{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T04:14:16Z","timestamp":1750997656518,"version":"3.41.0"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319685045"},{"type":"electronic","value":"9783319685052"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68505-2_12","type":"book-chapter","created":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T01:08:03Z","timestamp":1509325683000},"page":"133-142","source":"Crossref","is-referenced-by-count":0,"title":["Improved STDM Watermarking Using Semantic Information-Based JND Model"],"prefix":"10.1007","author":[{"given":"Chunxing","family":"Wang","sequence":"first","affiliation":[]},{"given":"Teng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Wenbo","family":"Wan","sequence":"additional","affiliation":[]},{"given":"Jiande","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Meiling","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,31]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Wang, J., Li, T., Shi, Y.-Q., Lian, S., Ye, J.: Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics. Multimedia Tool Appl. 1\u201317 (2016)","DOI":"10.1007\/s11042-016-4153-0"},{"issue":"11","key":"12_CR2","doi-asserted-by":"crossref","first-page":"2594","DOI":"10.1109\/TIFS.2016.2590944","volume":"11","author":"Z Xia","year":"2016","unstructured":"Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(11), 2594\u20132608 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"12_CR3","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","volume":"10","author":"J Li","year":"2015","unstructured":"Li, J., Li, X., Yang, B., Sun, X.: Segmentation-based image copy-move forgery detection scheme. IEEE Trans. Inf. Forensics Secur. 10(3), 507\u2013518 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Fu, Z., Sun, X., Ji, S., Xie, G.: Towards efficient content-aware search over encrypted outsourced data in cloud. In: IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications, pp. 1\u20139 (2016)","DOI":"10.1109\/INFOCOM.2016.7524606"},{"issue":"17","key":"12_CR5","doi-asserted-by":"crossref","first-page":"4573","DOI":"10.1002\/cpe.3423","volume":"27","author":"L Xiong","year":"2015","unstructured":"Xiong, L., Xu, Z., Xu, Y.: A secure re-encryption scheme for data services in a cloud computing environment. Concurr. Comput. Pract. Exp. 27(17), 4573\u20134585 (2015)","journal-title":"Concurr. Comput. Pract. Exp."},{"issue":"10","key":"12_CR6","doi-asserted-by":"crossref","first-page":"2620","DOI":"10.1016\/j.jss.2013.04.086","volume":"86","author":"X Chen","year":"2013","unstructured":"Chen, X., Sun, X., Sun, H., Zhou, Z., Zhang, J.: Reversible watermarking method based on asymmetric-histogram shifting of prediction errors. J. Syst. Softw. 86(10), 2620\u20132626 (2013)","journal-title":"J. Syst. Softw."},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Abdullatif, M., Zeki, A.M.: Properties of digital image watermarking. In: 2013 IEEE 9th International Colloquium on Signal Processing and its Applications, pp. 235\u2013240 (2013)","DOI":"10.1109\/CSPA.2013.6530048"},{"issue":"4","key":"12_CR8","doi-asserted-by":"crossref","first-page":"1423","DOI":"10.1109\/18.923725","volume":"47","author":"B Chen","year":"2001","unstructured":"Chen, B., Wornell, G.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theor. 