings | Department of Computer and Self Development, Preparatory Year Deanship, Prince Sattam bin Abdulaziz University, AlKharj, Saudi Arabia |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://www.techscience.com/csse/online/detail/20271/pdf |
| open_access.oa_status | diamond |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Digital Text Document Watermarking Based Tampering Attack Detection via Internet |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10388 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9988999962806702 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1707 |
| primary_topic.subfield.display_name | Computer Vision and Pattern Recognition |
| primary_topic.display_name | Advanced Steganography and Watermarking Techniques |
| related_works | https://openalex.org/W2361629745, https://openalex.org/W2107922825, https://openalex.org/W3094285444, https://openalex.org/W1568204688, https://openalex.org/W2381262728, https://openalex.org/W2111592878, https://openalex.org/W1846726187, https://openalex.org/W2009856579, https://openalex.org/W1593964766, https://openalex.org/W2387614453 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.32604/csse.2023.037305 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4210214087 |
| best_oa_location.source.issn | 0267-6192 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 0267-6192 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Computer Systems Science and Engineering |
| best_oa_location.source.host_organization | |
| best_oa_location.source.host_organization_name | |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://www.techscience.com/csse/online/detail/20271/pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Computer Systems Science and Engineering |
| best_oa_location.landing_page_url | https://doi.org/10.32604/csse.2023.037305 |
| primary_location.id | doi:10.32604/csse.2023.037305 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4210214087 |
| primary_location.source.issn | 0267-6192 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 0267-6192 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Computer Systems Science and Engineering |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.license | |
| primary_location.pdf_url | https://www.techscience.com/csse/online/detail/20271/pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Computer Systems Science and Engineering |
| primary_location.landing_page_url | https://doi.org/10.32604/csse.2023.037305 |
| publication_date | 2024-01-01 |
| publication_year | 2024 |
| referenced_works | https://openalex.org/W6847104019, https://openalex.org/W2588517408, https://openalex.org/W4214690919, https://openalex.org/W2971076706, https://openalex.org/W2803063182, https://openalex.org/W2952444637, https://openalex.org/W6861356200, https://openalex.org/W4205814753, https://openalex.org/W2968862061, https://openalex.org/W2532449680, https://openalex.org/W2733351599, https://openalex.org/W2947937011, https://openalex.org/W3160322952, https://openalex.org/W2745463021, https://openalex.org/W2803028604, https://openalex.org/W3175711190, https://openalex.org/W3091283655, https://openalex.org/W3134331870, https://openalex.org/W4200244939, https://openalex.org/W6766686229, https://openalex.org/W2946246634, https://openalex.org/W4391147133, https://openalex.org/W4312383113, https://openalex.org/W2966653579 |
| referenced_works_count | 24 |
| abstract_inverted_index.a | 23, 44 |
| abstract_inverted_index.DM | 84 |
| abstract_inverted_index.an | 67 |
| abstract_inverted_index.in | 5, 47, 88, 167 |
| abstract_inverted_index.is | 86, 120, 130, 139, 153 |
| abstract_inverted_index.it | 129 |
| abstract_inverted_index.no | 123 |
| abstract_inverted_index.of | 8, 18, 33, 61, 149, 159, 169 |
| abstract_inverted_index.to | 1, 42, 93, 99, 109, 125, 141 |
| abstract_inverted_index.and | 16, 30, 49, 58, 162 |
| abstract_inverted_index.are | 21 |
| abstract_inverted_index.for | 76 |
| abstract_inverted_index.get | 142 |
| abstract_inverted_index.out | 155 |
| abstract_inverted_index.the | 2, 6, 14, 38, 62, 82, 89, 95, 115, 118, 126, 134, 143, 150, 163, 176 |
| abstract_inverted_index.via | 81 |
| abstract_inverted_index.Data | 69 |
| abstract_inverted_index.Text | 73 |
| abstract_inverted_index.over | 114, 181 |
| abstract_inverted_index.text | 9, 112 |
| abstract_inverted_index.that | 175 |
| abstract_inverted_index.then | 131 |
| abstract_inverted_index.were | 40, 54, 165 |
| abstract_inverted_index.with | 122, 133 |
| abstract_inverted_index.Owing | 0 |
