{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T14:11:58Z","timestamp":1742998318729,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":24,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811064265"},{"type":"electronic","value":"9789811064272"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-6427-2_34","type":"book-chapter","created":{"date-parts":[[2017,9,23]],"date-time":"2017-09-23T06:32:16Z","timestamp":1506148336000},"page":"416-430","source":"Crossref","is-referenced-by-count":2,"title":["FPGA Based Low Power Hardware Implementation for Quality Access Control of a Compressed Gray Scale Image"],"prefix":"10.1007","author":[{"given":"Himadri","family":"Mandal","sequence":"first","affiliation":[]},{"given":"Goutam Kr.","family":"Maity","sequence":"additional","affiliation":[]},{"given":"Amit","family":"Phadikar","sequence":"additional","affiliation":[]},{"given":"Tien-Lung","family":"Chiu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,24]]},"reference":[{"issue":"7","key":"34_CR1","doi-asserted-by":"publisher","first-page":"1239","DOI":"10.1109\/5.771075","volume":"87","author":"PB Schneck","year":"1999","unstructured":"Schneck, P.B.: Persistent access control to prevent piracy of digital information. Proc. IEEE 87(7), 1239\u20131250 (1999)","journal-title":"Proc. IEEE"},{"key":"34_CR2","doi-asserted-by":"crossref","unstructured":"Kountchev, R., Milanova, M., Kountcheva, R.: Content protection and hierarchical access control in image databases. In: International Symposium on Innovations in Intelligent SysTems and Applications (INISTA), pp. 1\u20136 (2015)","DOI":"10.1109\/INISTA.2015.7276730"},{"issue":"5","key":"34_CR3","doi-asserted-by":"publisher","first-page":"940","DOI":"10.1109\/TMM.2016.2535728","volume":"18","author":"K Yang","year":"2016","unstructured":"Yang, K., Liu, Z., Jia, X., Shen, X.S.: Time-domain attribute-based access control for cloud-based video content sharing: a cryptographic approach. IEEE Trans. Multimed. 18(5), 940\u2013950 (2016)","journal-title":"IEEE Trans. Multimed."},{"issue":"20","key":"34_CR4","doi-asserted-by":"publisher","first-page":"12645","DOI":"10.1007\/s11042-015-2450-7","volume":"75","author":"L Hu","year":"2016","unstructured":"Hu, L., Li, Y., Li, T., Li, H., Chu, J.: The efficiency improved scheme for secure access control of digital video distribution. Multimed. Tools Appl. 75(20), 12645\u201312662 (2016)","journal-title":"Multimed. Tools Appl."},{"issue":"4","key":"34_CR5","first-page":"231","volume":"15","author":"CC Lee","year":"2013","unstructured":"Lee, C.C., Chung, P.S., Hwang, M.S.: A survey on attribute-based encryption schemes of access control in cloud environments. IJ Netw. Secur. 15(4), 231\u2013240 (2013)","journal-title":"IJ Netw. Secur."},{"key":"34_CR6","doi-asserted-by":"crossref","unstructured":"Phadikar, A., Mandal, H., Maity, G.K., Chiu, T.L.: A new model of QIM data hiding for quality access control of digital image. In: International Conference on Soft-Computing and Networks Security (ICSNS), pp. 1\u20135 (2015)","DOI":"10.1109\/ICSNS.2015.7292441"},{"issue":"1","key":"34_CR7","first-page":"19","volume":"4","author":"SL Lin","year":"2013","unstructured":"Lin, S.L., Huang, C.F., Liou, M.H., Chen, C.Y.: Improving histogram-based Reversible information hiding by an optimal weight-based prediction scheme. J. Inf. Hiding Multimed. Sig. Process. 4(1), 19\u201333 (2013)","journal-title":"J. Inf. Hiding Multimed. Sig. Process."},{"key":"34_CR8","doi-asserted-by":"crossref","unstructured":"Grosbois, R., Gerbelot, P., Ebrahimi, T.: Authentication and access control in the JPEG 2000 compressed domain. In: 46th SPIE Annual Meeting, Applications of Digital Image Processing, pp. 95\u2013104 (2001)","DOI":"10.1117\/12.449744"},{"issue":"3","key":"34_CR9","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/s11265-007-0095-0","volume":"49","author":"FC Chang","year":"2007","unstructured":"Chang, F.C., Huang, H.C., Hang, H.M.: Layered access control schemes on watermarked scalable media. J. VLSI Sig. Proc. 49(3), 443\u2013455 (2007)","journal-title":"J. VLSI Sig. Proc."},{"key":"34_CR10","doi-asserted-by":"crossref","unstructured":"Phadikar, A., Maity, S.P., Mandal, M.K.: Quantization based data hiding scheme for quality access control of images. In: 12th IASTED International Conference on Internet and Multimedia Systems and Applications (IMSA 2008), pp. 113\u2013118 (2008)","DOI":"10.1109\/ICVGIP.2008.23"},{"issue":"1","key":"34_CR11","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1109\/79.879338","volume":"17","author":"M Maes","year":"2000","unstructured":"Maes, M., Kalker, T., Linnartz, J.P.M.G., Talstra, J., Depovere, G.F.G., Haitsma, J.: Digital Watamarking for DVD video copyright protection. IEEE Sig. Process. Mag. 17(1), 47\u201357 (2000)","journal-title":"IEEE Sig. Process. Mag."},{"issue":"1","key":"34_CR12","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1016\/j.aeue.2012.10.014","volume":"67","author":"SP Maity","year":"2013","unstructured":"Maity, S.P., Kundu, M.K.: Distortion free image-in-image communication with implementation in FPGA. AEU Int. J. Electron. Commun. 