{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T16:00:44Z","timestamp":1772294444042,"version":"3.50.1"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319120119","type":"print"},{"value":"9783319120126","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-12012-6_13","type":"book-chapter","created":{"date-parts":[[2014,10,31]],"date-time":"2014-10-31T15:09:45Z","timestamp":1414768185000},"page":"113-120","source":"Crossref","is-referenced-by-count":3,"title":["On the Implementation of a Digital Watermarking Based on Phase Congruency"],"prefix":"10.1007","author":[{"given":"Abhishek","family":"Basu","sequence":"first","affiliation":[]},{"given":"Arindam","family":"Saha","sequence":"additional","affiliation":[]},{"given":"Jeet","family":"Das","sequence":"additional","affiliation":[]},{"given":"Sandipta","family":"Roy","sequence":"additional","affiliation":[]},{"given":"Sushavan","family":"Mitra","sequence":"additional","affiliation":[]},{"given":"Indranil","family":"Mal","sequence":"additional","affiliation":[]},{"given":"Subir Kumar","family":"Sarkar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Kim, H.J., Macq, B.: Introduction to the special issue on authentication, copyright protection, and information hiding. IEEE Transactions on Circuits and Systems for Video Technology\u00a013(8) (August 2003)","DOI":"10.1109\/TCSVT.2003.817838"},{"key":"13_CR2","unstructured":"Garzia, F.: Handbook of Communications Security. WIT Press (2013)"},{"key":"13_CR3","unstructured":"Mohanty, S.P.: Digital Watermarking: A Tutorial Review, Report, Dept. of Electrical Engineering, Indian Institute of Science, Bangalore, India (1999), \n                    http:\/\/www.cs.unt.edu\/~smohanty\/research\/Reports\/MohantyWatermarkingSurvey1999.pdf"},{"issue":"3","key":"13_CR4","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1016\/S0165-1684(98)00026-7","volume":"66","author":"B.R. Macq","year":"1998","unstructured":"Macq, B.R., Pitas, I.: Special Issue on Watermarking. Signal Process.\u00a066(3), 281\u2013282 (1998)","journal-title":"Signal Process."},{"key":"13_CR5","doi-asserted-by":"publisher","first-page":"1064","DOI":"10.1109\/5.687830","volume":"86","author":"M.D. Swanson","year":"1998","unstructured":"Swanson, M.D., Kobayashi, M., Tewfik, A.H.: Multimedia Data Embedding and Watermarking Technologies. Proc. IEEE\u00a086, 1064\u20131087 (1998)","journal-title":"Proc. IEEE"},{"issue":"7","key":"13_CR6","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1145\/278476.278489","volume":"41","author":"J.M. Acken","year":"1998","unstructured":"Acken, J.M.: How Watermarking Adds Value to Digital Content. Commun. ACM\u00a041(7), 74\u201377 (1998)","journal-title":"Commun. ACM"},{"key":"13_CR7","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1109\/26.662643","volume":"46","author":"S.H. Low","year":"1998","unstructured":"Low, S.H., Maxemchuk, N.F., Lapone, A.M.: Document Identification for Copyright Protection using Centroid Detection. IEEE Trans. on Commun.\u00a046, 372\u2013383 (1998)","journal-title":"IEEE Trans. on Commun."},{"key":"13_CR8","unstructured":"Basu, A., Das, T.S., Sarkar, S.K.: Robust Visual Information Hiding Framework Based on HVS Pixel Adaptive LSB Replacement (HPALR) Technique. International Journal of Imaging and Robotics\u00a06(A11), 71\u201398 (2011) ISSN: 2231-525X"},{"issue":"1","key":"13_CR9","first-page":"10","volume":"22","author":"A. Basu","year":"2013","unstructured":"Basu, A., Sarkar, S.K.: On the Implementation of Robust Copyright Protection Scheme Using Visual Attention Model. Information Security Journal: A Global Perspective (Taylor & Francis Journal)\u00a022(1), 10\u201320 (2013)","journal-title":"Information Security Journal: A Global Perspective (Taylor & Francis Journal)"},{"issue":"3","key":"13_CR10","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1016\/j.jvcir.2012.01.010","volume":"23","author":"A. Keskinarkaus","year":"2012","unstructured":"Keskinarkaus, A., Pramila, A., Sepp\u00e4nen, T.: Image watermarking with feature point based synchronization robust to print\u2013scan attack. Journal of Visual Communication and Image Representation\u00a023(3), 507\u2013515 (2012)","journal-title":"Journal of Visual Communication and Image Representation"},{"key":"13_CR11","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-642-35270-6_5","volume-title":"Computer Applications for Web, Human Computer Interaction, Signal and Image Processing, and Pattern Recognition","author":"X. Jin","year":"2012","unstructured":"Jin, X., Kim, J.: Imperceptibility Improvement of Image Watermarking Using Variance Selection. In: Kim, T.