| abstract_inverted_index.based | 71 |
| abstract_inverted_index.embed | 100 |
| abstract_inverted_index.major | 24, 45 |
| abstract_inverted_index.other | 182 |
| abstract_inverted_index.rapid | 3 |
| abstract_inverted_index.solve | 43 |
| abstract_inverted_index.study | 65 |
| abstract_inverted_index.terms | 168 |
| abstract_inverted_index.under | 156 |
| abstract_inverted_index.Attack | 78 |
| abstract_inverted_index.Mining | 70 |
| abstract_inverted_index.attack | 160 |
| abstract_inverted_index.damage | 124 |
| abstract_inverted_index.larger | 101 |
| abstract_inverted_index.levels | 158 |
| abstract_inverted_index.scheme | 107 |
| abstract_inverted_index.secure | 105 |
| abstract_inverted_index.shared | 132 |
| abstract_inverted_index.values | 173 |
| abstract_inverted_index.Content | 28 |
| abstract_inverted_index.Digital | 72 |
| abstract_inverted_index.carried | 154 |
| abstract_inverted_index.concept | 85 |
| abstract_inverted_index.concern | 46 |
| abstract_inverted_index.content | 20, 35 |
| abstract_inverted_index.digital | 19, 34, 63, 111 |
| abstract_inverted_index.intends | 108 |
| abstract_inverted_index.models. | 183 |
| abstract_inverted_index.process | 138 |
| abstract_inverted_index.through | 11, 37 |
| abstract_inverted_index.varying | 157 |
| abstract_inverted_index.Document | 74 |
| abstract_inverted_index.Internet | 39, 116 |
| abstract_inverted_index.authors' | 52 |
| abstract_inverted_index.becoming | 22 |
| abstract_inverted_index.develops | 66 |
| abstract_inverted_index.document | 145 |
| abstract_inverted_index.embedded | 121 |
| abstract_inverted_index.identify | 94 |
| abstract_inverted_index.improved | 179 |
| abstract_inverted_index.increase | 4 |
| abstract_inverted_index.internet | 12 |
| abstract_inverted_index.original | 127, 144 |
| abstract_inverted_index.outcomes | 164 |
| abstract_inverted_index.research | 25 |
| abstract_inverted_index.security | 17 |
| abstract_inverted_index.transmit | 110 |
| abstract_inverted_index.utilized | 41 |
| abstract_inverted_index.volumes, | 161 |
| abstract_inverted_index.Automated | 68 |
| abstract_inverted_index.Detection | 79 |
| abstract_inverted_index.Tampering | 77 |
| abstract_inverted_index.different | 170 |
| abstract_inverted_index.document, | 128 |
| abstract_inverted_index.documents | 113 |
| abstract_inverted_index.exploited | 87 |
| abstract_inverted_index.indicated | 174 |
| abstract_inverted_index.inspected | 166 |
| abstract_inverted_index.integrity | 31, 59 |
| abstract_inverted_index.networks, | 13 |
| abstract_inverted_index.performed | 140 |
| abstract_inverted_index.presented | 90, 104 |
| abstract_inverted_index.tampering | 55 |
| abstract_inverted_index.technique | 92, 152, 178 |
| abstract_inverted_index.watermark | 102, 119, 136 |
| abstract_inverted_index.ADMDTW-TAD | 91, 151, 177 |
| abstract_inverted_index.detection, | 27, 56 |
| abstract_inverted_index.document's | 96 |
| abstract_inverted_index.extraction | 137 |
| abstract_inverted_index.simulation | 172 |
| abstract_inverted_index.validation | 148 |
| abstract_inverted_index.appropriate | 97 |
| abstract_inverted_index.information | 10, 48 |
| abstract_inverted_index.interchange | 7 |
| abstract_inverted_index.performance | 180 |
| abstract_inverted_index.reliability | 15 |
| abstract_inverted_index.(ADMDTW-TAD) | 80 |
| abstract_inverted_index.Internet.The | 83 |
| abstract_inverted_index.Watermarking | 75 |
| abstract_inverted_index.difficulties | 53 |
| abstract_inverted_index.experimental | 147 |
| abstract_inverted_index.interchanged | 36 |
| abstract_inverted_index.measures.The | 171 |
| abstract_inverted_index.securely.The | 146 |
| abstract_inverted_index.verification | 32, 60 |
| abstract_inverted_index.watermarking | 106 |
| abstract_inverted_index.communication | 50 |
| abstract_inverted_index.contents.This | 64 |
| abstract_inverted_index.securely.Once | 117 |
| abstract_inverted_index.authentication, | 29, 57 |
| abstract_inverted_index.characteristics | 98 |
| abstract_inverted_index.destination.The | 135 |
| abstract_inverted_index.information.The | 103 |
| abstract_inverted_index.technologies.The | 51 |
| abstract_inverted_index.problem.Tampering | 26 |
| cited_by_percentile_year | |
| corresponding_author_ids | https://openalex.org/A5091747108 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 6 |
| corresponding_institution_ids | https://openalex.org/I142608572 |
| citation_normalized_percentile.value | 0.0451016 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |