{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:56:32Z","timestamp":1726037792225},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030158866"},{"type":"electronic","value":"9783030158873"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-15887-3_15","type":"book-chapter","created":{"date-parts":[[2019,7,19]],"date-time":"2019-07-19T14:02:57Z","timestamp":1563544977000},"page":"341-356","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Robust and Secure Hiding Scheme for Open Channel Transmission of Digital Images"],"prefix":"10.1007","author":[{"given":"Harsh Vikram","family":"Singh","sequence":"first","affiliation":[]},{"given":"Purnima","family":"Pal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,20]]},"reference":[{"key":"15_CR1","unstructured":"Mei Jiansheng1, Li Sukang1 and Tan Xiaomei \u201cA Digital Watermarking Algorithm Based on DCT and DWT\u201d, International Symposium on Web Information Systems and Applications (WISA) 2009, pp. 104-107."},{"key":"15_CR2","unstructured":"W. Zeng and B Liu, \u201cOn Resolving Rightful Ownership of Digital Images by Invisible Watermarks\u201d, Proc. IEEE 1997 Intrenational Conference on Image Processing, ICIP-97, Vol. 1, pp 552-555."},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Chandra Munesh, Pandey Shikha,\u201d A DWT Domain Visible Watermarking Techniques for Digital Images\u201d International Conference on Electronics and Information Engineering (ICEIE), Volume 2,2010,pp-421-427.","DOI":"10.1109\/ICEIE.2010.5559809"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Asna Furqan, Munish Kumar, \u201cStudy and Analysis of Robust DWT-SVD Domain Based Digital Image Watermarking Technique Using MATLAB\u201d, IEEE International Conference on Computational Intelligence & Communication Technology, 2015 pp 638-644.","DOI":"10.1109\/CICT.2015.74"},{"key":"15_CR5","unstructured":"Saira Mudassar, Munazah Jamal, Farkhand Shakeel Mahmood, Nouman Shah, Hamza Bin Tahir, Hassan Malik, \u201cHybrid DWT-SVD Digital Image Watermarking\u201d, International Journal of Computer (IJC), 2017, pp 105-109"},{"key":"15_CR6","unstructured":"Xueyi Ye, Xueting Chen, Meng Deng, Shuyun Hui, Yunlu Wang, \u201cA Multiple-Level DCT Based Robust DWT-SVD Watermark Method\u201d,10th International Conference on Computational Intelligence and Security, IEEE, 2014, pp 479-483."},{"key":"15_CR7","unstructured":"Neha Chauhan, Akhilesh A. Waoo and P. S. Patheja, \u201cinformation hiding watermarking detection technique by psnr and rgb intensity\u201d, Journal of Global Research in Computer Science, Volume 3, No. 9, September 2012 PP 18-22."},{"issue":"2","key":"15_CR8","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1109\/83.982816","volume":"11","author":"Y. Wang","year":"2002","unstructured":"Wang Y., Doherty J.F., Dyck V.R.E., \u201cA wavelet-based watermarking algorithm for ownership verification of digital images\u201d, IEEE Transactions, Image Processing, 11 pp. 77-88, 2002.","journal-title":"IEEE Transactions on Image Processing"},{"key":"15_CR9","unstructured":"Evelyn Brannock, Michael Weeks, Robert Harrison, \u201cWatermarking with Wavelets: Simplicity Leads to Robustness\u201d, Computer Science Department Georgia State University, South eastcon, IEEE, 2018, pp 587 \u2013 592."},{"issue":"2","key":"15_CR10","doi-asserted-by":"publisher","first-page":"126","DOI":"10.7753\/IJCATR0202.1008","volume":"2","author":"Namita Chandrakar","year":"2013","unstructured":"N. Chandrakar and J. Baggaa, \u201cPerformance Comparison of Digital Image Watermarking Techniques: A Survey\u201d, International Journalof computer Application Technology and Research, vol. 2, issue 2,(2013), pp. 126-130.","journal-title":"International Journal of Computer Applications Technology and Research"},{"key":"15_CR11","unstructured":"Parag Havaldar, Gerard Medioni, \u201cWatermarking Techniques\u201d in Multimedia Systems, Algorithms, Standards, and Industry Practices, Boston, USA, Course Technology, Cengage Learning, 2010, ch.13, sec.2.1, pp. 414-415."