{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T21:52:45Z","timestamp":1743025965344,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030415679"},{"type":"electronic","value":"9783030415686"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-41568-6_19","type":"book-chapter","created":{"date-parts":[[2020,2,28]],"date-time":"2020-02-28T00:05:12Z","timestamp":1582848312000},"page":"293-307","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["CDISS-BEMOS: A New Color Document Image Steganography System Based on Beta Elliptic Modeling of the Online Signature"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0767-0683","authenticated-orcid":false,"given":"Anissa","family":"Zenati","sequence":"first","affiliation":[]},{"given":"Wael","family":"Ouarda","sequence":"additional","affiliation":[]},{"given":"Adel M.","family":"Alimi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,28]]},"reference":[{"key":"19_CR1","doi-asserted-by":"publisher","first-page":"17027","DOI":"10.1007\/s11042-018-7085-z","volume":"78","author":"AK Abdulrahman","year":"2019","unstructured":"Abdulrahman, A.K., Ozturk, S.: A novel hybrid DCT and DWT based robust watermarking algorithm for color images. Multimed. Tools Appl. 78, 17027\u201317049 (2019)","journal-title":"Multimed. Tools Appl."},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Abraham, J., Paul, V.: An imperceptible spatial domain color image watermarking scheme. J. King Saud Univ.-Comput. Inf. Sci. (2016)","DOI":"10.14257\/ijsip.2016.9.7.13"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Al-Haj, A., Barouqa, H.: Copyright protection of e-government document images using digital watermarking. In: 2017 3rd International Conference on Information Management (ICIM), pp. 441\u2013446. IEEE (2017)","DOI":"10.1109\/INFOMAN.2017.7950424"},{"key":"19_CR4","unstructured":"Bezine, H., Alimi, A.M., Derbel, N.: Handwriting trajectory movements controlled by a beta-elliptic model. In: Proceedings of the Seventh International Conference on Document Analysis and Recognition, p. 1228. IEEE (2003)"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Burie, J.C., Ogier, J.M., Loc, C.V.: A spatial domain steganography for grayscale documents using pattern recognition techniques. In: 2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR), vol. 9, pp. 21\u201326. IEEE (2017)","DOI":"10.1109\/ICDAR.2017.391"},{"key":"19_CR6","unstructured":"Dhieb, T., Njah, S., Boubaker, H., Ouarda, W., Ayed, M.B., Alimi, A.M.: An online writer identification system based on beta-elliptic model and fuzzy elementary perceptual codes. arXiv preprint \narXiv:1804.05661\n\n (2018)"},{"issue":"5","key":"19_CR7","first-page":"263","volume":"11","author":"T Dhieb","year":"2016","unstructured":"Dhieb, T., Ouarda, W., Boubaker, H., Alimi, A.M.: Beta-elliptic model forwriter identification from online arabic handwriting. J. Inf. Assur. Secur. 11(5), 263\u2013272 (2016)","journal-title":"J. Inf. Assur. Secur."},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Dhieb, T., Ouarda, W., Boubaker, H., Halima, M.B., Alimi, A.M.: Online Arabic writer identification based on beta-elliptic model. In: ISDA, pp. 74\u201379 (2015)","DOI":"10.1109\/ISDA.2015.7489203"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Garc\u00eda-Soto, R., Hern\u00e1ndez-Anaya, S., Nakano-Miyatake, M., Rosales-Roldan, L., Perez-Meana, H.: Sender verification system for official documents based on watermarking technique. In: 2013 10th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE), pp. 227\u2013232. IEEE (2013)","DOI":"10.1109\/ICEEE.2013.6676011"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Gonge, S.S., Ghatol, A.A.: Combined DWT-DCT digital watermarking technique software used for CTS of bank. In: 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), pp. 776\u2013783. IEEE (2014)","DOI":"10.1109\/ICICICT.2014.6781379"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Hamdani, M., El Abed, H., Kherallah, M., Alimi, A.M.: Combining multiple HMMS using on-line and off-line features for off-line Arabic handwriting