67(1), 438\u2013447 (2013)","journal-title":"AEU Int. J. Electron. Commun."},{"issue":"5","key":"34_CR13","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1049\/iet-cdt:20070057","volume":"1","author":"SP Mohanty","year":"2007","unstructured":"Mohanty, S.P., Kougianos, E., Ranganathan, N.: VLSI architecture and chip for combined invisible robust and fragile watermarking. IET Comput. Digital Tech. 1(5), 600\u2013611 (2007)","journal-title":"IET Comput. Digital Tech."},{"issue":"2","key":"34_CR14","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1016\/j.compeleceng.2008.06.003","volume":"35","author":"SP Maity","year":"2009","unstructured":"Maity, S.P., Kundu, M., Maity, S.: Dual purpose FWT domain spread spectrum image watermarking in real time. Int. J. Comput. Electric. Eng. 35(2), 415\u2013433 (2009)","journal-title":"Int. J. Comput. Electric. Eng."},{"issue":"1","key":"34_CR15","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.jss.2014.05.079","volume":"96","author":"HK Maity","year":"2014","unstructured":"Maity, H.K., Maity, S.P.: FPGA implementation of reversible watermarking in digital image using reversible contrast mapping. J. Syst. Softw. 96(1), 93\u2013104 (2014)","journal-title":"J. Syst. Softw."},{"issue":"6","key":"34_CR16","doi-asserted-by":"publisher","first-page":"2559","DOI":"10.1007\/s00034-013-9550-2","volume":"32","author":"AD Darji","year":"2013","unstructured":"Darji, A.D., Lad, T.C., Merchant, S.N., Chandorkar, A.N.: Watermarking hardware based on wavelet coefficients quantization method. Circ. Syst. Sig. Process. 32(6), 2559\u20132579 (2013)","journal-title":"Circ. Syst. Sig. Process."},{"key":"34_CR17","doi-asserted-by":"crossref","unstructured":"Mohankumar, N., Devi, M.N., Nath, D.B., Scaria, A.: VLSI architecture for compressed domain video Watermarking. In: Advances in digital image processing and information technology, pp. 405\u2013416 (2011)","DOI":"10.1007\/978-3-642-24055-3_41"},{"key":"34_CR18","unstructured":"Tsai, T.H., Lu, C.Y.: A systems level design for embedded watermark technique using DSC systems. In: Proceedings of the IEEE International Workshop on Intelligent Signal Processing and Communication Systems (2001)"},{"key":"34_CR19","doi-asserted-by":"crossref","unstructured":"Nelson, G.R., Jullien, G.A., Pecht, O.Y.: CMOS image sensor with watermarking capabilities. In: Proceedings of the IEEE Conference on Circuits and Systems (ISCAS), pp. 5326\u20135329 (2005)","DOI":"10.1109\/ISCAS.2005.1465838"},{"issue":"4","key":"34_CR20","doi-asserted-by":"publisher","first-page":"01","DOI":"10.9756\/BIJAIP.3096","volume":"2","author":"S Ghosh","year":"2012","unstructured":"Ghosh, S., Talapatra, S., Chatterjee, N., Maity, S.P., Rahaman, H.: FPGA based implementation of embedding and decoding architecture for binary watermark by spread spectrum scheme in spatial domain. Bonfring Int. J. Adv. Image Process. 2(4), 01\u201308 (2012)","journal-title":"Bonfring Int. J. Adv. Image Process."},{"issue":"1","key":"34_CR21","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1109\/ICME.2002.1035852","volume":"1","author":"G Petitjean","year":"2002","unstructured":"Petitjean, G., Dugelay, J.L., Gabriele, S., Rey, C., Nicolai, J.: Towards real-time video watermarking for systems-on-chip. Proc. IEEE Int. Conf. Multimed. Exp. 1(1), 597\u2013600 (2002)","journal-title":"Proc. IEEE Int. Conf. Multimed. Exp."},{"issue":"1","key":"34_CR22","first-page":"13","volume":"1","author":"A Phadikar","year":"2008","unstructured":"Phadikar, A., Kundu, M.K., Maity, S.P.: Quality access control of a compressed gray scale image. Proc. Comput. Vis. Pattern Recogn. Image Process. Graph. 1(1), 13\u201319 (2008)","journal-title":"Proc. Comput. Vis. Pattern Recogn. Image Process. Graph."},{"key":"34_CR23","doi-asserted-by":"crossref","unstructured":"Kitsos, P., Voros, N.S., Dagiuklas, T., Skodras, A.N.: A high speed FPGA implementation of the 2D DCT for ultra high definition video coding. In: 18th International Conference on Digital Signal Processing (DSP), vol. 1(1), pp. 1\u20135 (2013)","DOI":"10.1109\/ICDSP.2013.6622742"},{"issue":"4","key":"34_CR24","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error measurement to structural similarity. IEEE Trans. Image Process. 13(4), 600\u2013612 (2004)","journal-title":"IEEE Trans. Image Process."}],"container-title":["Communications in Computer and Information Science","Computational Intelligence, Communications, and Business Analytics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-6427-2_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T18:07:59Z","timestamp":1570126079000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-6427-2_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811064265","9789811064272"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-6427-2_34","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]}}}