{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T11:51:54Z","timestamp":1725882714935},"publisher-location":"Singapore","reference-count":32,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811031526"},{"type":"electronic","value":"9789811031533"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-3153-3_31","type":"book-chapter","created":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T07:13:59Z","timestamp":1489648439000},"page":"313-321","source":"Crossref","is-referenced-by-count":1,"title":["On the Security of Chaos-Based Watermarking Scheme for Secure Communication"],"prefix":"10.1007","author":[{"given":"Musheer","family":"Ahmad","sequence":"first","affiliation":[]},{"given":"Hamed D.","family":"AlSharari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,17]]},"reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"Potdar, V.M., Han, S., Chang, E.: A survey of digital image watermarking techniques. In: 3rd IEEE International Conference on Industrial Informatics, 709\u2013716 (2005).","DOI":"10.1109\/INDIN.2005.1560462"},{"key":"31_CR2","doi-asserted-by":"crossref","unstructured":"Lei, C.L., Yu, P.L., Tsai, P.L., Chan, M.H.: An efficient and anonymous buyer\u2013seller watermarking protocol. IEEE Transaction on Image Processing 13(12), 1618\u20131626 (2004).","DOI":"10.1109\/TIP.2004.837553"},{"key":"31_CR3","doi-asserted-by":"crossref","unstructured":"Swanson, M.D., Zhu, B., Tewfik, A.H., Boney, L.: Robust audio watermarking using perceptual masking. Signal Processing 66(3), 337\u2013355 (1998).","DOI":"10.1016\/S0165-1684(98)00014-0"},{"key":"31_CR4","doi-asserted-by":"crossref","unstructured":"Cox, I.J., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital watermarking and steganography. Second Edition, The Morgan Kaufmann Publishers (2008).","DOI":"10.1016\/B978-012372585-1.50015-2"},{"key":"31_CR5","doi-asserted-by":"crossref","unstructured":"Zhang, X., Shuozhong W.: Fragile watermarking scheme using a hierarchical mechanism. Signal processing 89(4), 675\u2013679 (2009).","DOI":"10.1016\/j.sigpro.2008.10.001"},{"key":"31_CR6","doi-asserted-by":"crossref","unstructured":"Wang, X.Y., Yang, H.Y., Cui, C.Y.: An SVM-based robust digital image watermarking against desynchronization attacks. Signal Processing 88(9), 2193\u20132205 (2008).","DOI":"10.1016\/j.sigpro.2008.03.005"},{"key":"31_CR7","doi-asserted-by":"crossref","unstructured":"Cox, I.J., Killian, J., Leighton, T.: A secure, robust watermark for multimedia. In: Information Hiding. Springer Berlin Heidelberg, 185\u2013206 (1996).","DOI":"10.1007\/3-540-61996-8_41"},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"Liu, J.L., Lou, D.C., Chang, M.C., Tso, H.K.: A robust watermarking scheme using self-reference image. Computer Standards & Interfaces, 28(3), 356\u2013367 (2006).","DOI":"10.1016\/j.csi.2005.07.001"},{"key":"31_CR9","doi-asserted-by":"crossref","unstructured":"Shieh, J.M., Lou, D.C., Chang, M.C.: A semi-blind digital watermarking scheme based on singular value decomposition. Computer Standards & Interfaces, 28(4), 428\u2013440 (2006).","DOI":"10.1016\/j.csi.2005.03.006"},{"key":"31_CR10","doi-asserted-by":"crossref","unstructured":"Tao, P., Eskicioglu, A.M.: A robust multiple watermarking scheme in the discrete wavelet transform domain. In: Proceedings of SPIE 5601 Internet Multimedia Management Systems V, 133\u2013144) (2004).","DOI":"10.1117\/12.569641"},{"key":"31_CR11","doi-asserted-by":"crossref","unstructured":"Wang, M.S., Chen, W.C.: A majority-voting based watermarking scheme for color image tamper detection and recovery. Computer Standards & Interfaces 29(5), 561\u2013570 (2007).","DOI":"10.1016\/j.csi.2006.11.009"},{"key":"31_CR12","doi-asserted-by":"crossref","unstructured":"Mohammad, A.A., Alhaj, A., Shaltaf, S.: An improved SVD-based watermarking scheme for protecting rightful ownership. Signal Processing 88(9), 2158\u20132180 (2008).","DOI":"10.1016\/j.sigpro.2008.02.015"},{"key":"31_CR13","doi-asserted-by":"crossref","unstructured":"Bhatnagar, G., Raman, B.: Encryption based robust watermarking in fractional wavelet domain. In: Recent Advances in Multimedia Signal Processing and Communications, Springer Berlin Heidelberg, 375\u2013416 (2009).","DOI":"10.1007\/978-3-642-02900-4_15"},{"key":"31_CR14","doi-asserted-by":"crossref","unstructured":"Rawat, S., Raman, B.: A chaotic system based fragile watermarking scheme for image tamper detection. AEU-International Journal of Electronics and Communications 65(10), 840\u2013847 (2011).","DOI":"10.1016\/j.aeue.2011.01.016"},{"key":"31_CR15","doi-asserted-by":"crossref","unstructured":"Chang, C.C., Chen, K.N., Lee, C.F., Liu, L.J.: A secure fragile watermarking scheme based on chaos-and-hamming code. Journal of Systems and Software 84(9), 1462\u20131470 (2011).","DOI":"10.1016\/j.jss.2011.02.029"},{"key":"31_CR16","doi-asserted-by":"crossref","unstructured":"Jamal, S.S., Shah, T., Hussain, I.: An efficient scheme for digital watermarking using chaotic map. Nonlinear Dynamics 73(3), 1469\u20131474 (2013).","DOI":"10.1007\/s11071-013-0877-9"},{"key":"31_CR17","unstructured":"Aslantas, V., Dogru, M.: A new SVD based fragile image watermarking by using genetic algorithm. In: Sixth International Conference on Graphic and Image Processing, 94431H-94431H (2014)."