{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:30:15Z","timestamp":1725564615746},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642157653"},{"type":"electronic","value":"9783642157660"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15766-0_6","type":"book-chapter","created":{"date-parts":[[2010,9,2]],"date-time":"2010-09-02T16:41:05Z","timestamp":1283445665000},"page":"36-44","source":"Crossref","is-referenced-by-count":1,"title":["Protecting Digital Images Using DTCWT-DCT"],"prefix":"10.1007","author":[{"given":"K.","family":"Ramani","sequence":"first","affiliation":[]},{"given":"E. V.","family":"Prasad","sequence":"additional","affiliation":[]},{"given":"S.","family":"Varadarajan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1155\/S1110865702000525","volume":"2","author":"I.J. Cox","year":"2002","unstructured":"Cox, I.J., Miller, M.L.: The first 50 years of electronic watermarking. J. of Applied Signal Processing\u00a02, 126\u2013132 (2002)","journal-title":"J. of Applied Signal Processing"},{"key":"6_CR2","doi-asserted-by":"crossref","first-page":"2543","DOI":"10.1098\/rsta.1999.0447","volume":"357","author":"N.G. Kingsbury","year":"1999","unstructured":"Kingsbury, N.G.: Image Processing with Complex Wavelets. Phil. Trans. Royal Society London\u00a0357, 2543\u20132560 (1999)","journal-title":"Phil. Trans. Royal Society London"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Kingsbury, N.G.: Complex Wavelets for Shift Invariant Analysis and Filtering of Signals. J. of Applied and Computational Harmonic Analysis and Filtering of Signals (2001)","DOI":"10.1006\/acha.2000.0343"},{"key":"6_CR4","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1016\/j.patrec.2003.10.013","volume":"25","author":"H. Kun-Yu","year":"2004","unstructured":"Kun-Yu, H., Mei-Yi, W., Jia-Hong, L.: An iterative method of palette-based image steganography. Pattern Recognition Letters\u00a025, 301\u2013309 (2004)","journal-title":"Pattern Recognition Letters"},{"issue":"7","key":"6_CR5","first-page":"293","volume":"7","author":"K. Ramani","year":"2007","unstructured":"Ramani, K., Prasad, E.V., Varadarajan, S.: Steganography Using BPCS to the Integer Wavelet Transformed Image. Int. J. of Computer Science and Network Security\u00a07(7), 293\u2013301 (2007)","journal-title":"Int. J. of Computer Science and Network Security"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Tao, B., Dickinson, B.: Adaptive watermarking in the DCT domain. In: IEEE Int. Conf. ASSP 1997 (1997)","DOI":"10.1109\/ICASSP.1997.595419"},{"key":"6_CR7","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/79.879337","volume":"17","author":"G. Langelaar","year":"2000","unstructured":"Langelaar, G., Setyawan, I., Lagendijk, R.L.: Watermarking Digital Image and Video Data. IEEE Signal Processing Magazine\u00a017, 20\u201346 (2000)","journal-title":"IEEE Signal Processing Magazine"},{"key":"6_CR8","first-page":"35","volume":"3","author":"K. Ramani","year":"2007","unstructured":"Ramani, K., Prasad, E.V., Varadarajan, S.: DWT Based Watermarking For Biometric Data. Indian J. of Information Science and Technology\u00a03, 35\u201341 (2007)","journal-title":"Indian J. of Information Science and Technology"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Ramani, K., Prasad, E.V., Varadarajan, S., Subramanyam, A.: A Robust Watermarking Scheme for Information Hiding. In: The Sixteenth Int. Conf. on Advanced Computing and Communication. Anna University, Chennai, India (2008)","DOI":"10.1109\/ADCOM.2008.4760428"},{"key":"6_CR10","doi-asserted-by":"publisher","first-page":"740","DOI":"10.3844\/jcssp.2007.740.746","volume":"3","author":"A. Al-Haj","year":"2007","unstructured":"Al-Haj, A.: Combined DWT-DCT Digital Image Watermarking. J. of Computer Science\u00a03, 740\u2013746 (2007)","journal-title":"J. of Computer Science"},{"key":"6_CR11","volume-title":"Proc. IEE Colloquium on Secure Images and Image Authentication","author":"P. Loo","year":"2000","unstructured":"Loo, P., Kingsbury, N.G.: Digital watermarking with complex wavelets. In: Proc. IEE Colloquium on Secure Images and Image Authentication, IEE, London (2000)"},{"key":"6_CR12","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1006\/acha.2000.0343","volume":"10","author":"N.G. Kingsbury","year":"2001","unstructured":"Kingsbury, N.G.: The Dual Tree Complex Transforms: A efficient tool for Image Restoration and Enhancement. J. Applied and Computational Harmonic Analysis\u00a010, 243\u2013253 (2001)","journal-title":"J. Applied and Computational Harmonic Analysis"},{"issue":"3","key":"6_CR13","first-page":"39","volume":"16","author":"Y. Kuraz","year":"2008","unstructured":"Kuraz, Y., Modar, A.H.: Improve Watermark Security Via Wavelet Transform and CDMA Techniques. Al-Rafidain Engineering\u00a016(3), 39\u201349 (2008)","journal-title":"Al-Rafidain Engineering"},{"key":"6_CR14","unstructured":"Ramani, K., Prasad, E.V., Varadarajan, S.: Improved Imperceptible Image Watermarking Using Dual Tree Complex Wavelet Transform. Submitted to Journal of Multimedia, Germany (2010)"}],"container-title":["Communications in Computer and Information Science","Information and Communication Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15766-0_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:40:07Z","timestamp":1606167607000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15766-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642157653","9783642157660"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15766-0_6","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}