{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:08:47Z","timestamp":1743152927730,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031276217"},{"type":"electronic","value":"9783031276224"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-27622-4_10","type":"book-chapter","created":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T01:15:28Z","timestamp":1679879728000},"page":"119-132","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Circular BlockEntropies and Fast Legendre Moments Based Content Preserving Image Authentication"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9920-549X","authenticated-orcid":false,"given":"K.","family":"Alice","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2928-1099","authenticated-orcid":false,"given":"M.","family":"Sindhuja","sequence":"additional","affiliation":[]},{"given":"B.","family":"Pandeeswari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,19]]},"reference":[{"issue":"1","key":"10_CR1","doi-asserted-by":"publisher","first-page":"17211","DOI":"10.1007\/s11042-019-07750-7","volume":"79","author":"K Alice","year":"2020","unstructured":"Alice, K., Ramaraj, N., Rajagopalan, S.P.: Rotation invariant image authentication using haralick features. Multimed. Tools Appl. 79(1), 17211\u201317225 (2020)","journal-title":"Multimed. Tools Appl."},{"key":"10_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-007-0154-3","volume":"39","author":"A Haouzia","year":"2008","unstructured":"Haouzia, A., Noumeir, R.: Methods for image authentication a survey. Multimed. Tools Appl. 39, 1\u201346 (2008)","journal-title":"Multimed. Tools Appl."},{"issue":"6","key":"10_CR3","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1109\/TPAMI.1986.4767851","volume":"8","author":"JF Canny","year":"1986","unstructured":"Canny, J.F.: A computational approach to edge detection. IEEE Trans. Pattern Anal. Mach. Intell. 8(6), 679\u2013698 (1986)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"unstructured":"CASIA tampered image detection evaluation database. http:\/\/forensics\/idealtest.org","key":"10_CR4"},{"issue":"7","key":"10_CR5","doi-asserted-by":"publisher","first-page":"1019","DOI":"10.1109\/TMM.2015.2427744","volume":"17","author":"MC David","year":"2015","unstructured":"David, M.C.: BerndGirod \u201ca hybrid mobile visual search system with compact global signature\u201d. IEEE Trans. Multimed. 17(7), 1019\u20131030 (2015)","journal-title":"IEEE Trans. Multimed."},{"issue":"1","key":"10_CR6","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1007\/s11042-015-3018-2","volume":"76","author":"H Shojanazeri","year":"2015","unstructured":"Shojanazeri, H., Wan Adnan, W.A., Syed Ahmad, S.M., Rahimipour, S.: Authentication of images using Zernike moment watermarking. Multimed. Tools Appl. 76(1), 577\u2013606 (2015). https:\/\/doi.org\/10.1007\/s11042-015-3018-2","journal-title":"Multimed. Tools Appl."},{"unstructured":"Kailasanathan, C., Safavi-Naini, R., Ogunbona, P.: Image authentication surviving acceptable modifications. In: IEEE-EURASIP, Workshop on Nonlinear Signal and Image Processing (2001)","key":"10_CR7"},{"issue":"12","key":"10_CR8","doi-asserted-by":"publisher","first-page":"3597","DOI":"10.1016\/j.patcog.2007.04.014","volume":"40","author":"KM Hosny","year":"2007","unstructured":"Hosny, K.M.: Exact Legendre moment computation for gray level images. Pattern Recogn. 40(12), 3597\u20133605 (2007)","journal-title":"Pattern Recogn."},{"doi-asserted-by":"crossref","unstructured":"Sebastian, L., Varghese, A., Manesh, T.: Image authentication by content preserving robust image hashing using local and global features. 1877-0509. Elsevier (2015)","key":"10_CR9","DOI":"10.1016\/j.procs.2015.02.081"},{"unstructured":"Lin, C.Y., Chang, S.F.: A robust image authentication method distinguishing JPEG compression from malicious manipulation. CU\/CTR Technical report 486-97-19 (1997)","key":"10_CR10"},{"unstructured":"Hashmi, M.F., Hambarde, A.R., Keskar, A.G.: Robust image authentication based on HMM and SVD classifiers. Eng. Lett. 22(4) (2014)","key":"10_CR11"},{"key":"10_CR12","doi-asserted-by":"publisher","first-page":"136","DOI":"10.3390\/electronics11010136","volume":"11","author":"MZ Salim","year":"2022","unstructured":"Salim, M.Z., Abboud, A.J., Yildirim, R.: A visual cryptography-based watermarking approach for the detection and localization of image forgery. Electronics 11, 136 (2022)","journal-title":"Electronics"},{"unstructured":"Ur Rehman, O., Tabatabaci, S.A.H.A.E., Zivic, N., Ruland, C.: Spatial and frequency domain complementary watermarks for image authentication and correction. In: SCC 2015 in Hamburg, Germany. VDE Verlag GMBH, Berlin (2015)","key":"10_CR13"},{"doi-asserted-by":"crossref","unstructured":"Queluz, M.P.: Content-based integrity protection of digital images. In: Proceedings of the SPIE Conference on Security and Watermarking of Multimedia Contents, San Jose, California, USA, vol. 3657, pp 85\u201393 (1999)","key":"10_CR14","DOI":"10.1117\/12.344706"},{"doi-asserted-by":"crossref","unstructured":"Schneider, M., Chang, S.