{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T05:57:04Z","timestamp":1774418224892,"version":"3.50.1"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030113889","type":"print"},{"value":"9783030113896","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-11389-6_11","type":"book-chapter","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T16:51:03Z","timestamp":1548348663000},"page":"137-150","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["DWT and QR Code Based Watermarking for Document DRM"],"prefix":"10.1007","author":[{"given":"Nicol\u00f2","family":"Cardamone","sequence":"first","affiliation":[]},{"given":"Fabrizio","family":"d\u2019Amore","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,24]]},"reference":[{"key":"11_CR1","doi-asserted-by":"publisher","unstructured":"Altaay, A.A.J., Sahib, S.B., Zamani, M.: An introduction to image steganography techniques. In: 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT). pp. 122\u2013126, November 2012. https:\/\/doi.org\/10.1109\/ACSAT.2012.25","DOI":"10.1109\/ACSAT.2012.25"},{"key":"11_CR2","unstructured":"Beer, D.: Quirc. https:\/\/github.com\/dlbeer\/quirc"},{"issue":"6","key":"11_CR3","first-page":"361","volume":"3","author":"FG Beram","year":"2014","unstructured":"Beram, F.G.: Effective parameters of image steganography techniques. Int. J. Comput. Appl. Technol. Res. 3(6), 361\u2013363 (2014)","journal-title":"Int. J. Comput. Appl. Technol. Res."},{"key":"11_CR4","unstructured":"BSI: Information technology. Automatic identification and data capture techniques. QR Code bar code symbology specification. BSI, London, 3 March 2015, Standard Number BS ISO\/IEC 18004:2015"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Chen, J.H., Chen, W.Y., Chen, C.H.: Identification recovery scheme using Quick Response (QR) code and watermarking technique (2013)","DOI":"10.12785\/amis\/080216"},{"key":"11_CR6","unstructured":"Chiavarelli, S., d\u2019Amore, F.: A novel approach to image DRM relying on DWT and QR-code based watermarking. In: Multidisciplinary Symposium on ICT Research in Russian Federation and Europe on \u201cIntegrating Research Agendas and Devising Joint Challenges\u201d (REMS 2018), October 2018"},{"key":"11_CR7","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1007\/978-3-319-59870-3_18","volume-title":"Information Security and Privacy","author":"YW Chow","year":"2017","unstructured":"Chow, Y.W., Susilo, W., Tonien, J., Zong, W.: A QR code watermarking approach based on the dwt-dct technique. In: Pieprzyk, J., Suriadi, S. (eds.) Information Security and Privacy, pp. 314\u2013331. Springer International Publishing, Cham (2017)"},{"issue":"5","key":"11_CR8","doi-asserted-by":"publisher","first-page":"961","DOI":"10.1109\/18.57199","volume":"36","author":"I Daubechies","year":"1990","unstructured":"Daubechies, I.: The wavelet transform, time-frequency localization and signal analysis. IEEE Trans. Inf. Theory 36(5), 961\u20131005 (1990). https:\/\/doi.org\/10.1109\/18.57199","journal-title":"IEEE Trans. Inf. Theory"},{"key":"11_CR9","unstructured":"Fukuchi, K.: libqrencode. https:\/\/fukuchi.org\/works\/qrencode"},{"key":"11_CR10","unstructured":"Nishane, S., Umale, V.M.: Digital image watermarking based on DWT using QR code. Int. J. Curr. Eng. and Technol. (2015)"},{"key":"11_CR11","doi-asserted-by":"publisher","unstructured":"Panyavaraporn, J., Horkaew, P., Wongtrairat, W.: QR code watermarking algorithm based on wavelet transform. In: 2013 13th International Symposium on Communications and Information Technologies (ISCIT), pp. 791\u2013796, September 2013. https:\/\/doi.org\/10.1109\/ISCIT.2013.6645969","DOI":"10.1109\/ISCIT.2013.6645969"},{"issue":"4","key":"11_CR12","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/5.488699","volume":"84","author":"K Ramchandran","year":"1996","unstructured":"Ramchandran, K., Vetterli, M., Herley, C.: Wavelets, subband coding, and best bases. Proc. IEEE 84(4), 541\u2013560 (1996). https:\/\/doi.org\/10.1109\/5.488699","journal-title":"Proc. IEEE"},{"issue":"4","key":"11_CR13","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600\u2013612 (2004). https:\/\/doi.org\/10.1109\/TIP.2003.819861","journal-title":"IEEE Trans. Image Process."},{"key":"11_CR14","doi-asserted-by":"publisher","unstructured":"Xu, J., Sung, A.H., Shi, P., Liu, Q.: Jpeg compression immune steganography using wavelet transform. In: Proceedingsof the International Conference on Information Technology: Coding and Computing, 2004, ITCC 2004. vol. 2, pp. 704\u2013708, April 2004. https:\/\/doi.org\/10.1109\/ITCC.2004.1286737","DOI":"10.1109\/ITCC.2004.1286737"}],"container-title":["Lecture Notes in Computer Science","Digital Forensics and Watermarking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-11389-6_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T14:53:42Z","timestamp":1709823222000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-11389-6_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030113889","9783030113896"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-11389-6_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IWDW","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Digital Watermarking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jeju Island","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwdw2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iwdw2018.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}