{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T10:16:05Z","timestamp":1649153765720},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2012,12,19]],"date-time":"2012-12-19T00:00:00Z","timestamp":1355875200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1007\/s11042-012-1329-0","type":"journal-article","created":{"date-parts":[[2012,12,18]],"date-time":"2012-12-18T04:50:48Z","timestamp":1355806248000},"page":"947-964","source":"Crossref","is-referenced-by-count":4,"title":["Composite chaos-based lossless image authentication and tamper localization"],"prefix":"10.1007","volume":"63","author":[{"given":"Guangyong","family":"Gao","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,12,19]]},"reference":[{"key":"1329_CR1","doi-asserted-by":"crossref","first-page":"1341","DOI":"10.1142\/S021812749600076X","volume":"6","author":"G Chen","year":"1996","unstructured":"Chen G, Lai D (1996) Feedback control of Lyapunov exponents for discrete-time chaotic dynamical systems. Int J Bifurc Chaos 6:1341\u20131349","journal-title":"Int J Bifurc Chaos"},{"issue":"3","key":"1329_CR2","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1109\/81.557372","volume":"44","author":"G Chen","year":"1997","unstructured":"Chen G, Lai D (1997) Making a dynamical system chaotic: feedback control of Lyapunov exponents for discrete-time dynamical systems. IEEE Trans Circ Syst I 44(3):250\u2013253","journal-title":"IEEE Trans Circ Syst I"},{"issue":"5","key":"1329_CR3","doi-asserted-by":"crossref","first-page":"704","DOI":"10.1109\/TCSVT.2008.918801","volume":"18","author":"SY Chen","year":"2008","unstructured":"Chen SY, Leung H (2008) Chaotic watermarking for video authentication in surveillance applications. IEEE Trans Circuits Syst Video Technol 18(5):704\u2013709","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"4","key":"1329_CR4","doi-asserted-by":"crossref","first-page":"722","DOI":"10.1109\/TITB.2006.875655","volume":"10","author":"A Giakoumaki","year":"2006","unstructured":"Giakoumaki A, Pavlopoulos S, Koutsouris D (2006) Multiple image watermarking applied to health information management. IEEE Trans Inf Technol B 10(4):722\u2013732","journal-title":"IEEE Trans Inf Technol B"},{"issue":"2","key":"1329_CR5","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1109\/TIFS.2011.2109952","volume":"6","author":"X Huang","year":"2011","unstructured":"Huang X, Yi M, Susilo W (2011) Preserving transparency and accountability in optimistic fair exchange of digital signatures. IEEE Trans Inf Forensic Secur 6(2):498\u2013512","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"1329_CR6","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/s11042-010-0467-5","volume":"52","author":"L Mao","year":"2011","unstructured":"Mao L, Fan Y, Wang H, Lv G (2011) Fractal and neural networks based watermark identification. Multimed Tools Appl 52:201\u2013219","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"1329_CR7","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1063\/1.166092","volume":"5","author":"SM Pincus","year":"1995","unstructured":"Pincus SM (1995) Approximate entropy (ApEn) as a complexity measure. Chaos 5(1):110\u2013117","journal-title":"Chaos"},{"issue":"2","key":"1329_CR8","first-page":"161","volume":"18","author":"A Poljicak","year":"2011","unstructured":"Poljicak A, Mandic L, Agic D (2011) Robustness of a DFT based Image watermarking method against AM Halftoning. Teh Vjesn 18(2):161\u2013166","journal-title":"Teh Vjesn"},{"key":"1329_CR9","first-page":"013022-1","volume":"20","author":"OP Radu","year":"2011","unstructured":"Radu OP, Dragos NV (2011) Robust wavelet-based video watermarking scheme for copyright protection using the human visual system. J Electron Imaging 20:013022-1\u2013013022-11","journal-title":"J