{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T22:38:20Z","timestamp":1725835100854},"publisher-location":"New Delhi","reference-count":10,"publisher":"Springer India","isbn-type":[{"type":"print","value":"9788132226932"},{"type":"electronic","value":"9788132226956"}],"license":[{"start":{"date-parts":[[2015,10,25]],"date-time":"2015-10-25T00:00:00Z","timestamp":1445731200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-81-322-2695-6_50","type":"book-chapter","created":{"date-parts":[[2015,10,24]],"date-time":"2015-10-24T20:41:10Z","timestamp":1445719270000},"page":"589-598","source":"Crossref","is-referenced-by-count":1,"title":["Digital Image Watermarking Scheme Based on Visual Cryptography and SVD"],"prefix":"10.1007","author":[{"given":"Ajay Kumar","family":"Mallick","sequence":"first","affiliation":[]},{"family":"Priyanka","sequence":"additional","affiliation":[]},{"given":"Sushila","family":"Maheshkar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,25]]},"reference":[{"key":"50_CR1","unstructured":"Kutter, M., Voloshynovskiy, S.V., Herrigel, A.: Watermark copy attack, electronic imaging. Int. Soc. Opt. Photon. (2000)"},{"key":"50_CR2","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1007\/3-540-68697-5_30","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201996","author":"Stefan Droste","year":"1996","unstructured":"Droste, S.: New results on visual cryptography. In: Advances in Cryptology CRYPTO\u201996. LNCS, vol. 1109, pp. 401\u2013415. Springer, Berlin (1996)"},{"key":"50_CR3","volume-title":"Digital Watermarking","author":"IJ Cox","year":"2002","unstructured":"Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann Publishers Inc., San Francisco (2002)"},{"issue":"7","key":"50_CR4","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1109\/5.771066","volume":"87","author":"F Hartung","year":"1999","unstructured":"Hartung, F., Kutter, M.: Multimedia watermarking techniques. Proc. IEEE 87(7), 1079\u20131107 (1999)","journal-title":"Proc. IEEE"},{"issue":"8","key":"50_CR5","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1109\/35.940053","volume":"39","author":"S. Voloshynovskiy","year":"2001","unstructured":"Voloshynovskiy, S., Pereira, S., Pun, T., Eggers, J.J., Su, J.K.: Attacks on digital watermarks: classification, estimation based attacks, and benchmarks. IEEE Commun. Mag. 39(8) (2001)","journal-title":"IEEE Communications Magazine"},{"issue":"2","key":"50_CR6","first-page":"49","volume":"4","author":"PS Revenkar","year":"2010","unstructured":"Revenkar, P.S., Anjum, A., Gandhare, W.Z.: Survey of visual cryptography schemes. Int. J. Secur. App. 4(2), 49\u201356 (2010)","journal-title":"Int. J. Secur. App."},{"key":"50_CR7","first-page":"1","volume-title":"Visual Cryptography, in Advances in Computer Science","author":"M Naor","year":"1995","unstructured":"Naor, M., Shamir, A.: Visual Cryptography, in Advances in Computer Science, vol. 950, pp. 1\u201312. Springer, Berlin (1995)"},{"key":"50_CR8","unstructured":"Hawkes, L., Yasinsac, A. Cline, C.: An Application of Visual Cryptography to Financial Documents. Technical Report TR001001, Florida State University (2000)"},{"key":"50_CR9","unstructured":"Chang, C.C., Tsai, P., Lin, C.C.: SVD-based digital watermarking scheme. Pattern Recogn. Lett. 26, 1577\u20131586 (2005)"},{"issue":"1","key":"50_CR10","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1109\/6046.985560","volume":"4","author":"Ruizhen Liu","year":"2002","unstructured":"Liu, R., Tan, T.: An SVD-based watermarking scheme for protection rightful ownership. IEEE Trans. Multimedia 4, 121\u2013128 (2002)","journal-title":"IEEE Transactions on Multimedia"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-2695-6_50","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T05:07:00Z","timestamp":1559279220000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-81-322-2695-6_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,25]]},"ISBN":["9788132226932","9788132226956"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-2695-6_50","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015,10,25]]}}}