},{"key":"31_CR18","doi-asserted-by":"crossref","unstructured":"Ansari, I.A., Pant, M., Ahn, C.W.: ABC optimized secured image watermarking scheme to find out the rightful ownership. Optik 127(14), 5711\u20135721 (2016).","DOI":"10.1016\/j.ijleo.2016.03.070"},{"key":"31_CR19","doi-asserted-by":"crossref","unstructured":"Das, T.K., Maitra, S., Mitra, J.: Cryptanalysis of optimal differential energy watermarking (DEW) and a modified robust scheme. IEEE Transactions on Signal Processing 53(2), 768\u2013775 (2005).","DOI":"10.1109\/TSP.2004.839930"},{"key":"31_CR20","unstructured":"Chou, J.S., Chen, Y., Chan, C.J.: Cryptanalysis of Hwang-Chang\u2019s a time-stamp protocol for digital watermarking. IACR Cryptology ePrint Archive (2007)."},{"key":"31_CR21","doi-asserted-by":"crossref","unstructured":"Ting, G.C.W., Goi, B.M., Heng, S.H.: Attacks on a robust watermarking scheme based on self-reference image. Computer Standards & Interfaces 30(1), 32\u201335 (2008).","DOI":"10.1016\/j.csi.2007.07.003"},{"key":"31_CR22","doi-asserted-by":"crossref","unstructured":"Ting, G.C.W., Goi, B.M., Heng, S.H.: Attack on a semi-blind watermarking scheme based on singular value decomposition. Computer Standards & Interfaces 31(2), 523\u2013525 (2009).","DOI":"10.1016\/j.csi.2008.02.007"},{"key":"31_CR23","doi-asserted-by":"crossref","unstructured":"He, H., Zhang, J.: Cryptanalysis on majority-voting based self-recovery watermarking scheme. Telecommunication Systems 49(2), 231\u2013238 (2012).","DOI":"10.1007\/s11235-010-9380-5"},{"key":"31_CR24","doi-asserted-by":"crossref","unstructured":"Teng, L., Wang, X., Wang, X.: Cryptanalysis and improvement of a chaotic system based fragile watermarking scheme. AEU-International Journal of Electronics and Communications 67(6), 540\u2013547 (2013).","DOI":"10.1016\/j.aeue.2012.12.001"},{"key":"31_CR25","doi-asserted-by":"crossref","unstructured":"Caragata, D., Mucarquer, J.A., Koscina, M., El Assad, S.: Cryptanalysis of an improved fragile watermarking scheme. AEU-International Journal of Electronics and Communications, 70(6), 777\u2013785 (2016).","DOI":"10.1016\/j.aeue.2016.03.001"},{"key":"31_CR26","doi-asserted-by":"crossref","unstructured":"Ahmad, M.: Cryptanalysis of chaos based secure satellite imagery cryptosystem. In: Contemporary Computing. Springer Berlin Heidelberg, 81\u201391, (2011).","DOI":"10.1007\/978-3-642-22606-9_12"},{"key":"31_CR27","doi-asserted-by":"crossref","unstructured":"Sharma, P.K., Ahmad, M., Khan, P.M.: Cryptanalysis of image encryption algorithm based on pixel shuffling and chaotic S-box transformation. In: Security in Computing and Communication. Springer-Verlag Berlin Heidelberg, CCIS 467, 173\u2013181, (2014).","DOI":"10.1007\/978-3-662-44966-0_16"},{"key":"31_CR28","doi-asserted-by":"crossref","unstructured":"Ahmad, M., Ahmad, F.: Cryptanalysis of Image Encryption Based on Permutation-Substitution Using Chaotic Map and Latin Square Image Cipher. In: 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications. Springer International Publishing Switzerland, AISC 327, 481\u2013488 (2015).","DOI":"10.1007\/978-3-319-11933-5_53"},{"key":"31_CR29","doi-asserted-by":"crossref","unstructured":"Ahmad, M., Khan, I.R., Alam, S.: Cryptanalysis of Image Encryption Algorithm Based on Fractional-Order Lorenz-Like Chaotic System. In: Emerging ICT for Bridging the Future. Springer International Publishing Switzerland, AISC 338, 381\u2013388 (2015).","DOI":"10.1007\/978-3-319-13731-5_41"},{"key":"31_CR30","doi-asserted-by":"crossref","unstructured":"Sharma, P.K., Kumar, A., Ahmad, M.: Cryptanalysis of Image Encryption Algorithms Based on Pixels Shuffling and Bits Shuffling. In: International Congress on Information and Communication Technology. Springer Singapore, AISC 439, 281\u2013289 (2016).","DOI":"10.1007\/978-981-10-0755-2_30"},{"key":"31_CR31","doi-asserted-by":"crossref","unstructured":"May R.M.: Simple mathematical model with very complicated dynamics. Nature 261, 459\u2013467, (1967).","DOI":"10.1038\/261459a0"},{"key":"31_CR32","unstructured":"Schneier, B.: Applied Cryptography: Protocols Algorithms and Source Code in C. New York, Wiley (1996)."}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-3153-3_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T20:29:49Z","timestamp":1568924989000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-3153-3_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811031526","9789811031533"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-3153-3_31","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017]]}}}