{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T04:10:44Z","timestamp":1749787844423,"version":"3.41.0"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319489582"},{"type":"electronic","value":"9783319489599"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48959-9_3","type":"book-chapter","created":{"date-parts":[[2016,11,30]],"date-time":"2016-11-30T14:17:29Z","timestamp":1480515449000},"page":"29-39","source":"Crossref","is-referenced-by-count":5,"title":["Visual Cryptography Based Lossless Watermarking for Sensitive Images"],"prefix":"10.1007","author":[{"given":"Surekha","family":"Borra","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Viswanadha Raju","family":"S.","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lakshmi","family":"H.R.","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,12,1]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Cox, I.J., Mille, M.L., Bloom, J.A.: Watermarking applications and their properties. In: Proceedings of International Conference Information Technology: Coding and Computing, Las Vegas, NV, USA, pp. 6\u201310 (2000)","DOI":"10.1109\/ITCC.2000.844175"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Surekha, B., Swamy, G.N.: Digital image ownership verification based on spatial correlation of colors. In: Proceedings of IET Conference on Image Processing, pp. 1\u20135. University of Westminster, London (2012)","DOI":"10.1049\/cp.2012.0448"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Wan, Y.H., Yuan, Q.L., Ji, S.M., He, L.M., Wang, Y.L.: A survey of the image copy detection. In: Proceedings of IEEE Conference on Cybernetics and Intelligent Systems, Chengdu, pp. 738\u2013743 (2008)","DOI":"10.1109\/ICCIS.2008.4670942"},{"key":"3_CR4","doi-asserted-by":"crossref","first-page":"1015","DOI":"10.1016\/j.jss.2009.12.026","volume":"83","author":"HH Tsai","year":"2010","unstructured":"Tsai, H.H., Tseng, H.C., Lai, Y.S.: Robust lossless image watermarking based on a-trimmed mean algorithm and support vector machine. J. Syst. Softw. 83, 1015\u20131028 (2010)","journal-title":"J. Syst. Softw."},{"key":"3_CR5","unstructured":"Naor, M., Shamir, A.: Visual cryptography. In: Proceedings of Workshop on the Theory and Application of Cryptographic Techniques-Advances in Cryptology, Perugia, Italy, pp. 1\u201312 (1994)"},{"issue":"2","key":"3_CR6","first-page":"96","volume":"3","author":"R Hwang","year":"2000","unstructured":"Hwang, R.: Digital image copyright protection scheme based on visual cryptography. Tamkang J. Sci. Eng. 3(2), 96\u2013106 (2000)","journal-title":"Tamkang J. Sci. Eng."},{"key":"3_CR7","unstructured":"Hou, Y.C.: Copyright protection based on visual cryptography. In: Proceedings of 6th World Multi Conference on Systemics, Cybernetics and Informatics, Orlando, FL, USA, vol. 13, pp. 104\u2013109 (2002)"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Nag, A., Singh, J.P., Biswas, S., Sarkar, D., Sarkar, P.P.: A novel copyright protection scheme using visual cryptography. In: Abraham, A., Mauri, J.L., Buford, J.F., Suzuki, J., Thampi, S.M. (eds.) Advances in Computing and Communications. CCIS, vol. 191, pp. 612\u2013619. Springer, Heidelberg (2011)","DOI":"10.1007\/978-3-642-22714-1_63"},{"key":"3_CR9","first-page":"482","volume":"44","author":"RI Zaghloul","year":"2008","unstructured":"Zaghloul, R.I., Al-Rawashdeh, E.F.: HSV image watermarking scheme based on visual cryptography. World Acad. Sci. Eng. Technol. J. 44, 482\u2013485 (2008)","journal-title":"World Acad. Sci. Eng. Technol. J."},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Hou, Y.C., Huang, P.H.: Image protection based on visual cryptography and statistical property. In: Proceedings of IEEE Statistical Signal Processing Workshop, Nice, France, pp. 481\u2013484 (2011)","DOI":"10.1109\/SSP.2011.5967737"},{"issue":"4","key":"3_CR11","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1016\/j.patrec.2003.12.011","volume":"25","author":"CN Yang","year":"2004","unstructured":"Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recogn. Lett. 25(4), 481\u2013494 (2004)","journal-title":"Pattern Recogn. Lett."},{"issue":"2","key":"3_CR12","first-page":"99","volume":"3","author":"KM Singh","year":"2009","unstructured":"Singh, K.M.: Dual watermarking scheme for copyright protection. Int. J. Comput. Sci. Eng. Syst. 3(2), 99\u2013106 (2009)","journal-title":"Int. J. Comput. Sci. Eng. Syst."