recognition. In: 10th International Conference on Document Analysis and Recognition (ICDAR 2009), pp. 201\u2013205. IEEE (2009)","DOI":"10.1109\/ICDAR.2009.40"},{"issue":"9","key":"19_CR12","doi-asserted-by":"publisher","first-page":"1098","DOI":"10.1109\/JRPROC.1952.273898","volume":"40","author":"DA Huffman","year":"1952","unstructured":"Huffman, D.A.: A method for the construction of minimum-redundancy codes. Proc. IRE 40(9), 1098\u20131101 (1952)","journal-title":"Proc. IRE"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Jarraya, I., Ouarda, W., Alimi, A.M.: Deep neural network features for horses identity recognition using multiview horses\u2019 face pattern. In: Ninth International Conference on Machine Vision (ICMV 2016), vol. 10341, p. 103410B. International Society for Optics and Photonics (2017)","DOI":"10.1117\/12.2269064"},{"key":"19_CR14","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/978-3-319-53480-0_21","volume-title":"Intelligent Systems Design and Applications","author":"O Lazzez","year":"2017","unstructured":"Lazzez, O., Ouarda, W., Alimi, A.M.: Age, gender, race and smile prediction based on social textual and visual data analyzing. In: Madureira, A.M., Abraham, A., Gamboa, D., Novais, P. (eds.) ISDA 2016. AISC, vol. 557, pp. 206\u2013215. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-53480-0_21"},{"key":"19_CR15","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1007\/978-3-319-52941-7_52","volume-title":"Proceedings of the 16th International Conference on Hybrid Intelligent Systems (HIS 2016)","author":"O Lazzez","year":"2017","unstructured":"Lazzez, O., Ouarda, W., Alimi, A.M.: Understand me if you can! Global soft biometrics recognition from social visual data. In: Abraham, A., Haqiq, A., Alimi, A.M., Mezzour, G., Rokbani, N., Muda, A.K. (eds.) HIS 2016. AISC, vol. 552, pp. 527\u2013538. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-52941-7_52"},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Leutenegger, S., Chli, M., Siegwart, R.Y.: BRISK: binary robust invariant scalable keypoints. IEEE (2011)","DOI":"10.1109\/ICCV.2011.6126542"},{"issue":"4","key":"19_CR17","doi-asserted-by":"publisher","first-page":"4545","DOI":"10.1007\/s11042-017-4452-0","volume":"77","author":"J Li","year":"2018","unstructured":"Li, J., Yu, C., Gupta, B., Ren, X.: Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition. Multimed. Tools Appl. 77(4), 4545\u20134561 (2018)","journal-title":"Multimed. Tools Appl."},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Ltaief, M., Bezine, H., Alimi, A.M.: A neuro-beta-elliptic model for handwriting generation movements. In: 2012 International Conference on Frontiers in Handwriting Recognition (ICFHR 2012), pp. 803\u2013808. IEEE (2012)","DOI":"10.1109\/ICFHR.2012.161"},{"issue":"6","key":"19_CR19","doi-asserted-by":"publisher","first-page":"8597","DOI":"10.1007\/s11042-016-3383-5","volume":"76","author":"K Muhammad","year":"2017","unstructured":"Muhammad, K., Ahmad, J., Rehman, N.U., Jan, Z., Sajjad, M.: CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method. Multimed. Tools Appl. 76(6), 8597\u20138626 (2017)","journal-title":"Multimed. Tools Appl."},{"issue":"6","key":"19_CR20","doi-asserted-by":"publisher","first-page":"8695","DOI":"10.1007\/s11042-016-3485-0","volume":"76","author":"S Munib","year":"2017","unstructured":"Munib, S., Khan, A.: Robust image watermarking technique using triangular regions and Zernike moments for quantization based embedding. Multimed. Tools Appl. 76(6), 8695\u20138710 (2017)","journal-title":"Multimed. Tools Appl."},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Nasri, H., Ouarda, W., Alimi, A.M.: ReLiDSS: novel lie detection system from speech signal. In: 2016 IEEE\/ACS 13th International Conference of Computer Systems and Applications (AICCSA), pp. 1\u20138. IEEE (2016)","DOI":"10.1109\/AICCSA.2016.7945789"},{"issue":"3","key":"19_CR22","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1109\/TIFS.2016.2631905","volume":"12","author":"N Nissim","year":"2016","unstructured":"Nissim, N., Cohen, A., Elovici, Y.: ALDOCX: detection of unknown malicious microsoft office documents using designated active learning methods based on new structural feature extraction methodology. IEEE Trans. Inf. Forensics Secur. 