{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:51:42Z","timestamp":1762005102114},"publisher-location":"Singapore","reference-count":18,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811399411"},{"type":"electronic","value":"9789811399428"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-9942-8_61","type":"book-chapter","created":{"date-parts":[[2019,7,18]],"date-time":"2019-07-18T03:03:25Z","timestamp":1563419005000},"page":"655-665","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Next Generation Noise and Affine Invariant Video Watermarking Scheme Using Harris Feature Extraction"],"prefix":"10.1007","author":[{"given":"Himanshu","family":"Agarwal","sequence":"first","affiliation":[]},{"given":"Farooq","family":"Husain","sequence":"additional","affiliation":[]},{"given":"Praveen","family":"Saini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,19]]},"reference":[{"key":"61_CR1","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1016\/j.compeleceng.2018.02.045","volume":"72","author":"A Sk","year":"2018","unstructured":"Sk, A., Masilamani, V.: A novel digital watermarking scheme for data authentication and copyright protection in 5G networks. Comput. Electr. Eng. 72, 589\u2013605 (2018)","journal-title":"Comput. Electr. Eng."},{"issue":"3","key":"61_CR2","doi-asserted-by":"publisher","first-page":"895","DOI":"10.1109\/30.713211","volume":"44","author":"T-Y Chung","year":"1998","unstructured":"Chung, T.-Y., et al.: Digital watermarking for copyright protection of MPEG2 compressed video. IEEE Trans. Consum. Electron. 44(3), 895\u2013901 (1998)","journal-title":"IEEE Trans. Consum. Electron."},{"key":"61_CR3","doi-asserted-by":"crossref","unstructured":"Iwata, M., et al.: Digital watermarking method for tamper detection and recovery of JPEG images. In: 2010 International Symposium on Information Theory and its Applications (ISITA). IEEE (2010)","DOI":"10.1109\/ISITA.2010.5649171"},{"key":"61_CR4","first-page":"1","volume":"2014","author":"Shang-Lin Hsieh","year":"2014","unstructured":"Hsieh, S.-L., Chen, C.-C., Shen, W.-S.: Combining digital watermarking and fingerprinting techniques to identify copyrights for color images. Sci. World J. 2014 (2014)","journal-title":"The Scientific World Journal"},{"key":"61_CR5","unstructured":"Fotopoulos, V.: Digital image watermarking. Ph.D. thesis. University of Patras (2003)"},{"issue":"3","key":"61_CR6","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1109\/TIT.1983.1056659","volume":"29","author":"M Costa","year":"1983","unstructured":"Costa, M.: Writing on dirty paper (corresp.). IEEE Trans. Inf. Theory 29(3), 439\u2013441 (1983)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"61_CR7","doi-asserted-by":"crossref","unstructured":"Cox, I.J., Miller, M.L.: Review of watermarking and the importance of perceptual modeling. In: Human Vision and Electronic Imaging II, vol. 3016. International Society for Optics and Photonics (1997)","DOI":"10.1117\/12.274502"},{"issue":"3","key":"61_CR8","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1016\/S0165-1684(98)00017-6","volume":"66","author":"N Nikolaidis","year":"1998","unstructured":"Nikolaidis, N., Pitas, I.: Robust image watermarking in the spatial domain. Signal Process. 66(3), 385\u2013403 (1998)","journal-title":"Signal Process."},{"key":"61_CR9","first-page":"191","volume":"10","author":"Z Zhang","year":"2016","unstructured":"Zhang, Z., Wang, C.Y., Zhou, X.: Image watermarking scheme based on DWT-DCT and SSVD. Int. J. Secur. Appl. 10, 191\u2013206 (2016)","journal-title":"Int. J. Secur. Appl."},{"issue":"1","key":"61_CR10","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.jksuci.2016.12.004","volume":"31","author":"Jobin Abraham","year":"2019","unstructured":"Abraham, J., Paul, V.: An imperceptible spatial domain color image watermarking scheme. J. King Saud Univ.-Comput. Inf. Sci. 31(1), 125\u2013133 (2019)","journal-title":"Journal of King Saud University - Computer and Information Sciences"},{"key":"61_CR11","doi-asserted-by":"crossref","unstructured":"Singh, A.K., et al.: A novel technique for digital image watermarking in spatial domain. In: 2012 2nd IEEE International Conference on Parallel Distributed and Grid Computing (PDGC). IEEE (2012)","DOI":"10.1109\/PDGC.2012.6449871"},{"key":"61_CR12","doi-asserted-by":"crossref","unstructured":"Pardhu, T., Perli, B.R.: Digital image watermarking in frequency domain. In: 2016 International Conference on Communication and Signal Processing (ICCSP). IEEE (2016)","DOI":"10.1109\/ICCSP.2016.7754123"},{"issue":"12","key":"61_CR13","doi-asserted-by":"publisher","first-page":"17027","DOI":"10.1007\/s11042-018-7085-z","volume":"78","author":"Ahmed Khaleel Abdulrahman","year":"2019","unstructured":"Abdulrahman, A.K., Ozturk, S.: A novel hybrid DCT and DWT based robust watermarking algorithm for color images. Multimed. Tools Appl. 78(12), 17027\u201317049 (2019)","journal-title":"Multimedia Tools and Applications"},{"key":"61_CR14","doi-asserted-by":"publisher","first-page":"964","DOI":"10.1016\/j.ijleo.2015.09.205","volume":"127","author":"S Fzali","year":"2016","unstructured":"Fzali, S., Moeini, M.: A robust image watermarking method based on DWT, DCT, and SVD using a new technique for correction of main geometric attacks. Optik 127, 964\u2013972 (2016)","journal-title":"Optik"},{"issue":"11","key":"61_CR15","doi-asserted-by":"publisher","first-page":"47","DOI":"10.5815\/ijigsp.2012.11.07","volume":"4","author":"H Agarwal","year":"2012","unstructured":"Agarwal, H., Ahuja, R., Bedi, S.S.: Highly robust and imperceptible luminance based hybrid digital video watermarking scheme for ownership protection. Int. J. Image Graph. Signal Process. 4(11), 47 (2012)","journal-title":"Int. J. Image Graph. Signal Process."},{"key":"61_CR16","unstructured":"Kutter, M., Bhattacharjee, S.K., Ebrahimi, T.: Towards second generation watermarking scheme. In: Proceedings of IEEE ICIP 1999, vol. 1 (1999)"},{"issue":"7","key":"61_CR17","doi-asserted-by":"publisher","first-page":"1365","DOI":"10.1016\/j.patcog.2003.12.013","volume":"37","author":"JS Seo","year":"2004","unstructured":"Seo, J.S., Yoo, C.D.: Localized image watermarking based on feature points of scale-space representation. Pattern Recogn. 37(7), 1365\u20131375 (2004)","journal-title":"Pattern Recogn."},{"issue":"6","key":"61_CR18","doi-asserted-by":"publisher","first-page":"1264","DOI":"10.1016\/j.sigpro.2006.11.002","volume":"87","author":"X Qi","year":"2007","unstructured":"Qi, X., Qi, J.: A robust content-based digital image watermarking scheme. Signal Process. 87(6), 1264\u20131280 (2007)","journal-title":"Signal Process."}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Data Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-9942-8_61","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,18]],"date-time":"2019-07-18T03:22:41Z","timestamp":1563420161000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-9942-8_61"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811399411","9789811399428"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-9942-8_61","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"19 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICACDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Computing and Data Sciences","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ghazibad","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 April 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 April 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icacds0a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/icacds.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"621","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"112","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"-","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}