{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T04:13:05Z","timestamp":1749615185753,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":16,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811027376"},{"type":"electronic","value":"9789811027383"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-981-10-2738-3_26","type":"book-chapter","created":{"date-parts":[[2016,9,16]],"date-time":"2016-09-16T02:40:57Z","timestamp":1473993657000},"page":"305-317","source":"Crossref","is-referenced-by-count":4,"title":["Extreme Learning Machine for Semi-blind Grayscale Image Watermarking in DWT Domain"],"prefix":"10.1007","author":[{"given":"Ankit","family":"Rajpal","sequence":"first","affiliation":[]},{"given":"Anurag","family":"Mishra","sequence":"additional","affiliation":[]},{"given":"Rajni","family":"Bala","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,17]]},"reference":[{"issue":"12","key":"26_CR1","doi-asserted-by":"crossref","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"IJ Cox","year":"1997","unstructured":"Cox, I.J., Kilian, J., Leighton, T.F., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6(12), 1673\u20131687 (1997)","journal-title":"IEEE Trans. Image Process."},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Mishra, A., Goel, A., Singh, R., Chetty, G., Singh, L.: A novel image watermarking scheme using Extreme Learning Machine. In: International Joint Conference on Neural Networks (IJCNN), pp. 1\u20136 (2012)","DOI":"10.1109\/IJCNN.2012.6252363"},{"issue":"6","key":"26_CR3","doi-asserted-by":"crossref","first-page":"1667","DOI":"10.1007\/BF02831846","volume":"11","author":"W Zhenfei","year":"2006","unstructured":"Zhenfei, W., Guangqun, Z., Nengchao, W.: Digital watermarking algorithm based on wavelet transform and neural network. Wuhan Univ. J. Nat. Sci. 11(6), 1667\u20131670 (2006)","journal-title":"Wuhan Univ. J. Nat. Sci."},{"key":"26_CR4","first-page":"285","volume-title":"A Blind Watermarking Algorithm Using BPN Neural Network for Digital Image","author":"C Piao","year":"2006","unstructured":"Piao, C., Beack, S., Woo, D., Han, S.: A Blind Watermarking Algorithm Using BPN Neural Network for Digital Image, pp. 285\u2013292. Springer, Berlin, Heidellberg (2006)"},{"issue":"1","key":"26_CR5","first-page":"151","volume":"37","author":"D Lou","year":"2008","unstructured":"Lou, D., Hu, M., Liu, J.: Healthcare image watermarking scheme based on human visual model and back-propagation network. J. C.C.I.T. 37(1), 151\u2013162 (2008)","journal-title":"J. C.C.I.T."},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Yang, Q., Gao, T., Fan, L.: A novel robust watermarking scheme based on neural network. In: International Conference on Intelligent Computing and Integrated Systems (ICISS), pp. 71\u201375 (2010)","DOI":"10.1109\/ICISS.2010.5655017"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Agarwal, C., Mishra, A., Sharma, A.: Digital image watermarking in DCT domain using Fuzzy Inference System. In: 24th Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 822\u2013825 (2011)","DOI":"10.1109\/CCECE.2011.6030570"},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Agarwal, C., Mishra, A.: A novel image watermarking technique using fuzzy-BP network. In: Proceedings of 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 102\u2013105 (2010)","DOI":"10.1109\/IIHMSP.2010.33"},{"issue":"5","key":"26_CR9","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1504\/IJBIC.2013.057193","volume":"5","author":"N Dey","year":"2013","unstructured":"Dey, N., Samanta, S., Yang, X., Das, A., Chaudhuri, S.: Optimisation of scaling factors in electrocardiogram signal watermarking using cuckoo search. 2013 Int. J. Bio-Inspired Comput. 5(5), 315\u2013326 (2013)","journal-title":"2013 Int. J. Bio-Inspired Comput."},{"key":"26_CR10","unstructured":"Huang, G.: The Matlab code for ELM (2004). http:\/\/www.ntu.edu.sg\/home\/egbhuang"},{"key":"26_CR11","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1016\/j.neucom.2005.12.126","volume":"70","author":"G Huang","year":"2006","unstructured":"Huang, G., Zhu, Q., Siew, C.: Extreme learning machine: theory and applications. Neurocomputing 70, 489\u2013501 (2006)","journal-title":"Neurocomputing"},{"key":"26_CR12","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1016\/j.neucom.2005.03.002","volume":"68","author":"M Lin","year":"2005","unstructured":"Lin, M., Huang, G., Saratchandran, P., Sudararajan, N.: Fully complex extreme learning machine. Neurocomputing 68, 306\u2013314 (2005)","journal-title":"Neurocomputing"},{"key":"26_CR13","volume-title":"Matrices: Theory and Applications","author":"D Serre","year":"2002","unstructured":"Serre, D.: Matrices: Theory and Applications. Springer, New York (2002)"},{"issue":"4","key":"26_CR14","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600\u2013612 (2004)","journal-title":"IEEE Trans. Image Process."},{"key":"26_CR15","unstructured":"Liu, Q., Jiang, X.: Design and realization of a meaningful digital watermarking algorithm based on RBF neural network. In: 2005 International Conference on Neural Networks and Brain, Beijing, pp. 214\u2013218 (2005)"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Huang, S., Zhang, W., Feng, W., Yang, H.: Blind watermarking scheme based on neural network. In: 7th World Congress on Intelligent Control and Automation 2008 (WCICA 2008), Chongqing, pp. 5985\u20135989 (2008)","DOI":"10.1109\/WCICA.2008.4594557"}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-2738-3_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T19:11:19Z","timestamp":1749582679000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-2738-3_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9789811027376","9789811027383"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-2738-3_26","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2016]]}}}