},{"key":"15_CR12","unstructured":"Vinita Gupta, \u201cA Review on Image Watermarking and Its Techniques\u201d, International Journal of Advanced Research in Computer Science and Software Engineering,Volume 4, Issue 1, 2014"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Emir Ganic, and Ahmet M. Eskicioglu, \u201cRobust DWT-SVD Domain Image Watermarking: Embedding date in All Frequencies,\u201d CiteSeerX, MM&SEC\u201904, 2004, pp 20-21.","DOI":"10.1145\/1022431.1022461"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Chandra Munesh, Pandey Shikha,\u201d A DWT Domain Visible Watermarking Techniques for Digital Images\u201d International Conference on Electronics and Information Engineering (ICEIE), Volume 2,2010,pp-421-427.","DOI":"10.1109\/ICEIE.2010.5559809"},{"key":"15_CR15","unstructured":"Harsh Vikram Singh, Sonam Tyagi, Raghav Agarwal Sandeep Kumar Gangwar, \u201cDigital Watermarking Techniques for Security Applications\u201d, International Conference on Emerging Trends in Electrical, Electronics and Sustainable Energy Systems (ICETEESES) 2016, pp 379-382."},{"key":"15_CR16","unstructured":"M.M Yeung et al. \u201cDigital Watermarking for High-Quality Imaging\u201d,1997 IEEE First Workshop on Multimedia Signal Processing, J Princeton, New Jersey, 1997, pp 357-362."},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Munesh Chandra, Shikha Pandel, Rama Chaudhary, \u201cDigital watermarking technique for protecting digital images\u201d Third IEEE International Conference on Computer and Information Science and Technology (ICCSIT 2010), pp.226-233.","DOI":"10.1109\/ICCSIT.2010.5565177"},{"key":"15_CR18","unstructured":"Mei Jiansheng1, Li Sukang1 and Tan Xiaomei \u201cA Digital Watermarking Algorithm Based on DCT and DWT\u201d, International Symposium on Web Information Systems and Applications (WISA) 2009, pp. 104-107."},{"key":"15_CR19","unstructured":"Harsh Vikram Singh, \u201cInformation Hiding Techniques for Image Covers,\u201d LAP LAMBERT Academic Publishing GmbH & Co. KG, Ddudweiler Landstr. 99, 66123 Saarbr\u00fccken, Germany, ISBN-10: 3843377537 ISBN-13: 978-3843377539"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Harsh Vikram Singh, Raghav Agrawal \u201cDiagnosis of Carious Legions Using Digital Processing of Dental Radiographs\u201d Scopus Indexed Springer Book Series \u201cComputational Vision and Bio Inspired Computing\u201d, pp 864-882, 2018. ( ISBN: 978-3-319-71766-1)","DOI":"10.1007\/978-3-319-71767-8_74"},{"key":"15_CR21","unstructured":"Harsh Vikram Singh, Ankur Rai \u201cMedical Image Watermarking in Transform Domain\u201d Accepted in Scopus Indexed Springer Book Series \u201cAdvances in Intelligent Systems and Computing\u201d. April 2018 (ISBN: 978-3-319-45991-2)"},{"key":"15_CR22","unstructured":"Harsh Vikram Singh and Arun Kumar Singh \u201cDCT and DWT based Intellectual Right Protection in Digital Images\u201d Accepted in Scopus Indexed Springer Book Series \u201cAdvances in Intelligent Systems and Computing\u201d. May 2018 (ISBN: 978-3-319-45991-2)"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Harsh Vikram Singh, Ankur Rai, \u201cMachine Learning Based Robust Watermarking Technique for Medical Image Transmitted over LTE Network\u201d, Journal of Intelligent Systems (JISYS), De Gruyter, Scopus, Vol. 27 (1), pp.105-114 (2018) (ISSN2191-026X)","DOI":"10.1515\/jisys-2017-0068"}],"container-title":["Handbook of Multimedia Information Security: Techniques and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-15887-3_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,19]],"date-time":"2019-07-19T14:44:29Z","timestamp":1563547469000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-15887-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030158866","9783030158873"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-15887-3_15","relation":{},"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"20 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}