{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T08:54:50Z","timestamp":1742979290590,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":15,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789811666230"},{"type":"electronic","value":"9789811666247"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-6624-7_53","type":"book-chapter","created":{"date-parts":[[2022,2,28]],"date-time":"2022-02-28T04:26:48Z","timestamp":1646022408000},"page":"531-547","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Novel Approach to Encrypt the Data Using DWT and Histogram Feature"],"prefix":"10.1007","author":[{"given":"Sandeep Kumar","family":"Srivastava","sequence":"first","affiliation":[]},{"given":"Sandhya","family":"Katiyar","sequence":"additional","affiliation":[]},{"given":"Sanjay","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,28]]},"reference":[{"issue":"19\u201320","key":"53_CR1","doi-asserted-by":"publisher","first-page":"12959","DOI":"10.1007\/s11042-019-08470-8","volume":"79","author":"KAK Patro","year":"2020","unstructured":"Patro, K.A.K., Acharya, B.: A novel multi-dimensional multiple image encryption technique. Multimedia Tools Appl. 79(19\u201320), 12959\u201312994 (2020)","journal-title":"Multimedia Tools Appl."},{"key":"53_CR2","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.sigpro.2018.09.029","volume":"155","author":"X Chai","year":"2019","unstructured":"Chai, X., Fu, X., Gan, Z., Lu, Y., Chen, Y.: A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process. 155, 44\u201362 (2019)","journal-title":"Signal Process."},{"issue":"9","key":"53_CR3","doi-asserted-by":"publisher","first-page":"11857","DOI":"10.1007\/s11042-018-6745-3","volume":"78","author":"R Ponuma","year":"2019","unstructured":"Ponuma, R., Amutha, R.: Encryption of image data using compressive sensing and chaotic system. Multimedia Tools Appl. 78(9), 11857\u201311881 (2019)","journal-title":"Multimedia Tools Appl."},{"key":"53_CR4","unstructured":"Tabassum, T., Mohidul Islam, S.M.: A digital image data hiding technique based on identical frame extraction in 3-level DWT, 13(7), 560\u2013576 (2003)"},{"key":"53_CR5","unstructured":"Joshi, A.K., Sharm, S.: Reversible data hiding by utilizing AES encryption image & LZW compression. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 6(2), ISSN: 2278-1323 (2017)"},{"key":"53_CR6","unstructured":"Hartung, F., Su, J.K., Girod, B.:Spread spectrum data hiding: malicious attacks and counterattacks of multimedia contents. Int. J. Res. Eng. Technol. Eissn: 2319-1163 | Pissn: 2321-7308 (2005)"},{"key":"53_CR7","doi-asserted-by":"publisher","unstructured":"Chen, Z., Li, L., Peng, H., Liu, Y., Yang, Y.: A novel digital watermarking based on general nonnegative matrix factorization. IEEE Trans. Multimedia (2018). https:\/\/doi.org\/10.1109\/TMM.2018.2794985","DOI":"10.1109\/TMM.2018.2794985"},{"key":"53_CR8","doi-asserted-by":"crossref","unstructured":"Mittal, N., Bisen, A.S., Gupta, R.: An improved digital watermarking technique based on 5-DWT, FFT& SVD. In: International Conference on Trends in Electronics and Informatics ICEI 2017. 978-1-5090-4257-9\/17\/$31.00 \u00a92017 IEEE (2017)","DOI":"10.1109\/ICOEI.2017.8300973"},{"key":"53_CR9","unstructured":"D\u2019Silva, A., Shenvi, N.: Data security using SVD based digital watermarking technique. In: International Conference on Trends in Electronics and Informatics ICEI 2017, 978-1-5090-4257-9\/17\/$31.00 \u00a92017 IEEE (2017)"},{"key":"53_CR10","unstructured":"Hua, G., Bi, G., Xiang, Y.: Dual channel watermarking\u2014A filter perspective. In: 2016 International Conference on Progress in Informatics and Computing (PIC). 978-1-5090-3484- 0\/16\/$31.00 \u00a92016 IEEE (2016)"},{"key":"53_CR11","doi-asserted-by":"crossref","unstructured":"Yang, J-X., Niu, D-D.: A novel dual watermarking algorithm for digital audio. In: 2017 17th IEEE International Conference on Communication Technology. 978-1-5090-3944- 9\/17\/$31.00 \u00a92017 IEEE (2016)","DOI":"10.1109\/ICCT.2017.8359912"},{"key":"53_CR12","doi-asserted-by":"crossref","unstructured":"Chen, Q., Xiong, M.: Dual watermarking based on wavelet transform for data protection in smart grid. In: 2016 3rd International Conference on Information Science and Control Engineering. 978-1-5090-2534-3 \/16 $31.00 \u00a9 2016 IEEE (2016)","DOI":"10.1109\/ICISCE.2016.280"},{"key":"53_CR13","doi-asserted-by":"crossref","unstructured":"Kiatpapan, S., Kondo, T.: SawiyaKiatpapan and Toshiaki Kondo. In: 2015 12th International Conference on Electrical Engineering\/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON). 978-1-4799-7961-5\/15\/$31.00 c 2015 IEEE (2015)","DOI":"10.1109\/ECTICon.2015.7206973"},{"key":"53_CR14","doi-asserted-by":"crossref","unstructured":"Xia, X.-G., Boncelet, C.G., Arce, G.R.: A multiresolution watermark for digital images. In: Proceedings of International Conference on Image Processing, 1997 vol. 1. IEEE (1997)","DOI":"10.1109\/ICIP.1997.647971"},{"key":"53_CR15","doi-asserted-by":"crossref","unstructured":"Zhang, D., Pan, Z., Li, H.: A contour-based semi-fragile image watermarking algorithm in DWT domain. In: Second International Workshop on Education Technology and Computer Science (ETCS), 2010 vol. 3. IEEE (2010)","DOI":"10.1109\/ETCS.2010.312"}],"container-title":["Smart Innovation, Systems and Technologies","Intelligent Data Engineering and Analytics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-6624-7_53","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T12:03:38Z","timestamp":1726747418000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-6624-7_53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811666230","9789811666247"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-6624-7_53","relation":{},"ISSN":["2190-3018","2190-3026"],"issn-type":[{"type":"print","value":"2190-3018"},{"type":"electronic","value":"2190-3026"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"28 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}