Electron Imaging"},{"issue":"10","key":"1329_CR10","doi-asserted-by":"crossref","first-page":"840","DOI":"10.1016\/j.aeue.2011.01.016","volume":"65","author":"S Rawat","year":"2011","unstructured":"Rawat S, Raman B (2011) A chaotic system based fragile watermarking scheme for image tamper detection. AEU-Int J Electron C 65(10):840\u2013847","journal-title":"AEU-Int J Electron C"},{"key":"1329_CR11","unstructured":"Rukhin A, Soto J, Nechvatal J. A statistical test suite for random and pseudorandom number generator for cryptographic applications. http:\/\/csrc.nist.gov\/rng\/"},{"issue":"4","key":"1329_CR12","first-page":"040506-1","volume":"20","author":"FY Sun","year":"2011","unstructured":"Sun FY, Lu Z (2011) Digital image encryption with chaotic map lattices. Chinese Phys B 20(4):040506-1\u2013040506-7","journal-title":"Chinese Phys B"},{"issue":"8","key":"1329_CR13","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1016\/j.image.2011.06.001","volume":"26","author":"L Tian","year":"2011","unstructured":"Tian L, Zheng N, Xue J (2011) An integrated visual saliency-based watermarking approach for synchronous image authentication and copyright protection. Signal Process-Image 26(8):427\u2013437","journal-title":"Signal Process-Image"},{"issue":"6","key":"1329_CR14","first-page":"588","volume":"39","author":"X Tong","year":"2009","unstructured":"Tong X, Cui M (2009) Image encryption based on disturbed composite chaos. Sci China-Inform Sci 39(6):588\u2013597","journal-title":"Sci China-Inform Sci"},{"issue":"4","key":"1329_CR15","first-page":"18","volume":"20","author":"S Walton","year":"1995","unstructured":"Walton S (1995) Information authentication for a slippery new age. Dr Dobbs J 20(4):18\u201326","journal-title":"Dr Dobbs J"},{"issue":"1","key":"1329_CR16","doi-asserted-by":"crossref","first-page":"010502-1","DOI":"10.1088\/1674-1056\/21\/1\/010502","volume":"21","author":"C Yuen","year":"2012","unstructured":"Yuen C, Wong K (2012) Chaos-based encryption for fractal image coding. Chinese Phys B 21(1):010502-1\u2013010502-12","journal-title":"Chinese Phys B"},{"issue":"3","key":"1329_CR17","doi-asserted-by":"crossref","first-page":"759","DOI":"10.1016\/j.chaos.2004.09.035","volume":"24","author":"LH Zhang","year":"2005","unstructured":"Zhang LH, Liao XF, Wang XB (2005) An image encryption approach based on chaotic maps. Chaos Soliton Fract 24(3):759\u2013765","journal-title":"Chaos Soliton Fract"},{"issue":"3","key":"1329_CR18","doi-asserted-by":"crossref","first-page":"403","DOI":"10.7498\/aps.49.403","volume":"49","author":"J Zhang","year":"2000","unstructured":"Zhang J, Xiao X (2000) Predicting low-dimensional chaotic time series using Volterra adaptive filters. Acta Phys Sin 49(3):403\u2013408","journal-title":"Acta Phys Sin"},{"issue":"11","key":"1329_CR19","doi-asserted-by":"crossref","first-page":"5062","DOI":"10.7498\/aps.54.5062","volume":"54","author":"S Zhang","year":"2005","unstructured":"Zhang S, Xiao X (2005) A new method of global prediction for chaotic time series based on continued fractions. Acta Phys Sin 54(11):5062\u20135068","journal-title":"Acta Phys Sin"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-012-1329-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-012-1329-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-012-1329-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,3]],"date-time":"2022-02-03T15:59:32Z","timestamp":1643903972000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-012-1329-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12,19]]},"references-count":19,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,4]]}},"alternative-id":["1329"],"URL":"https:\/\/doi.org\/10.1007\/s11042-012-1329-0","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,12,19]]}}}