{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T21:54:09Z","timestamp":1743112449117,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319673790"},{"type":"electronic","value":"9783319673806"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-67380-6_27","type":"book-chapter","created":{"date-parts":[[2017,9,11]],"date-time":"2017-09-11T21:13:35Z","timestamp":1505164415000},"page":"292-299","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Digital Watermarking Method Based on Image Compression Algorithms"],"prefix":"10.1007","author":[{"given":"Sergey","family":"Bezzateev","sequence":"first","affiliation":[]},{"given":"Natalia","family":"Voloshina","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,13]]},"reference":[{"issue":"4","key":"27_CR1","doi-asserted-by":"crossref","first-page":"393","DOI":"10.12733\/jics20105149","volume":"27","author":"AN Yahya","year":"2015","unstructured":"Yahya, A.N., Jalab, H.A., Wahid, A., Noor, R.M.: Robust watermarking algorithm for digital images using discrete wavelet and probabilistic neural network. J. King Saud Univ.-Comput. Inf. Sci. 27(4), 393\u2013401 (2015)","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"issue":"4","key":"27_CR2","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1109\/MWC.2016.7553033","volume":"23","author":"A Ometov","year":"2016","unstructured":"Ometov, A., Orsino, A., Militano, L., Moltchanov, D., Araniti, G., Olshannikova, E., Fodor, G., Andreev, S., Olsson, T., Iera, A., Torsner, J., Koucheryavy, Y., Mikkonen, T.: Toward trusted, social-aware D2D connectivity: bridging across the technology and sociality realms. IEEE Wirel. Commun. 23(4), 103\u2013111 (2016)","journal-title":"IEEE Wirel. Commun."},{"issue":"1","key":"27_CR3","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/s10270-015-0493-x","volume":"15","author":"PJ Mosterman","year":"2016","unstructured":"Mosterman, P.J., Zander, J.: Industry 4.0 as a cyber-physical system study. Softw. Syst. Model. 15(1), 17\u201329 (2016)","journal-title":"Softw. Syst. Model."},{"issue":"2","key":"27_CR4","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1080\/17517575.2015.1033767","volume":"11","author":"X Yan","year":"2017","unstructured":"Yan, X., Zhang, L., Wu, Y., Luo, Y., Zhang, X.: Secure smart grid communications and information integration based on digital watermarking in wireless sensor networks. Enterp. Inf. Syst. 11(2), 223\u2013249 (2017)","journal-title":"Enterp. Inf. Syst."},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Orsino, A., Ometov, A.: Validating information security framework for offloading from LTE onto D2D links. In: Proceedings of the 18th Conference of Open Innovations Association FRUCT, pp. 241\u2013247 (2016)","DOI":"10.1109\/FRUCT-ISPIT.2016.7561534"},{"issue":"2","key":"27_CR6","first-page":"126","volume":"2","author":"N Chandrakar","year":"2013","unstructured":"Chandrakar, N., Bagga, J., et al.: Performance comparison of digital image watermarking techniques: a survey. Int. J. Comput. Appl. Technol. Res. 2(2), 126\u2013130 (2013)","journal-title":"Int. J. Comput. Appl. Technol. Res."},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"Ometov, A., Masek, P., Malina, L., Florea, R., Hosek, J., Andreev, S., Hajny, J., Niutanen, J., Koucheryavy, Y.: Feasibility characterization of cryptographic primitives for constrained (wearable) IoT devices. In: Proceedings of International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/PERCOMW.2016.7457161"},{"issue":"12","key":"27_CR8","doi-asserted-by":"publisher","first-page":"5060","DOI":"10.1109\/TIP.2015.2476961","volume":"24","author":"M Andalibi","year":"2015","unstructured":"Andalibi, M., Chandler, D.M.: Digital image watermarking via adaptive logo texturization. IEEE Trans. Image Process. 24(12), 5060\u20135073 (2015)","journal-title":"IEEE Trans. Image Process."},{"issue":"1","key":"27_CR9","first-page":"49","volume":"7","author":"S Bajracharya","year":"2017","unstructured":"Bajracharya, S., Koju, R.: An improved DWT-SVD based robust digital image watermarking for color image. Int. J. Eng. Manuf. (IJEM) 7(1), 49 (2017)","journal-title":"Int. J. Eng. Manuf. (IJEM)"},{"issue":"11","key":"27_CR10","doi-asserted-by":"publisher","first-page":"3060","DOI":"10.1109\/TIM.2010.2066770","volume":"59","author":"CC Lai","year":"2010","unstructured":"Lai, C.C., Tsai, C.C.: Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans. Instrum. Meas. 59(11), 3060\u20133063 (2010)","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"27_CR11","unstructured":"Belogolovyi, A.: Image compression based on LDPC codes. In: Proceedings of International Conference GraphiCon (2004)"},{"key":"27_CR12","doi-asserted-by":"crossref","unstructured":"Guyeux, C., Bahi, J.M.: Topological chaos and chaotic iterations application to hash functions. In: Proceedings of the 2010 International Joint Conference on Neural Networks (IJCNN), pp. 1\u20137. IEEE (2010)","DOI":"10.1109\/IJCNN.2010.5596512"},{"issue":"1\u20133","key":"27_CR13","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/s10623-012-9739-6","volume":"66","author":"S Bezzateev","year":"2013","unstructured":"Bezzateev, S., Shekhunova, N.: Class of generalized Goppa codes perfect in weighted Hamming metric. Des. Codes Crypt. 66(1\u20133), 391\u2013399 (2013)","journal-title":"Des. Codes Crypt."},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"Bezzateev, S., Voloshina, N., Zhidanov, K.: Steganographic method on weighted container. In: Proceedings of XIII International Symposium on Problems of Redundancy in Information and Control Systems (RED), pp. 10\u201312. IEEE (2012)","DOI":"10.1109\/RED.2012.6338396"},{"issue":"2","key":"27_CR15","first-page":"426","volume":"1","author":"R Dariti","year":"2011","unstructured":"Dariti, R., Souidi, E.M.: An application of linear error-block codes in steganography. Int. J. Digit. Inf. Wirel. Commun. (IJDIWC) 1(2), 426\u2013433 (2011)","journal-title":"Int. J. Digit. Inf. Wirel. Commun. (IJDIWC)"},{"key":"27_CR16","unstructured":"Bezzateev, S., Voloshina, N., Minchenkov, V.: Special class of (L, G) codes for watermark protection in DRM. In: Proceedings of Eighth International Conference on Computer Science and Information Technologies, pp. 225\u2013228 (2011)"}],"container-title":["Lecture Notes in Computer Science","Internet of Things, Smart Spaces, and Next Generation Networks and Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67380-6_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T02:38:05Z","timestamp":1558319885000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-67380-6_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319673790","9783319673806"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67380-6_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"13 September 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NEW2AN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Next Generation Wired\/Wireless Networking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"St. Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 August 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"new2an2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.new2an.org\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}