{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:04:51Z","timestamp":1761581091489},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642386275"},{"type":"electronic","value":"9783642386282"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38628-2_76","type":"book-chapter","created":{"date-parts":[[2013,5,22]],"date-time":"2013-05-22T02:52:37Z","timestamp":1369191157000},"page":"640-647","source":"Crossref","is-referenced-by-count":9,"title":["DCT Based Approach for Tampered Image Detection and Recovery Using Block Wise Fragile Watermarking Scheme"],"prefix":"10.1007","author":[{"given":"Shivendra","family":"Shivani","sequence":"first","affiliation":[]},{"given":"Durgesh","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Suneeta","family":"Agarwal","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"76_CR1","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/s11042-010-0541-z","volume":"54","author":"X. Zhang","year":"2010","unstructured":"Zhang, X., Wang, S., Qian, Z., Feng, G.: Self-embedding watermark with flexible restoration Quality. Journal Multimedia Tools and Applications\u00a054, 385\u2013395 (2010)","journal-title":"Journal Multimedia Tools and Applications"},{"key":"76_CR2","first-page":"221","volume-title":"International Conference on Communication, Computing & Security (ICCCS 2011)","author":"S. Shivani","year":"2011","unstructured":"Shivani, S., Patel, A.K., Kamble, S., Agarwal, S.: An effective pixel-wise fragile watermarking scheme based on ARA bits. In: International Conference on Communication, Computing & Security (ICCCS 2011), pp. 221\u2013226. ACM, New York (2011)"},{"key":"76_CR3","unstructured":"Lin, E.T., Delp, E.J.: A review of fragile Watermarking, Center for Education and Research in Information Assurance and Security, Purdue University, West Lafayette. IN 47907-2086"},{"key":"76_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/978-3-642-04431-1_10","volume-title":"Information Hiding","author":"H.-J. He","year":"2009","unstructured":"He, H.-J., Zhang, J.-S., Tai, H.-M.: Self-recovery Fragile Watermarking Using Block-Neighborhood Tampering Characterization. In: Katzenbeisser, S., Sadeghi, A.-R. (eds.) IH 2009. LNCS, vol.\u00a05806, pp. 132\u2013145. Springer, Heidelberg (2009)"},{"key":"76_CR5","doi-asserted-by":"crossref","unstructured":"Zhang, X., Wang, S.: Fragile Watermarking With Error-Free Restoration Capability. IEEE Transaction of Multimedia\u00a010(8) (2008)","DOI":"10.1109\/TMM.2008.2007334"},{"key":"76_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/978-3-540-30483-8_31","volume-title":"Content Computing","author":"M.-A. Kim","year":"2004","unstructured":"Kim, M.-A., Lee, W.-H.: A Content-Based Fragile Watermarking Scheme for Image Authentication. In: Chi, C.-H., Lam, K.-Y. (eds.) AWCC 2004. LNCS, vol.\u00a03309, pp. 258\u2013265. Springer, Heidelberg (2004)"},{"key":"76_CR7","unstructured":"He, H., Zhang, J., Chen, F.: Block-wise Fragile Watermarking Scheme Based on Scramble Encryption. IEEE (2007) 978-1-4244-4105-1\/07"},{"key":"76_CR8","doi-asserted-by":"crossref","unstructured":"Seng, W.C., Du, J., Pham, B.: Semi Fragile Watermark with Self Authentication and Self Recovery. Malaysian Journal of Computer Science\u00a022(1) (2009)","DOI":"10.22452\/mjcs.vol22no1.5"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Image Analysis"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38628-2_76","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,26]],"date-time":"2020-07-26T20:44:28Z","timestamp":1595796268000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38628-2_76"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642386275","9783642386282"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38628-2_76","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}