47(4), 1423\u20131443 (2001)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Doerr, G., Li, Q., Cox, I.J.: Spread transform dither modulation using a perceptual model. In: Proceedings of IEEE International Workshop on Multimedia Signal Processing, pp. 98\u2013102 (2006)","DOI":"10.1109\/MMSP.2006.285276"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Watson, A.B.: DCT quantization matrices optimized for individual images. In: Proceedings of Human Vision Processing and Digital Display IV, vol. 1913, pp. 202\u2013216. SPIE (1993)","DOI":"10.1117\/12.152694"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Li, Q., Cox, I.J.: Improved spread transform dither modulation using a perceptual model: robustness to amplitude scaling and JPEG compression. In: Proceedings of IEEE ICASSP, vol. 2, pp. 185\u2013188 (2007)","DOI":"10.1109\/ICASSP.2007.366203"},{"issue":"4","key":"12_CR12","doi-asserted-by":"crossref","first-page":"843","DOI":"10.1587\/transinf.E93.D.843","volume":"E93\u2013D","author":"L Ma","year":"2010","unstructured":"Ma, L.: Adaptive spread-transform modulation using a new perceptual model for color image. IEICE Trans. Inf. Syst. E93\u2013D(4), 843\u2013856 (2010)","journal-title":"IEICE Trans. Inf. Syst."},{"issue":"3","key":"12_CR13","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1049\/iet-ifs.2010.0218","volume":"5","author":"X Li","year":"2011","unstructured":"Li, X., Liu, J., Sun, J., Yang, X., Liu, W.: Step-projection-based spread transform dither modulation. IET Inf. Secur. 5(3), 170\u2013180 (2011)","journal-title":"IET Inf. Secur."},{"key":"12_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1007\/978-3-319-21963-9_39","volume-title":"Image and Graphics","author":"W Tang","year":"2015","unstructured":"Tang, W., Wan, W., Liu, J., Sun, J.: Improved spread transform dither modulation using luminance-based JND model. In: Zhang, Y.-J. (ed.) ICIG 2015. LNCS, vol. 9218, pp. 430\u2013437. Springer, Cham (2015). doi: 10.1007\/978-3-319-21963-9_39"},{"key":"12_CR15","doi-asserted-by":"crossref","first-page":"893","DOI":"10.1109\/LSP.2013.2272193","volume":"20","author":"SH Bae","year":"2013","unstructured":"Bae, S.H., Kim, M.: A novel DCT-based JND model for luminance adaptation effect in DCT frequency. IEEE Sig. Process. Lett. 20, 893\u2013896 (2013)","journal-title":"IEEE Sig. Process. Lett."},{"key":"12_CR16","unstructured":"Rust, B., Rushmeier, H.: A new representation of the contrast sensitivity function for human vision. In: Proceedings of the International Conference on Image, Science System, Technology, pp. 1\u201315 (1997)"},{"issue":"3","key":"12_CR17","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1109\/TCSVT.2009.2013518","volume":"19","author":"Z Wei","year":"2009","unstructured":"Wei, Z., Ngan, K.N.: Spatio-temporal just noticeable distortion profile for grey scale image\/video in DCT domain. IEEE Trans. Circ. Syst. Video Technol. 19(3), 337\u2013346 (2009)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"issue":"20","key":"12_CR18","doi-asserted-by":"crossref","first-page":"1435","DOI":"10.1049\/el.2014.1651","volume":"50","author":"H Qi","year":"2014","unstructured":"Qi, H., Jiao, S., Lin, W.: Content-based image quality assessment using semantic information and luminance differences. Electron. Lett. 50(20), 1435\u20131436 (2014)","journal-title":"Electron. Lett."},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Ahumada, A.J., Peterson, H.A.: Luminance-model-based DCT quantization for color image compression. In: Proceedings of SPIE, vol. 1666, pp. 365\u2013374 (1992)","DOI":"10.1117\/12.135982"},{"issue":"10","key":"12_CR20","doi-asserted-by":"crossref","first-page":"996","DOI":"10.1109\/LSP.2013.2277884","volume":"20","author":"K Muthuswamy","year":"2013","unstructured":"Muthuswamy, K., Rajan, D.: Salient motion detection in compressed domain. IEEE Sig. Process. Lett. 20(10), 996\u2013999 (2013)","journal-title":"IEEE Sig. Process. Lett."},{"key":"12_CR21","unstructured":"USC-SIPI Image Database. http:\/\/sipi.usc.edu\/database\/"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68505-2_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T19:52:42Z","timestamp":1750967562000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68505-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319685045","9783319685052"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68505-2_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}