{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T19:05:18Z","timestamp":1761419118348},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811031526"},{"type":"electronic","value":"9789811031533"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-3153-3_37","type":"book-chapter","created":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T07:13:59Z","timestamp":1489648439000},"page":"373-385","source":"Crossref","is-referenced-by-count":2,"title":["Digital Watermarking Using Enhanced LSB Technique"],"prefix":"10.1007","author":[{"given":"Narander","family":"Kumar","sequence":"first","affiliation":[]},{"family":"Jaishree","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,17]]},"reference":[{"key":"37_CR1","doi-asserted-by":"publisher","unstructured":"M. Moniruzzaman, M. A. K. Hawlader,\u00a0M. F. Hossain.: Wavelet based watermarking approach of hiding patient information in medical image for medical image authentication: 17th International Conference on Computer and Information Technology (ICCIT), 2014 DOI: 10.1109\/ICCITechn.2014.7073133 .","DOI":"10.1109\/ICCITechn.2014.7073133"},{"key":"37_CR2","doi-asserted-by":"publisher","unstructured":"Qing Liu,\u00a0Jun Ying.: Grayscale\u00a0image\u00a0digital\u00a0watermarking\u00a0technology based on wavelet analysis. In: IEEE Symposium on Electrical & Electronics Engineering (EEESYM), DOI: 10.1109\/EEESym.2012.6258734 (2012).","DOI":"10.1109\/EEESym.2012.6258734"},{"key":"37_CR3","doi-asserted-by":"publisher","unstructured":"Agung, B. W. R.,\u00a0Adiwijaya, F.P. Permana,.: Medical\u00a0image\u00a0watermarking\u00a0with tamper detection and recovery using reversible\u00a0watermarking\u00a0with\u00a0LSB\u00a0modification and run length encoding (RLE) compression. In: IEEE International Conference on Communication, Networks and Satellite (ComNetSat), pp:\u00a0167\u2013171,\u00a0DOI: 10.1109\/ComNetSat.2012.6380799 (2012).","DOI":"10.1109\/ComNetSat.2012.6380799"},{"key":"37_CR4","doi-asserted-by":"publisher","unstructured":"Tao Chen,\u00a0Hongtao Lu,.: Robust spatial\u00a0LSB\u00a0watermarking\u00a0of color\u00a0images\u00a0against JPEG compression. In: IEEE Fifth International Conference on Advanced Computational Intelligence (ICACI), pp.\u00a0872\u2013875, DOI: 10.1109\/ICACI.2012.6463294 (2012).","DOI":"10.1109\/ICACI.2012.6463294"},{"key":"37_CR5","doi-asserted-by":"publisher","unstructured":"S. Dadkhah, A.A. Manaf, S. Sadeghi.: Efficient Two Level\u00a0Image\u00a0Tamper Detection Using Three\u00a0LSBWatermarking. In: Fourth International Conference on Computational Intelligence and Communication Networks (CICN), pp:\u00a0719\u2013723,\u00a0DOI: 10.1109\/CICN.2012.108 (2012).","DOI":"10.1109\/CICN.2012.108"},{"key":"37_CR6","doi-asserted-by":"publisher","unstructured":"Hu Lingna, Jiang Lingge.: Blind Detection of\u00a0LSB\u00a0Watermarking\u00a0at Low Embedding Rate in GrayscaleImages. In: Second International Conference on Communications and Networking in China, CHINACOM pp:\u00a0413\u2013416,\u00a0DOI: 10.1109\/CHINACOM.2007.4469415 (2007).","DOI":"10.1109\/CHINACOM.2007.4469415"},{"key":"37_CR7","doi-asserted-by":"publisher","unstructured":"El Kerek B, El Baba H, El Hassan M.: A New Technique to Multiplex Stereo\u00a0Images-\u00a0LSB\u00a0Watermarking\u00a0and Hamming Code. In: 1st International Conference on Artificial Intelligence, Modelling and Simulation (AIMS), pp:\u00a0267\u2013271,\u00a0DOI: 10.1109\/AIMS.2013.49 (2013).","DOI":"10.1109\/AIMS.2013.49"},{"key":"37_CR8","doi-asserted-by":"crossref","unstructured":"Umaamaheshvari, A.,\u00a0Thanushkodi, K.: Robust\u00a0image\u00a0watermarking\u00a0based on block based error correction code. In: International Conference on Current Trends in Engineering and Technology (ICCTET) 2013.","DOI":"10.1109\/ICCTET.2013.6675907"},{"key":"37_CR9","doi-asserted-by":"publisher","unstructured":"Bandyopadhyay, P.,\u00a0Das S.,\u00a0Paul S.,\u00a0Chaudhuri A.,\u00a0Banerjee M.: A Dynamic\u00a0Watermarking\u00a0Scheme for Color\u00a0Image\u00a0Authentication. In: International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom pp:\u00a0314\u2013318,\u00a0DOI: 10.1109\/ARTCom.2009.94 (2009).","DOI":"10.1109\/ARTCom.2009.94"},{"key":"37_CR10","unstructured":"Bandyopadhyay P.,\u00a0Das S.,\u00a0Chaudhuri A.,\u00a0Banerjee M.: A new invisible color\u00a0image\u00a0watermarking\u00a0framework through alpha channel. In: International Conference on Advances in Engineering, Science and Management (ICAESM), pp:\u00a0302\u2013308 (2012)."