},{"key":"3_CR13","unstructured":"Hsu, C.S.: A study of visual cryptography and its applications to copyright protection based on goal programming and statistics. Ph.D. Dissertation, National Central University, Department of Information Management, Taiwan (2004)"},{"issue":"1","key":"3_CR14","first-page":"1","volume":"5","author":"B Surekha","year":"2011","unstructured":"Surekha, B., Swamy, G.N.: A spatial domain public image watermarking. Int. J. Secur. Appl. 5(1), 1\u201311 (2011)","journal-title":"Int. J. Secur. Appl."},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Surekha, B., Swamy, G.N.: Lossless watermarking technique for copyright protection of high resolution images. In: Proceedings of IEEE TENSYMP 2014, Kaula Lumpur, Malaysia, pp. 73\u201378 (2014)","DOI":"10.1109\/TENCONSpring.2014.6863000"},{"issue":"6","key":"3_CR16","first-page":"1","volume":"46","author":"MS Wang","year":"2007","unstructured":"Wang, M.S., Chen, W.C.: Digital image copyright protection scheme based on visual cryptography and singular value decomposition. Opt. Eng. 46(6), 1\u20138 (2007)","journal-title":"Opt. Eng."},{"key":"3_CR17","doi-asserted-by":"crossref","first-page":"931","DOI":"10.1016\/S0167-8655(02)00023-5","volume":"23","author":"CC Chang","year":"2002","unstructured":"Chang, C.C., Chuang, J.C.: An image intellectual property protection scheme for gray-level images using visual secret sharing strategy. Pattern Recogn. Lett. 23, 931\u2013941 (2002)","journal-title":"Pattern Recogn. Lett."},{"key":"3_CR18","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1117\/1.1346585","volume":"40","author":"RJ Hwang","year":"2001","unstructured":"Hwang, R.J., Chang, C.C.: Hiding a picture in two pictures. Opt. Eng. 40, 342\u2013351 (2001)","journal-title":"Opt. Eng."},{"issue":"2","key":"3_CR19","first-page":"214","volume":"15","author":"SF Tu","year":"2004","unstructured":"Tu, S.F., Hsu, C.S.: A BTC-based watermarking scheme for digital images. Int. J. Inf. Secur. 15(2), 214\u2013226 (2004)","journal-title":"Int. J. Inf. Secur."},{"issue":"4","key":"3_CR20","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1016\/j.patrec.2003.12.011","volume":"25","author":"CN Yang","year":"2004","unstructured":"Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recogn. Lett. 25(4), 481\u2013494 (2004)","journal-title":"Pattern Recogn. Lett."},{"key":"3_CR21","first-page":"159","volume":"8","author":"A Mahmoud Hassan","year":"2005","unstructured":"Mahmoud Hassan, A., Mohammed Khalili, A.: Self watermarking based on visual cryptography. World Acad. Sci. Eng. Technol. J. 8, 159\u2013162 (2005)","journal-title":"World Acad. Sci. Eng. Technol. J."},{"issue":"2","key":"3_CR22","first-page":"24","volume":"5","author":"A Sliet","year":"2008","unstructured":"Sliet, A., Abusitta, A.: A visual cryptography based watermark technology for individual and group images. Systemics Cybern. Inf. 5(2), 24\u201332 (2008)","journal-title":"Systemics Cybern. Inf."},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Ying, S., Yinlan, Y.: Visual cryptography based multiparty copyright protect scheme. In: Proceedings of 2nd International Conference on Advanced Computer Control, Shenyang, Liaoning, China, vol. 2, pp. 223\u2013226 (2010)","DOI":"10.1109\/ICACC.2010.5486685"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Gavini, N.S., Surekha, B.: Lossless watermarking technique for copyright protection of high resolution images. In: IEEE Region 10 Symposium, Malaysia, pp. 77\u201382 (2014)","DOI":"10.1109\/TENCONSpring.2014.6863000"},{"key":"3_CR25","unstructured":"http:\/\/www.imageprocessingplace.com\/DIP3E\/dip3e_book_images_downloads.htm"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Surekha, B., Ravi Babu, P., Swamy, G.N.: Security analysis of a novel copyright protection scheme using visual cryptography. In: IEEE International Conference on Computing and Communication Technologies, Osmania University, Hyderabad, pp. 1\u20135 (2014)","DOI":"10.1109\/ICCCT2.2014.7066723"}],"container-title":["Lecture Notes in Computer Science","Swarm, Evolutionary, and Memetic Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48959-9_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T23:14:44Z","timestamp":1749770084000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48959-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319489582","9783319489599"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48959-9_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}