{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T09:53:29Z","timestamp":1725875609288},"publisher-location":"Singapore","reference-count":17,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811021039"},{"type":"electronic","value":"9789811021046"}],"license":[{"start":{"date-parts":[[2016,12,23]],"date-time":"2016-12-23T00:00:00Z","timestamp":1482451200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-2104-6_17","type":"book-chapter","created":{"date-parts":[[2016,12,22]],"date-time":"2016-12-22T07:49:27Z","timestamp":1482392967000},"page":"181-191","source":"Crossref","is-referenced-by-count":0,"title":["Robust Image Hashing Technique for Content Authentication based on DWT"],"prefix":"10.1007","author":[{"given":"Lokanadham Naidu","family":"Vadlamudi","sequence":"first","affiliation":[]},{"given":"Rama Prasad V.","family":"Vaddella","sequence":"additional","affiliation":[]},{"given":"Vasumathi","family":"Devara","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,12,23]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"S. M Saad, \u201cDesign of a Robust and Secure Digital Signature Scheme for Image Authentication over Wireless Channels,\u201d IET Information Security, vol. 3(1), pp. 1\u20138, 2009.","DOI":"10.1049\/iet-ifs:20070112"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Adil Haouzia, Rita Noumeir, \u201cMethods for Image Authentication: A Survey,\u201d Journal of Multimedia Tools Applications, vol. 39(1) pp. 1\u20134, 2008.","DOI":"10.1007\/s11042-007-0154-3"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Shui-Hua Han, Chao-Hsien Chu, \u201cContent-based Image Authentication: Current Status, Issues and Challenges,\u201d Int. Journal of Information Security, vol. 9(1), pp. 19\u201332, 2010.","DOI":"10.1007\/s10207-009-0093-2"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"F Ahmed, M. Y. Siyal, V. Uddin Abbas, \u201cA Secure and Robust Hash Based Scheme for Image Authentication,\u201d Journal of Signal Processing, vol. 90(5), pp 1456\u20131470, 2010.","DOI":"10.1016\/j.sigpro.2009.05.024"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Zhenjun Tang et al., \u201cRobust Image Hashing with Dominant DCT Coefficients,\u201d Int. Journal for Light and Electron Optik, vol. 125(18), pp. 5102\u20135107, 2014.","DOI":"10.1016\/j.ijleo.2014.05.015"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Chuan Qin et al., \u201cRobust Image Hashing using Non-uniform Sampling in Discrete Fourier Domain,\u201d Journal of Digital Signal Processing, vol. 23(2), pp. 578\u2013585, 2013.","DOI":"10.1016\/j.dsp.2012.11.002"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Swaminathan A, Yinian Mao, Min Wu, \u201cRobust and Secure Image Hashing,\u201d IEEE Transactions on Information Forensics and Security, vol. 2(1), pp. 215\u2013230, 2006.","DOI":"10.1109\/TIFS.2006.873601"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"V. Monga, M.K. Mhcak, \u201cRobust and Secure Image Hashing via Non-Negative Matrix Factorization,\u201d IEEE Tr. on Information Forensics and Security, vol. 2(3), pp. 376\u2013390, 2007.","DOI":"10.1109\/TIFS.2007.902670"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Yan Zhao, Shuozhong Wang, Xinpeng Zhang, and Heng Yao, \u201c Robust Hashing for Image Authentication using Zernike Moments and Local Features,\u201d IEEE Tr. on Information Forensics and Security, vol. 8(1), pp. 55\u201363, 2013.","DOI":"10.1109\/TIFS.2012.2223680"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Zhenjun Tang et al., \u201cRobust Image Hashing using Ring-based Entropies,\u201d Journal of Signal Processing, vol. 93(7), pp. 2061\u20132069, 2013.","DOI":"10.1016\/j.sigpro.2013.01.008"},{"key":"17_CR11","unstructured":"Lokanadham Naidu et al., \u201cRobust Hash Generation Technique for Content Based Image Authentication using Histogram,\u201d Multimedia Tools and Applications, vol. 74(9), 2015."},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Patel Janak kumar et al., \u201cColor Image Segmentation for Medical Images using L * a * b * Color Space,\u201d Jr. of Electronics and Communication Engineering, vol. 1(2), pp. 24\u201345, 2012.","DOI":"10.9790\/2834-0122445"},{"key":"17_CR13","unstructured":"Joey Lott et al., \u201cActionScript 3.0 Cookbook,\u201d O\u2019Reilly, pp. 98\u2013100, 2006."},{"key":"17_CR14","unstructured":"Black, Paul E. (2005), Fisher-Yates Shuffle, \u201cDictionary of Algorithms and Data Structures,\u201d National Institute of Standards and Technology, Retrieved 2007."},{"key":"17_CR15","unstructured":"http:\/\/sipi.usc.edu\/database\/ ."},{"key":"17_CR16","unstructured":"http:\/\/decsai.ugr.es\/cvg\/dbimagenes\/ ."},{"key":"17_CR17","unstructured":"http:\/\/tabby.vision.mcgill.ca\/ ."}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of International Conference on Computer Vision and Image Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-2104-6_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T20:55:24Z","timestamp":1568667324000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-2104-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12,23]]},"ISBN":["9789811021039","9789811021046"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-2104-6_17","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2016,12,23]]}}}