},{"key":"37_CR11","doi-asserted-by":"publisher","unstructured":"Anwar M.J.,\u00a0Ishtiaq M.,\u00a0Iqbal M.A.,\u00a0Jaffar, M.A.: Block-based digital\u00a0image\u00a0watermarking\u00a0using Genetic Algorithm. In: 6th International Conference on Emerging Technologies (ICET), pp:\u00a0204\u2013209,\u00a0DOI: 10.1109\/ICET.2010.5638488 (2010).","DOI":"10.1109\/ICET.2010.5638488"},{"key":"37_CR12","doi-asserted-by":"publisher","unstructured":"Liu Pei-pei, Zhu Zhong-liang,\u00a0Hong-Xia Wang,\u00a0Yan Tian-yun.: A Novel\u00a0Image\u00a0Fragile\u00a0Watermarking\u00a0Algorithm Based on Chaotic MapImage\u00a0and Signal Processing. In: CISP Congress on Image and Signal Processing, CISP\u201908,\u00a0Volume: 5\u00a0pp:\u00a0631\u2013634,\u00a0DOI: 10.1109\/CISP.2008.636 (2008).","DOI":"10.1109\/CISP.2008.636"},{"key":"37_CR13","doi-asserted-by":"publisher","unstructured":"Subudhi Asit Kumar, Kabi Krishna,\u00a0Subudhi Abhilipsa,\u00a0Patra Himanshu,\u00a0Panda Jyoti Bikash.: An enhanced technique for color\u00a0image\u00a0water marking using HAAR transform. In: International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO), pp:\u00a01\u20135,\u00a0DOI: 10.1109\/EESCO.2015.7253844 (2015).","DOI":"10.1109\/EESCO.2015.7253844"},{"key":"37_CR14","doi-asserted-by":"crossref","unstructured":"A Novel Full-Reference Image Quality Index for Color Images,\u201d Proc. of the (Springer) International Conference on Information Systems Design and Intelligent Applications (INDIA 2012), pp. 245\u2013253 (2012).","DOI":"10.1007\/978-3-642-27443-5_28"},{"key":"37_CR15","unstructured":"Lai B, Chang L (2006) Adaptive data hiding for images based on haar discrete wavelet transform. In: Lecture Notes in Computer Science, Springer-verlag Berlin Heidelberg, vol 4319, pp 1085\u20131093."},{"key":"37_CR16","doi-asserted-by":"crossref","unstructured":"El Safy RO, Zayed HH, El Dessouki A.: An adaptive steganography technique based on integer wavelet transform. In: International Conference on networking and media convergence. Pp-111\u2013117 (2009).","DOI":"10.1109\/ICNM.2009.4907200"},{"key":"37_CR17","unstructured":"Mei Jiansheng1, Li Sukang1 and Tan Xiaomei2.: A Digital Watermarking Algorithm Based On DCT and DWT. In: International Symposium on Web Information Systems and Applications, pp. 104\u2013107, ISBN 978-952-5726-00-8 (2009)."},{"key":"37_CR18","unstructured":"K.Chaitanya1,Dr E. Srinivasa Reddy2,Dr K. Gangadhara Rao3.: Digital Color Image Watermarking In RGB Planes Using DWT-DCT-SVD Coefficients. In: International Journal of Computer Science and Information Technologies, ISSN: 0975-9646 (2014)."},{"key":"37_CR19","doi-asserted-by":"crossref","unstructured":"Chin-Chen Chang a,*, Tung-Shou Chen b,1, Lou-Zo Chung a.: A stenographic method based upon JPEG and quantization table modification. In: Elsevier Information Sciences 141 123\u2013138 (2002).","DOI":"10.1016\/S0020-0255(01)00194-3"},{"key":"37_CR20","doi-asserted-by":"crossref","unstructured":"Guochuan Shi1, Guanyu Chen1,Binhao Shi2, Jiangwei Li1 and Kai Shu1.: Research and Implementation of an Integrity Video Watermarking Authentication Algorithm. In: International Journal of Security and Its Applications Vol.8, No.4\u00a0pp. 239\u2013246, (2014).","DOI":"10.14257\/ijsia.2014.8.4.21"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-3153-3_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T20:30:06Z","timestamp":1568925006000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-3153-3_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811031526","9789811031533"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-3153-3_37","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017]]}}}