12(3), 631\u2013646 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"19_CR23","doi-asserted-by":"crossref","unstructured":"Ouarda, W., Trichili, H., Alimi, A.M., Solaiman, B.: Bag of face recognition systems based on holistic approaches. In: 2015 15th International Conference on Intelligent Systems Design and Applications (ISDA), pp. 201\u2013206. IEEE (2015)","DOI":"10.1109\/ISDA.2015.7489225"},{"issue":"4","key":"19_CR24","first-page":"201","volume":"11","author":"W Ouarda","year":"2016","unstructured":"Ouarda, W., Trichili, H., Alimi, A.M., Solaiman, B.: Towards a novel biometricsystem for smart riding club. J. Inf. Assur. Secur. 11(4), 201\u2013213 (2016)","journal-title":"J. Inf. Assur. Secur."},{"key":"19_CR25","doi-asserted-by":"crossref","unstructured":"Pandey, M.K., Parmar, G., Gupta, R., Sikander, A.: Non-blind Arnold scrambled hybrid image watermarking in YCbCr color space. Microsyst. Technol., 1\u201311 (2018)","DOI":"10.1007\/s00542-018-4162-1"},{"key":"19_CR26","doi-asserted-by":"crossref","unstructured":"Patvardhan, C., Kumar, P., Lakshmi, C.V.: Effective color image watermarking scheme using YCbCr color space and QR code. Multimed. Tools Appl., 1\u201323 (2018)","DOI":"10.1007\/s11042-017-4909-1"},{"key":"19_CR27","doi-asserted-by":"crossref","unstructured":"Pham, V.Q., Miyaki, T., Yamasaki, T., Aizawa, K.: Geometrically invariant object-based watermarking using SIFT feature. In: 2007 IEEE International Conference on Image Processing, vol. 5, pp. V\u2013473. IEEE (2007)","DOI":"10.1109\/ICIP.2007.4379868"},{"key":"19_CR28","doi-asserted-by":"crossref","unstructured":"Prasad, V., Dhavale, S.: H. 264\/AVC video protection model based on private cloud for military organisation. In: 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT), pp. 1\u20139. IEEE (2016)","DOI":"10.1109\/ICCPCT.2016.7530121"},{"issue":"7","key":"19_CR29","first-page":"34","volume":"147","author":"S Sejpal","year":"2016","unstructured":"Sejpal, S., Shah, N.: Comparative performance analysis of secured LWT-SVD based color image watermarking technique in YUV, YIQ and YCbCr color spaces. Int. J. Comput. Appl. 147(7), 34\u201340 (2016)","journal-title":"Int. J. Comput. Appl."},{"issue":"1","key":"19_CR30","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s00500-017-2489-7","volume":"22","author":"Q Su","year":"2018","unstructured":"Su, Q., Chen, B.: Robust color image watermarking technique in the spatial domain. Soft. Comput. 22(1), 91\u2013106 (2018)","journal-title":"Soft. Comput."},{"issue":"3","key":"19_CR31","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1007\/s11227-010-0500-5","volume":"64","author":"H Wang","year":"2013","unstructured":"Wang, H.: Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks. J. Supercomput. 64(3), 883\u2013897 (2013)","journal-title":"J. Supercomput."}],"container-title":["Lecture Notes in Computer Science","Risks and Security of Internet and Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-41568-6_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,28]],"date-time":"2020-04-28T06:17:36Z","timestamp":1588054656000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-41568-6_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030415679","9783030415686"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-41568-6_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"28 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CRiSIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Risks and Security of Internet and Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hammamet","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tunisia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"crisis2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.crisis2019.redcad.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"64","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}