-H., Mohammed, S., Ramos, C., Abawajy, J., Kang, B.-H., \u015al\u0119zak, D. (eds.) SIP\/WSE\/ICHCI 2012. CCIS, vol.\u00a0342, pp. 31\u201338. Springer, Heidelberg (2012)"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Jaseena, K.U., John, A.: Text Watermarking using Combined Image and Text for Authentication and Protection. International Journal of Computer Applications\u00a020(4) (2011)","DOI":"10.5120\/2424-3255"},{"issue":"1280","key":"13_CR13","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1098\/rspb.1988.0073","volume":"235","author":"M.C. Morrone","year":"1988","unstructured":"Morrone, M.C., Burr, D.C.: Feature detection in human vision: a phase-dependent energy model. Proc. R. Soc. Lond. B Biol. Sci.\u00a0235(1280), 221\u2013245 (1988)","journal-title":"Proc. R. Soc. Lond. B Biol. Sci."},{"key":"13_CR14","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1109\/6046.985560","volume":"4","author":"R. Liu","year":"2002","unstructured":"Liu, R., Tan, T.: A SVD-Based Watermarking Scheme for Protecting Rightful Ownership. IEEE Transactions on Multimedia\u00a04, 121\u2013128 (2002)","journal-title":"IEEE Transactions on Multimedia"},{"issue":"6","key":"13_CR15","first-page":"284","volume":"10","author":"M.B. Aliwa","year":"2005","unstructured":"Aliwa, M.B., El-Tobely, T.E.-A., Fahmy, M.M., Nasr, M.E.S., El-Aziz, M.H.A.: Fidelity and Robust Digital Watermarking Adaptively Pixel based on Medial Pyramid of Embedding Error Gray Scale Images. IJCSNS (International Journal of Computer Science and Network Security)\u00a010(6), 284\u2013314 (2005)","journal-title":"IJCSNS (International Journal of Computer Science and Network Security)"},{"issue":"1280","key":"13_CR16","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1098\/rspb.1988.0073","volume":"235","author":"M.C. Morrone","year":"1988","unstructured":"Morrone, M.C., Burr, D.C.: Feature detection in human vision: A phase dependent energy model. Proc. R. Soc. Lond. B, Biol. Sci.\u00a0235(1280), 221\u2013245 (1988)","journal-title":"Proc. R. Soc. Lond. B, Biol. Sci."},{"key":"13_CR17","first-page":"1","volume":"1","author":"P.D. Kovesi","year":"1999","unstructured":"Kovesi, P.D.: Image features from phase congruency. Videre: Journal of Computer Vision Research\u00a01, 1\u201326 (1999)","journal-title":"Videre: Journal of Computer Vision Research"},{"key":"13_CR18","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1016\/j.dsp.2011.01.017","volume":"21","author":"C.-C. Lai","year":"2011","unstructured":"Lai, C.-C.: A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm. Digital Signal Processing\u00a021, 522\u2013527 (2011)","journal-title":"Digital Signal Processing"},{"issue":"5","key":"13_CR19","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1109\/LSP.2006.870357","volume":"13","author":"J. Mielikainen","year":"2006","unstructured":"Mielikainen, J.: LSB Matching Revisited. IEEE Signal Processing Letters\u00a013(5), 285\u2013287 (2006)","journal-title":"IEEE Signal Processing Letters"},{"key":"13_CR20","doi-asserted-by":"publisher","first-page":"1201","DOI":"10.1016\/j.ins.2009.12.027","volume":"180","author":"H. Xu","year":"2010","unstructured":"Xu, H., Wang, J., Kim, H.J.: Near-optimal solution to pair-wise LSB matching via an immune programming strategy. Information Sciences\u00a0180, 1201\u20131217 (2010)","journal-title":"Information Sciences"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12012-6_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T04:50:08Z","timestamp":1675831808000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12012-6_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319120119","9783319120126"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12012-6_13","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}