{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:30:25Z","timestamp":1725564625841},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642157653"},{"type":"electronic","value":"9783642157660"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15766-0_16","type":"book-chapter","created":{"date-parts":[[2010,9,2]],"date-time":"2010-09-02T20:41:05Z","timestamp":1283460065000},"page":"108-115","source":"Crossref","is-referenced-by-count":0,"title":["A New Image Content-Based Authenticity Verification Procedure for Wireless Image Authentication Scheme"],"prefix":"10.1007","author":[{"given":"V.","family":"Lokanadham Naidu","sequence":"first","affiliation":[]},{"given":"K.","family":"Ramani","sequence":"additional","affiliation":[]},{"given":"D.","family":"Ganesh","sequence":"additional","affiliation":[]},{"given":"Sk.","family":"Munwar","sequence":"additional","affiliation":[]},{"given":"P.","family":"Basha","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"Lou, D.C., Liu, J.L., Li, C.T.: Digital Signature-Based Image Authentication: Multimedia security: Steganography and digital watermarking techniques for protection of intellectual property. In: Lu, C.S. (ed.), Idea Group Inc. (2003)"},{"issue":"3","key":"16_CR2","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1155\/S1110865702204047","volume":"6","author":"C. Rey","year":"2002","unstructured":"Rey, C., Dugelay, J.L.: A survey of watermarking algorithms for image authentication. EURASIP J. Applied Signal Processing\u00a06(3), 613\u2013621 (2002)","journal-title":"EURASIP J. Applied Signal Processing"},{"key":"16_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/3-540-49380-8_11","volume-title":"Information Hiding","author":"J. Fridrich","year":"1998","unstructured":"Fridrich, J., Baldoza, A.C., Simard, R.J.: Robust digital watermarking based on key dependent basis functions. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 143\u2013157. Springer, Heidelberg (1998)"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Swaminathan, A., Mao, Y., Wu, M.: Robust and secure image hashing. IEEE Trans. Inf. Forensics Sec., 215\u2013229 (2006)","DOI":"10.1109\/TIFS.2006.873601"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Schneider, M., Chang, S.F.: A Content based digital signature for image authentication. In: Proc. IEEE Int. Conf. Image Processing (ICIP 1996), pp. 227\u2013230 (1996)","DOI":"10.1109\/ICIP.1996.560425"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Han, S., Chu, C.H., Yang, S.: Content-based Image Authentication: Current Status, Issues and Challenges. In: Proc. IEEE Int. Conf. Semantic Computing (ICSC 2007), pp. 630\u2013636 (2007)","DOI":"10.1109\/ICSC.2007.100"},{"key":"16_CR7","unstructured":"Lu, C.S.: On the security of structural information extraction\/embedding for image authentication. In: Proc. IEEE ISCAS 2004, pp. 169\u2013172 (2004)"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Sun, Q., He, D., Ye, S.: Feature selection for semi fragile signature based authentication systems. In: Proc. IEEE Workshop on Image Signal Processing, pp. 99\u2013103 (2003)","DOI":"10.1109\/ITRE.2003.1270581"},{"key":"16_CR9","unstructured":"Ye, S., Lin, X., Sun, Q.: Content-based error detection and concealment for image transmission over wireless channel. In: Proc. IEEE Int. Symp. Circuits and Systems, Thailand (2003)"},{"issue":"1","key":"16_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1049\/iet-ifs:20070112","volume":"3","author":"S.M. Saad","year":"2009","unstructured":"Saad, S.M.: Design of a robust and secure digital signature scheme for image authentication over wireless channels. IET Inf. Secur.\u00a03(1), 1\u20138 (2009)","journal-title":"IET Inf. Secur."},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Kunder, D., Hatzinakos, D.: Digital watermarking using multiresolution wavelet decomposition. In: Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing, Seattle, Washington (1998)","DOI":"10.1109\/ICASSP.1998.678149"},{"key":"16_CR12","unstructured":"Peter, M., Uhl, M.: Watermark security via wavelet filter parameterization. In: Proc. Int. Conf. ICASSP 2000, USA (2000)"}],"container-title":["Communications in Computer and Information Science","Information and Communication Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15766-0_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:40:00Z","timestamp":1606185600000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15766-0_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642157653","9783642157660"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15766-0_16","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}