-F.: A robust content based digital signature for image authentication. In: Proceedings of the IEEE International Conference on Image Processing, pp. 227\u2013230 (1996)","key":"10_CR15","DOI":"10.1109\/ICIP.1996.560425"},{"issue":"7","key":"10_CR16","doi-asserted-by":"publisher","first-page":"945","DOI":"10.1109\/TMM.2015.2432672","volume":"17","author":"S Amir","year":"2015","unstructured":"Amir, S.: Secure and robust two-phase image authentication. IEEE Trans. Multimed. 17(7), 945\u2013956 (2015)","journal-title":"IEEE Trans. Multimed."},{"doi-asserted-by":"crossref","unstructured":"Storck, D.: A new approach to integrity of digital images. In: Proceedings of the IFIP Conference on Mobile Communication, pp. 309\u2013316 (1996)","key":"10_CR17","DOI":"10.1007\/978-0-387-34980-0_31"},{"unstructured":"Sun, Q., Chang, S.F.: Semi-fragile image authentication using generic wavelet domain features and ECC. In: Proceedings of the ICIP (2002)","key":"10_CR18"},{"doi-asserted-by":"crossref","unstructured":"Nguyen, T.H., Duong, D.M., Doung, D.A.: Robust and high capacity watermarking for image based on DWT-SVD. In: IEEE RIVF, International Conference on Computing and Communication Technologies Research Innovation and Vision for Future (RIVF) (2015)","key":"10_CR19","DOI":"10.1109\/RIVF.2015.7049879"},{"doi-asserted-by":"crossref","unstructured":"Wu, C.W.: Limitations and requirements of content based multimedia authentication systems. In: Proceedings of the IS&T\/SPIE\u2019s International Symposium on Electronic Imaging: Science and Technology, San Jose, CA, vol. 4314, pp. 241\u2013252 (2001)","key":"10_CR20","DOI":"10.1117\/12.435404"},{"issue":"3","key":"10_CR21","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1109\/TMM.2002.802018","volume":"4","author":"CW Wu","year":"2002","unstructured":"Wu, C.W.: On the design of content based multimedia authentication systems. IEEE Trans. Multimed. 4(3), 385\u2013393 (2002)","journal-title":"IEEE Trans. Multimed."},{"issue":"1","key":"10_CR22","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/TIFS.2012.2223680","volume":"8","author":"Y Zhao","year":"2013","unstructured":"Zhao, Y., Wang, S., Zhang, X., Yao, H.: Robust hashing for image authentication using zernike moments and local features. IEEE Trans. Inf. Forensics Secur. 8(1), 55\u201363 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"unstructured":"Yang, H.Z., Shu, G.N., Han, C., Toumoulin, L., Luo, M.: Efficient Legendre moment computation for grey level images. Laboratory of Image Science and Technology, Department of Biology and Medical Engineering, Southeast University, 210096 (2014)","key":"10_CR23"},{"key":"10_CR24","doi-asserted-by":"publisher","first-page":"2061","DOI":"10.1016\/j.sigpro.2013.01.008","volume":"93","author":"Z Tang","year":"2013","unstructured":"Tang, Z., Zhang, X., Huaug, L., Dai, Y.: Robust image hashing using ring based entropies. Signal Process. 93, 2061\u20132069 (2013)","journal-title":"Signal Process."},{"key":"10_CR25","doi-asserted-by":"publisher","first-page":"254","DOI":"10.3390\/ijgi9040254","volume":"9","author":"X Zhang","year":"2020","unstructured":"Zhang, X., Yan, H., Zhang, L., Wang, H.: High-resolution remote sensing image integrity authentication method considering both global and local features. Int. J. Geo-Inf. 9, 254 (2020)","journal-title":"Int. J. Geo-Inf."}],"container-title":["Communications in Computer and Information Science","Deep Sciences for Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-27622-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T01:58:41Z","timestamp":1729130321000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-27622-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031276217","9783031276224"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-27622-4_10","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"19 March 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IconDeepCom","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Deep Sciences for Computing and Communications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chennai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 March 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 March 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icondeepcom2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.srmist.edu.in\/icondeepcom-2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}